MERAL Myanmar Education Research and Learning Portal
Item
{"_buckets": {"deposit": "fa847931-9d4f-4ae9-bb4a-39918d4dd446"}, "_deposit": {"id": "4606", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4606"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4606", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Comparative Analysis of Android Mobile Forensics Tools", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "This paper performs a comparative analysis ofAndroid mobile forensics tools which are used foracquisition and analyzing of Android mobile devices.The major challenges of Android forensicsinvestigation are manufacturing of Android deviceswith various operating system versions and there isno single tool which can be used for all sorts ofAndroid devices. Aiming to overcome thesechallenges and increase more accuracy and integrityin Android forensic investigation, we madecomparative analysis on both open source tools andone commercial tool. Logical and physicalacquisition methods were utilized to acquire datafrom Android devices. Android Debug Bridge backup,Linux Data Duplicator utility tool, Magnet Acquireand Belkasoft Acquisition tools were used foracquisition. Two popular analyzing tools such asAutopsy and Belkasoft Evidence Center were utilizedto analyze acquired data. The results show that usingmultiple tools can get more accuracy and integrity ofartifacts which is forensically sound."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value_mlt": [{"interim": "android forensics"}, {"interim": "logical acquisition"}, {"interim": "physical acquisition"}, {"interim": "forensics investigation"}]}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2020-03-17"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "Comparative Analysis of Android Mobile Forensics Tools.pdf", "filesize": [{"value": "214 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 214000.0, "url": {"url": "https://meral.edu.mm/record/4606/files/Comparative Analysis of Android Mobile Forensics Tools.pdf"}, "version_id": "82823376-bca7-499e-8efc-66062af1e41e"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Lwin, Htar Htar"}, {"subitem_authors_fullname": "Aung, Wai Phyo"}, {"subitem_authors_fullname": "Lin, Kyaw Kyaw"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2020-02-28"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "978-1-7281-5925-6"}, "item_title": "Comparative Analysis of Android Mobile Forensics Tools", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004606", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2020-03-17"}, "publish_date": "2020-03-17", "publish_status": "0", "recid": "4606", "relation": {}, "relation_version_is_last": true, "title": ["Comparative Analysis of Android Mobile Forensics Tools"], "weko_shared_id": -1}
Comparative Analysis of Android Mobile Forensics Tools
http://hdl.handle.net/20.500.12678/0000004606
http://hdl.handle.net/20.500.12678/0000004606666a4f1a-e4f4-4dbd-b882-2707ebab15ef
fa847931-9d4f-4ae9-bb4a-39918d4dd446
Name / File | License | Actions |
---|---|---|
Comparative Analysis of Android Mobile Forensics Tools.pdf (214 Kb)
|
|
Publication type | ||||||
---|---|---|---|---|---|---|
Article | ||||||
Upload type | ||||||
Publication | ||||||
Title | ||||||
Title | Comparative Analysis of Android Mobile Forensics Tools | |||||
Language | en | |||||
Publication date | 2020-02-28 | |||||
Authors | ||||||
Lwin, Htar Htar | ||||||
Aung, Wai Phyo | ||||||
Lin, Kyaw Kyaw | ||||||
Description | ||||||
This paper performs a comparative analysis ofAndroid mobile forensics tools which are used foracquisition and analyzing of Android mobile devices.The major challenges of Android forensicsinvestigation are manufacturing of Android deviceswith various operating system versions and there isno single tool which can be used for all sorts ofAndroid devices. Aiming to overcome thesechallenges and increase more accuracy and integrityin Android forensic investigation, we madecomparative analysis on both open source tools andone commercial tool. Logical and physicalacquisition methods were utilized to acquire datafrom Android devices. Android Debug Bridge backup,Linux Data Duplicator utility tool, Magnet Acquireand Belkasoft Acquisition tools were used foracquisition. Two popular analyzing tools such asAutopsy and Belkasoft Evidence Center were utilizedto analyze acquired data. The results show that usingmultiple tools can get more accuracy and integrity ofartifacts which is forensically sound. | ||||||
Keywords | ||||||
android forensics, logical acquisition, physical acquisition, forensics investigation | ||||||
Identifier | 978-1-7281-5925-6 | |||||
Journal articles | ||||||
Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020) | ||||||
Conference papers | ||||||
Books/reports/chapters | ||||||
Thesis/dissertations |