scholarly journals Methodology for Forensics Data Reconstruction on Mobile Devices with Android Operating System Applying In-System Programming and Combination Firmware

2020 ◽  
Vol 10 (12) ◽  
pp. 4231
Author(s):  
Claudinei Morin da Silveira ◽  
Rafael T. de Sousa Jr ◽  
Robson de Oliveira Albuquerque ◽  
Georges D. Amvame Nze ◽  
Gildásio Antonio de Oliveira Júnior ◽  
...  

This paper proposes a new forensic analysis methodology that combines processes, techniques, and tools for physical and logical data acquisition from mobile devices. The proposed methodology allows an overview of the use of the In-System Programming (ISP) technique with the usage of Combination Firmware, aligned with specific collection and analysis processes. The carried out experiments show that the proposed methodology is convenient and practical and provides new possibilities for data acquisition on devices that run the Android Operating System with advanced protection mechanisms. The methodology is also feasible in devices compatible with the usage of Joint Test Action Group (JTAG) techniques and which use Embedded Multimedia Card (eMMC) or Embedded Multi-Chip Package (eMCP) as main memory. The techniques included in the methodology are effective on encrypted devices, in which the JTAG and Chip-Off techniques prove to be ineffective, especially on those that have an unauthorized access protection mechanism enabled, such as lock screen password, blocked bootloader, and Factory Reset Protection (FRP) active. Studies also demonstrate that data preservation and integrity are maintained, which is critical to a digital forensic process.

Author(s):  
Guntur Maulana Zamroni ◽  
Imam Riadi

WhatsApp (WA) is one of the Instant Messaging (IM) applications used by many people. WA and mobile devices cannot be separated from the possibility of misuse such as for criminal purposes. To handle a crime case involving a mobile device, the investigator needs to use suitable forensic tools and mobile forensic methodology so that the results can be approved and accepted by the law. This research conducted a forensic analysis of WA on unrooted Samsung C9 Pro devices using Belkasoft Evidence, Oxygen Forensic, Magnet AXIOM, and WA Key/DB Extractor. This research gives suggestion about forensic tools for conducting forensic analysis related to WA.  From the research can be seen that there is no tool that can be used to obtain all the WA artifact parameters used in the research. The combination of the Magnet AXIOM and WA Key/DB Extractor is known to get the best results and meets the WA artifact parameters.


2021 ◽  
Vol 11 (24) ◽  
pp. 11629
Author(s):  
Zhong Zhang ◽  
Minho Shin

Within the scope of mobile privacy, there are many attack methods that can leak users’ private information. The communication between applications can be used to violate permissions and access private information without asking for the user’s authorization. Hence, many researchers made protection mechanisms against privilege escalation. However, attackers can further utilize inference algorithms to derive new information out of available data or improve the information quality without violating privilege limits. In this work. we describe the notion of Information Escalation Attack and propose a detection and protection mechanism using Inference Graph and Policy Engine for the user to control their policy on the App’s privilege in information escalation. Our implementation results show that the proposed privacy protection service is feasible and provides good useability.


2019 ◽  
Vol 13 (1) ◽  
pp. 162-177
Author(s):  
Yamir Alexander Arévalo Ortega ◽  
Sonia Rocio Corredor Vargas ◽  
Gustavo Adolfo Higuera Castro

Currently, the use of mobile terminals is becoming a necessity for a high number of people around the world which has driven the development of devices with Android operating system; In addition to this, the same indiscriminate access to resources of internet and weak local and international regulations on the use, they have become vulnerable to attacks on the network - injection of malware, ransomware-, among many others. Therefore, this article reviews the hacking tools for the forensic investigation of mobile terminals, proposing from the documentary research a forensic information acquisition model to determine tangible and significant evidences as a probative material.


2011 ◽  
Vol 58-60 ◽  
pp. 2027-2032 ◽  
Author(s):  
Qing Jian Wei ◽  
Jin Ning ◽  
Xi Zhong Lou ◽  
Ren Zhi Ma ◽  
Jia Xu

A mobile remote data monitoring center based on Android operating system is developed for the water environment monitoring system via wireless sensor network (WSN). The monitoring center collects the sensors data from the WSN based on C/S mode. The SQLite is adopted in database module to achieve high memory speed and efficient operation management. Dynamic graphical displays are accomplished to show the topology of the WSN, the state of the nodes and the real-time and historical water environment parameters of the sensor nodes. The experiments show that the software of water environment remote monitoring system, based on mobile devices of Android operating system, can conveniently satisfy the requirements of data collecting and monitoring for water environment monitoring system based on WSN.


