Recovering Data from Password Protected Data Security Applications in Android Based Smartphones
The standard method of mobile forensic analysis is to attach the mobile device to forensic tools and to perform logical, file system, or physical extraction. A hindrance in analysis arises if the mobile is not properly supported or data in the handset is secured using data security android applicati...
Main Author: | |
---|---|
Format: | Article |
Language: | Arabic |
Published: |
Naif University Publishing House
2016-06-01
|
Series: | Arab Journal of Forensic Sciences & Forensic Medicine |
Subjects: | |
Online Access: | https://journals.nauss.edu.sa/index.php/AJFSFM/article/view/98 |
_version_ | 1827320072291483648 |
---|---|
author | Hammad Riaz |
author_facet | Hammad Riaz |
author_sort | Hammad Riaz |
collection | DOAJ |
description | The standard method of mobile forensic analysis is to attach the mobile device to forensic tools and to perform logical, file system, or physical extraction. A hindrance in analysis arises if the mobile is not properly supported or data in the handset is secured using data security android applications. The techniques discussed in this paper help in the analysis and extraction of data files secured using data hiding password protected android based applications. A few well known data protection android applications are analyzed. The analysis was performed on both partially supported and fully supported sets. |
first_indexed | 2024-04-25T00:39:04Z |
format | Article |
id | doaj.art-da2691a085244e8c8c28d054a53477f5 |
institution | Directory Open Access Journal |
issn | 1658-6786 1658-6794 |
language | Arabic |
last_indexed | 2024-04-25T00:39:04Z |
publishDate | 2016-06-01 |
publisher | Naif University Publishing House |
record_format | Article |
series | Arab Journal of Forensic Sciences & Forensic Medicine |
spelling | doaj.art-da2691a085244e8c8c28d054a53477f52024-03-12T12:28:14ZaraNaif University Publishing HouseArab Journal of Forensic Sciences & Forensic Medicine1658-67861658-67942016-06-011310.12816/00264638Recovering Data from Password Protected Data Security Applications in Android Based SmartphonesHammad Riaz0Punjab Forensic Science Agency, Government of the Punjab, LahoreThe standard method of mobile forensic analysis is to attach the mobile device to forensic tools and to perform logical, file system, or physical extraction. A hindrance in analysis arises if the mobile is not properly supported or data in the handset is secured using data security android applications. The techniques discussed in this paper help in the analysis and extraction of data files secured using data hiding password protected android based applications. A few well known data protection android applications are analyzed. The analysis was performed on both partially supported and fully supported sets.https://journals.nauss.edu.sa/index.php/AJFSFM/article/view/98mobile forensicsdata security applicationspassword protected android applicationsdata hidinginformation security |
spellingShingle | Hammad Riaz Recovering Data from Password Protected Data Security Applications in Android Based Smartphones Arab Journal of Forensic Sciences & Forensic Medicine mobile forensics data security applications password protected android applications data hiding information security |
title | Recovering Data from Password Protected Data Security Applications in Android Based Smartphones |
title_full | Recovering Data from Password Protected Data Security Applications in Android Based Smartphones |
title_fullStr | Recovering Data from Password Protected Data Security Applications in Android Based Smartphones |
title_full_unstemmed | Recovering Data from Password Protected Data Security Applications in Android Based Smartphones |
title_short | Recovering Data from Password Protected Data Security Applications in Android Based Smartphones |
title_sort | recovering data from password protected data security applications in android based smartphones |
topic | mobile forensics data security applications password protected android applications data hiding information security |
url | https://journals.nauss.edu.sa/index.php/AJFSFM/article/view/98 |
work_keys_str_mv | AT hammadriaz recoveringdatafrompasswordprotecteddatasecurityapplicationsinandroidbasedsmartphones |