UCSY's Research Repository

Comparative Analysis of Android Mobile Forensics Tools

Show simple item record

dc.contributor.author Lwin, Htar Htar
dc.contributor.author Aung, Wai Phyo
dc.contributor.author Lin, Kyaw Kyaw
dc.date.accessioned 2020-03-17T12:27:56Z
dc.date.available 2020-03-17T12:27:56Z
dc.date.issued 2020-02-28
dc.identifier.isbn 978-1-7281-5925-6
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/2524
dc.description.abstract This paper performs a comparative analysis of Android mobile forensics tools which are used for acquisition and analyzing of Android mobile devices. The major challenges of Android forensics investigation are manufacturing of Android devices with various operating system versions and there is no single tool which can be used for all sorts of Android devices. Aiming to overcome these challenges and increase more accuracy and integrity in Android forensic investigation, we made comparative analysis on both open source tools and one commercial tool. Logical and physical acquisition methods were utilized to acquire data from Android devices. Android Debug Bridge backup, Linux Data Duplicator utility tool, Magnet Acquire and Belkasoft Acquisition tools were used for acquisition. Two popular analyzing tools such as Autopsy and Belkasoft Evidence Center were utilized to analyze acquired data. The results show that using multiple tools can get more accuracy and integrity of artifacts which is forensically sound. en_US
dc.language.iso en en_US
dc.publisher Proceedings of the Eighteenth International Conference On Computer Applications (ICCA 2020) en_US
dc.subject android forensics en_US
dc.subject logical acquisition en_US
dc.subject physical acquisition en_US
dc.subject forensics investigation en_US
dc.title Comparative Analysis of Android Mobile Forensics Tools en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository



Browse

My Account

Statistics