Hex Symbols Algorithm for Anti-Forensic Artifacts on Android Devices
نویسندگان
چکیده
منابع مشابه
Forensic Analysis of Instant Messenger Applications on Android Devices
The modern day Smartphone’s have built in apps like “WhatsApp & Viber” which allow users to exchange instant messages, share videos, audio’s and images via Smartphone’s instead of relying on their desktop Computers or laptop thereby increasing the portability and convenience for a layman smart phone user. An Instant Messenger (IM) can serve as a very useful yet very dangerous platform for the v...
متن کاملA Survey on Mobile Forensic for Android Smartphones
Mobile forensic is fast becoming an abbreviated term that describes the process of applying digital forensics in mobile phones world. The rapid development in mobile phones industry has led to the emergence of the so-called smart phones which have become nearly the same as computers. Android Smartphones refer to all types of smartphones that use Android operating system. This paper aims to surv...
متن کاملApplying Behavioral Detection on Android-Based Devices
We present Andromaly a behavioral-based detection framework for Android-powered mobile devices. The proposed framework realizes a Host-based Intrusion Detection System (HIDS) that continuously monitors various features and events obtained from the mobile device, and then applies Machine Learning methods to classify the collected data as normal (benign) or abnormal (malicious). Since no maliciou...
متن کاملOn Reliability of Android Wearable Health Devices
Wearable devices are increasingly being used for monitoring health signals and for fitness purposes with typical uses being calorie tracker, workout assistant, and step counter. Even though these wearables can measure many health signals (e.g. heart rate), they are still not perceived as highly accurate, relative to clinical monitoring devices. In this paper, we investigate the accuracy of hear...
متن کاملPoster: Design of Backdoor on Android Devices
This paper presents a practical design of backdoor to permanently bypass the screen lock mechanisms (e.g., 4-digit PIN) on Android devices. 1. Our goal and assumptions We aim to give insights in designing backdoor that can be used to provide persistent access to a victim’s Android device by compromising the secret for user authentication while effectively hiding its presence from the victim. We...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Computer Science and Applications
سال: 2016
ISSN: 2156-5570,2158-107X
DOI: 10.14569/ijacsa.2016.070427