Reference architecture for android applications to support the detection of manipulated evidence

被引:0
|
作者
Pieterse H. [1 ]
Olivier M.S. [2 ]
Van Heerden R.P. [3 ]
机构
[1] Defence, Peace, Safety and Security, Council for Scientific and Industrial Research, Pretoria
[2] Department of Computer Science, University of Pretoria, Pretoria
[3] Meraka Institute, Council for Scientific and Industrial Research, Pretoria
关键词
Android; Digital forensics; Mobile forensics; Reference architecture; Smartphones; Timestamps;
D O I
10.23919/saiee.2016.8531545
中图分类号
学科分类号
摘要
Traces found on Android smartphones form a significant part of digital investigations. A key component of these traces is the date and time, often formed as timestamps. These timestamps allow the examiner to relate the traces found on Android smartphones to some real event that took place. This paper performs exploratory experiments that involve the manipulation of timestamps found in SQLite databases on Android smartphones. Based on observations, specific heuristics are identified that may allow for the identification of manipulated timestamps. To overcome the limitations of these heuristics, a new reference architecture for Android applications is also introduced. The reference architecture provides examiners with a better understanding of Android applications as well as the associated digital evidence. The results presented in the paper show that the suggested techniques to establish the authenticity and accuracy of digital evidence are feasible. © 2015 IEEE.
引用
收藏
页码:92 / 103
页数:11
相关论文
共 50 条
  • [21] A Reference Architecture for Healthcare Systems with Coded Terminology Support
    Bulcao-Neto, Renato F.
    Neto, Valdemar V. Graciano
    Macedo, Alessandra Alaniz
    2022 INTERMOUNTAIN ENGINEERING, TECHNOLOGY AND COMPUTING (IETC), 2022,
  • [22] A Structured Review and Evaluation of Android Mobile Applications for Yoga Support
    Sarkar, Sayantani
    Choi, Yong K.
    Kim, Katherine K.
    HEALTHCARE OF THE FUTURE 2022, 2022, 292 : 75 - 78
  • [23] The Dangers of Rooting: Data Leakage Detection in Android Applications
    Casati, Luca
    Visconti, Andrea
    MOBILE INFORMATION SYSTEMS, 2018, 2018
  • [24] Risk Analysis and Detection on Communication with Intents in Android Applications
    Yang T.-C.
    Cui H.-L.
    Niu S.-Z.
    Huang Z.-P.
    Niu, Shao-Zhang (szniu@bupt.edu.cn), 2017, Beijing Institute of Technology (37): : 625 - 630and636
  • [25] Multilevel Permission Extraction in Android Applications for Malware Detection
    Wang, Zhen
    Li, Kai
    Hu, Yan
    Fukuda, Akira
    Kong, Weiqiang
    PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 221 - 225
  • [26] ScanSavant: Malware Detection for Android Applications with Explainable AI
    Navaneethan, S.
    Udhaya Kumar, S.
    International Journal of Interactive Mobile Technologies, 2024, 18 (19) : 171 - 181
  • [27] Obfuscation detection in Android applications using deep learning
    Conti, Mauro
    Vinod, P.
    Vitella, Alessio
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
  • [28] Detection and Deterrence from Data Collecting Applications in Android
    Tiwari, Pradeep Kumar
    Velayutham, T.
    2016 FOURTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2016, : 326 - 331
  • [29] Explainable Machine Learning for Malware Detection on Android Applications
    Palma, Catarina
    Ferreira, Artur
    Figueiredo, Mario
    INFORMATION, 2024, 15 (01)
  • [30] Static Detection of Energy Defect Patterns in Android Applications
    Wu, Haowei
    Yang, Shengqian
    Rountev, Atanas
    PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON COMPILER CONSTRUCTION (CC 2016), 2016, : 185 - 195