2017 ◽  
Vol 3 (2) ◽  
pp. 105
Author(s):  
Abdul Mufti ◽  
Desi Novianti ◽  
Dewi Anjani

Sistem e-farmers merupakan sebuah sistem penjualan berbasis teknologi (e-commerce) yang dapat diakses melalui website, digunakan untuk membantu para petani menjual hasil pertanian berupa beras secara langsung ke konsumen. Namun dengan adanya kendala dalam hal kepemilikan perangkat komputer dan laptop, petani maupun konsumen yang merupakan pengakses website ladangku.id beralih menggunakan perangkat mobile. Dengan alasan ini, maka peneliti membuat sebuah sistem e-farmers yang awalnya berupa website dapat juga diakses melalui perangkat mobile dengan sistem operasi Android. Karena sistem berbasis website berbeda dengan sistem berbasis mobile, untuk itu dibutuhkan sebuah perancangan sistem e-farmer yang berbasis mobile yang akan terintegrasi dengan sistem berbasis website. Di mana metode yang digunakan adalah metode Research and Development (R&D), yang mana mengembangkan sistem yang sudah ada dan hasil akhirnya menghasilkan sebuah produk berupa rancangan sistem aplikasi e-farmers yang dapat berkerja di platform Android.  E-farmers system is a technology-based commerce system (e-commerce) that can be accessed via a website, used for assisting farmers in selling rice product directly to consumers. However, due to the constraint in the ownership of computer and laptop, farmers and consumers as the users of the website ladangku.id now use mobile devices instead. For this reason, the researcher developed an e-farmers system that was initially only accessible via the website but now can be accessed via mobile devices with the Android operating system. Because the website-based system and mobile-based system are different, it is necessary to have a mobile-based e-farmer system design that is integrated with the website-based system. The method used was Research and Development (R&D) method by developing the existing system, and the final product was in the form of a design of e-farmer application system that can work on Android platform.


Android is one of the famous mobile operating system created by Google company. Advantages of the android operating system itself is to provide an open platform (open source) for developers to create their own millions of applications that will be used for a wide range of mobile devices (mobile devices). Needs of information technology is developing rapidly. Mobile even more Smartphone is one of the means used to obtain information more quickly and accurately, as well as being tools needed in various fields. Especially when you're enjoying a holiday somewhere and need information right away, of course it was very helpful in finding such information. While on vacation in a place we definitely want to taste the culinary place and it has become a lifestyle in today. That's what we call the culinary tour. Culinary tourism itself is an action done a lot of people in the field of dietary needs, for entertainment. Based on application compatibility testing Nyapek culinary tourism in the city of Bogor based on Android can run optimally and display interface on the phone with Minimal OS v5.0 (Lollipop) with a 5-inch screen


Author(s):  
Isaac Moses Kisembo ◽  
Gilbert Gilibrays Ocen ◽  
Ocident Bongomin ◽  
Andrew Egwar Alunyu ◽  
Ildephonse Nibikora ◽  
...  

The world is attesting a tremendous change today which is remarkably coined as industry 4.0. Several terminologies have developed as a result of the emergency of industry 4.0, notably is cybersecurity which entails the security of communication and network operations activities either on or offline and the measures taken to achieve such security. The most common form of communication by organizations and Business today is the electronic mails (Email), although email is a valuable tool, it also creates security challenges when not properly managed. There is a growing adoption of email as official form of communication in many organizations with majority of users on mobile android devices due to the popularity of the android operating systems and the proliferation of mobile devices. Banks, health care, educational institutions and many other service providers are communicating to their clients through email where sensitive and confidential information are shared. One major threat to email communication is lack of confidentiality for emails accessed via android mobile devices due to weaknesses of android operating system (OS) platform that presents possibilities to penetrate by hackers and android email client since it accepts a onetime login and password authentication which is only required again if the email account is deleted from the android mobile device. In this study, an algorithm was designed and implemented on an android application that allows an email sender to compose an email and set the time the email will stay in the receiver inbox before it automatically wipes off. Primary data was collected from email users using tightly structured questionnaires and respondents comprised of those with email technical background and those that are typical email users inorder to get their opinion on the lack of confidentiality on the android mobile email client, while secondary data from scholarly journals and articles informed the study design. The designed algorithm was tested and evaluated through expert opinion. The result of the study indicates that the designed algorithm addresses the confidentiality issues and threats on android email clients.


2021 ◽  
Vol 7 (6) ◽  
Author(s):  
Yu. Dmitrieva

This article discusses an application for mobile devices with the Android operating system that allows you to record the results of laboratory research of a synthetic chemist. An overview of the basic functionality of the Chemical Notes mobile application is presented.


Sign in / Sign up

Export Citation Format

Share Document