Browse > Article
http://dx.doi.org/10.9708/jksci/2012.17.11.101

Android Log Cat Systems Research for Privacy  

Jang, Hae-Sook (Dept. of Computer and Information Engineering, Kunsan National University)
Abstract
Various social problems through violating personal information and privacy are growing with the rapid spread of smartphones. For this reason, variety of researches and technology developments to protect personal information being made. The smartphone, contains almost all of the personal information, can cause data spill at any time. Collecting or analyzing evidence is not an easy job with forensic analyzing tool. Android forensics research has been focused on techniques to collect and analyze data from non-volatile memory but research for volatile data is very slight. Android log is the non-volatile data that can be collected by volatile storage. It is enough to use as a material to track the usage of the Android phone because all of the recent driven records from system to application are stored. In this paper, we propose a method to respond to determining the existence of personal information leakage by filtering logs without forensic analysis tools.
Keywords
android; computer forensic; logcat;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Lee Gyu An, Park Dae Woo, ShinYongtae, "a forensic investigation to secure the integrity of the data link management methods in the field," Journal of the Korea Society of Computer and Information, 2006
2 Prosecutor's Office, "maintaining the integrity of digital evidence procedures and facilities for the study," Prosecutor's Office, if Personal Web Media
3 Takhuiseong two, "Digital Forensic Research Workshop jeonge report, if 46 to 48
4 Luoma. V., Forensics and electronic discovery: The new management challenge, Computer & Security, 25(2), 91-96, 2006   DOI   ScienceOn
5 ParkDaeWoo, SeoJeongMan. "TCP / IP securitymethods for attacks," Journal of the Korea Society of Computer and Information Science,Volume10, Issue5,pp217-226,2005.11.30
6 Park Dae woo, Im Seung Rin. "Hacker attacks prevention systemfor the intelligent study of linkage", the Korea Society of Computer and Information, Volume 11, Issue 2, pp44-50, 2006.5.31.
7 Park Hyoung Bae, Korea Wireless Internet Standardization Forum ", TTA Journal No.121, 2009.
8 KimKi-young, gangdongho, "openmobile environment in the smartphone security technology," Information Security Issue Volume 19, Issue 5, page (s): 10-104, 2009
9 ParkKiHong, JangHaesook. "Mobile Forensics Android Log Cat filtering for research," Proceedings of the Summer Conference of the Korea Society of Computer and Information.2012 pp217-219
10 ChoJongKeun, HaSangEun, "Effective Scheme for File Search Engine inMobile Environments", The Korea Contents Society, Vol.8 No.11, pp41-48, 2008   DOI