Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.2.345

The Automatic Extraction System of Application Update Information in Android Smart Device  

Kim, Hyounghwan (Center for Information Security Technologies, Korea University)
Kim, Dohyun (Center for Information Security Technologies, Korea University)
Park, Jungheum (Center for Information Security Technologies, Korea University)
Lee, Sangjin (Center for Information Security Technologies, Korea University)
Abstract
As the utilization rate of smart device increases, various applications for smart device have been developed. Since these applications can contain important data related to user behaviors in digital forensic perspective, the analysis of them should be conducted in advance. However, lots of applications get to have new data format or type when they are updated. Therefore, whether the applications are updated or not should be checked one by one, and if they are, whether their data are changed should be also analyzed. But observing application data repeatedly is a time-consuming task, and that is why the effective method for dealing with this problem is needed. This paper suggests the automatic system which gets updated information and checks changed data by collecting application information.
Keywords
Digital Forensics; Smartphone Forensics; Android Forensics; Android Application; Android Data Acquisition;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Namheun Son, "A study of user data integrity during acquisition of Android devices," Digital Investigationm, vol. 10, pp, 3-11, Aug. 2013   DOI   ScienceOn
2 M.Guido, "Automated identification of installed malicious Android applicatons," vol. 10, Digital Investigation, pp. 96-104, Oct. 2013   DOI   ScienceOn
3 http://www.appbrain.com/stats/android-market-app-categories
4 Sohail Khan, "Analysis of Dalvik Virtual Machine and Class Path Library Constrained," Security Engineering Research Group, Institute of Management SciencesPeshawar, Pakistan, Nov. 2009
5 Timothy Vidas, "Toward a general collection methodology for Android devices," Digital Investigation, vol. 8, pp. 14-24, Aug. 2011   DOI   ScienceOn
6 Steve Mead, "Unique File Identification in the National Software Reference Library," Digital Investigation, vol. 8, no. 3, pp. 138-150, Sep. 2006
7 Ralf D. Brown, "Reconstructing corrupt DEFLATEd files," Digital Investigation, vol. 8, pp. 125-131. Aug. 2011   DOI   ScienceOn
8 Steve Mead, "Unique File Identification in the National Software Reference Library," Digital Investigation, vol. 3, No. 3, pp. 138-150, Sep. 2006   DOI   ScienceOn
9 Jungheum Park and Hyunji Chung, Sangjin Lee, "Forensic analysis techniques for fragmented flash memory pages in smartphones," Digital Investigation, vol. 9, No. 2, pp. 109-118, Nov. 2012   DOI   ScienceOn