Skip to main content

Towards a Forensic Analysis of Mobile Devices Using Android

  • Conference paper
  • First Online:
Proceedings of the International Conference on Information Technology & Systems (ICITS 2018) (ICITS 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 721))

Included in the following conference series:

  • 3187 Accesses

Abstract

The high utilization rate of mobile devices highlights the problem of vulnerability. As a result, new cybercrime techniques are created, in response to which new forensic techniques must be created, so we can deduct the importance of this paper. For some years now, there has been a significant growth in the use of mobile devices in daily life, since they allow to carry personal data in a practical, easy and comfortable way. These data are, in many cases, the target of malicious people, who, taking advantage of the vulnerabilities that these devices present, are capable of illegal actions, usually for unlawful purposes. The current research proposes, using a comparative method to allow us to formulate a forensic analysis to mobile devices with Android operating system; based on the chain of custody guidelines, compliance stages, and phases and to detect findings, nonconformities, locate vulnerabilities. Based on this process we can determine the origin of the leading causes of different types of events or crimes committed from a mobile device. Additionally, using a decision matrix, the best software for performing the forensic analysis is chosen and using Balanced Scorecard, indicators are evaluated.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yıldırım, N., Varol, A.: Android based mobile application development for web login authentication using fingerprint recognition feature. In: 2015 23th Signal Processing and Communications Applications Conference (SIU). https://doi.org/10.1109/siu.2015.7130436

  2. Venkateswara Rao, V., Chakravarthy, A.S.N.: Forensic analysis of Android mobile devices. In: 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE), 23–25 December 2016. https://doi.org/10.1109/icraie.2016.7939540

  3. Roger, M., Seigfried, K.: The future of computer forensics: a needs analysis survey. Cent. Educ. Res. Inf. Assur. Secur. 23(1), 12–16 (2004)

    Google Scholar 

  4. Höbarth, S.: A framework for on-device privilege escalation exploit. In: de IWSSI2011, San Francisco (2011). https://www.wibas.com/cmmi/decision-analysis-and-resolution-dar-cmmi-dev

  5. El Confidencial: https://goo.gl/WjSVoF. Accessed 17 Mar 2017

  6. Ting, W.: Applying the balanced score card in the team strategic performance management. In: 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), 8–10 August 2011. https://doi.org/10.1109/aimsec.2011.6010534

  7. OWASP: https://goo.gl/OS4fdM. Accessed 01 Feb 2017

  8. Zander, T.: https://www.tobiaszander.de/. Accessed 08 Aug 2017

  9. Vidas, et al.: Toward a general collection methodology for Android devices. In: The Proceedings of the Eleventh Annual DFRWS Conference, vol. 8, pp. S14–S24, Carnegie Mellon ECE/CyLab, USA

    Google Scholar 

  10. Stiparo, P., Kounelis, I.: The mobileak project: forensics methodology for mobile application privacy assessment. In: International Conference for Internet Technology and Secured Transactions. IEEE

    Google Scholar 

  11. Gómez, E, Herrera, N, Moscoso O, Guaman, P.: Propuesta de Análisis Forense para Dispostivos Móviles con Sistema Operativo Android. https://goo.gl/MSQ1Ua

  12. NIST: National Institute of Standards and Technology, 3 April 2014. http://www.nist.gov/. Accessed 6 Apr 2014

  13. The Process Group: Decision Analysis & Resolution, 18 February 2014. http://www.processgroup.com/

  14. Santoku: Santoku. Obtenido de, 17 de 03 de 2017. https://santoku-linux.com/

  15. Oxigen Forensic: Oxigen Forensic Suite. http://www.oxygen-forensic.com/es/

  16. Andriller Tool: https://www.andriller.com/

  17. Guidances Software: Encase Forensic.https://www.guidancesoftware.com/encase-forensic?cmpid=nav_r

  18. Li, B., Wang, Y.: Study on the enterprise strategic budget management mode based on balance scored card. In: 2010 International Conference on E-Business and E-Government (ICEE), 7–9 May 2010. https://doi.org/10.1109/icee.2010.707

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Estevan Gomez-Torres , Oswaldo Moscoso-Zea , Nelson Herrera Herrera or Sergio Lujan-Mora .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gomez-Torres, E., Moscoso-Zea, O., Herrera, N.H., Lujan-Mora, S. (2018). Towards a Forensic Analysis of Mobile Devices Using Android. In: Rocha, Á., Guarda, T. (eds) Proceedings of the International Conference on Information Technology & Systems (ICITS 2018). ICITS 2018. Advances in Intelligent Systems and Computing, vol 721. Springer, Cham. https://doi.org/10.1007/978-3-319-73450-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-73450-7_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-73449-1

  • Online ISBN: 978-3-319-73450-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics