dc.contributor.author |
Tun, Aye Thida |
|
dc.contributor.author |
Man, Ciin Zam |
|
dc.contributor.author |
Zin, Ei Cho |
|
dc.contributor.author |
Khaing, Ei Ei Kay |
|
dc.contributor.author |
Soe, Zun Myat Myat |
|
dc.contributor.author |
Thwin, Mie Mie Su |
|
dc.date.accessioned |
2022-06-21T06:28:33Z |
|
dc.date.available |
2022-06-21T06:28:33Z |
|
dc.date.issued |
2021-02-25 |
|
dc.identifier.uri |
https://onlineresource.ucsy.edu.mm/handle/123456789/2664 |
|
dc.description.abstract |
Today, the smartphone market is growing rapidly and then it is essential in daily life. The smartphone is the most useful device in the world. Most of the people use it instead of a laptop for their daily work and to store personal data and information. This paper is intended to know how to get root access in non-rooting device. The interesting point in this paper is how to acquire data using dd command. In this paper, evidence data from external sdcard are analysed using autopsy tools. This tools extract contacts, image, and song and so on. This paper is presented in three main sections. These sections are (1) background theory, (2) data acquisition from device (3) analysing data using autopsy. The second section is subdivided into two parts such as rooting and physical acquisition. |
en_US |
dc.language.iso |
en_US |
en_US |
dc.publisher |
ICCA |
en_US |
dc.subject |
android forensics, physical acquisition, Android Debug Bridge (ADB) |
en_US |
dc.title |
Collection of Evidence Data with Physical Acquisition of Root Access of an Android Samsung J7 Prime and Analysing on Open Source Tool Autopsy 4.15.0 |
en_US |
dc.type |
Article |
en_US |