Atenção: Todas as denúncias são sigilosas e sua identidade será preservada.
Os campos nome e e-mail são de preenchimento opcional
Metadados | Descrição | Idioma |
---|---|---|
Autor(es): dc.creator | Simão, André Morum de Lima | - |
Autor(es): dc.creator | Sícoli, Fábio Caús | - |
Autor(es): dc.creator | Melo, Laerte Peotta de | - |
Autor(es): dc.creator | Deus, Flávio Elias Gomes de | - |
Autor(es): dc.creator | Sousa Júnior, Rafael Timóteo de | - |
Data de aceite: dc.date.accessioned | 2024-10-23T15:05:00Z | - |
Data de disponibilização: dc.date.available | 2024-10-23T15:05:00Z | - |
Data de envio: dc.date.issued | 2012-07-03 | - |
Data de envio: dc.date.issued | 2012-07-03 | - |
Data de envio: dc.date.issued | 2011 | - |
Fonte completa do material: dc.identifier | http://repositorio.unb.br/handle/10482/10860 | - |
Fonte completa do material: dc.identifier | https://dx.doi.org/10.5769/J201101002 | - |
Fonte: dc.identifier.uri | http://educapes.capes.gov.br/handle/capes/873825 | - |
Descrição: dc.description | From an expert's standpoint, an Android phone is a large data repositorythat can be stored either locally or remotely. Besides, its platform allows analysts toacquire device data and evidence, collecting information about its owner and facts underinvestigation. This way, by means of exploring and cross referencing that rich data source,one can get information related to unlawful acts and its perpetrator. There are widespreadand well documented approaches to forensic examining mobile devices and computers.Nevertheless, they are neither specific nor detailed enough to be conducted on Androidcell phones. These approaches are not totally adequate to examine modern smartphones,since these devices have internal memories whose removal or mirroring procedures areconsidered invasive and complex, due to difficulties in having direct hardware access. Theexam and analysis are not supported by forensic tools when having to deal with specific filesystems, such as YAFFS2 (Yet Another Flash File System). Furthermore, specific featuresof each smartphone platform have to be considered prior to acquiring and analyzing itsdata. In order to deal with those challenges, this paper proposes a method to perform dataacquisition and analysis of Android smartphones, regardless of version and manufacturer.The proposed approach takes into account existing techniques of computer and cellphone forensic examination, adapting them to specific Android characteristics, its datastorage structure, popular applications and the conditions under which the device wassent to the forensic examiner. The method was defined in a broad manner, not namingspecific tools or techniques. Then, it was deployed into the examination of six Androidsmartphones, which addressed different scenarios that an analyst might face, and wasvalidated to perform an entire evidence acquisition and analysis. | - |
Formato: dc.format | application/pdf | - |
Direitos: dc.rights | Acesso Aberto | - |
Direitos: dc.rights | Disponível sob Licença Creative Commons 3.0, que permite copiar, distribuir e transmitir o trabalho, desde que seja citado o autor e licenciante. Não permite o uso para fins comerciais nem a adaptação desta. | - |
Palavras-chave: dc.subject | Sistemas de comunicação sem fio | - |
Palavras-chave: dc.subject | Telefonia celular - dispositivos | - |
Palavras-chave: dc.subject | Computação forense | - |
Título: dc.title | Acquisition and Analysis of Digital Evidencein Android Smartphones | - |
Tipo de arquivo: dc.type | livro digital | - |
Aparece nas coleções: | Repositório Institucional – UNB |
O Portal eduCAPES é oferecido ao usuário, condicionado à aceitação dos termos, condições e avisos contidos aqui e sem modificações. A CAPES poderá modificar o conteúdo ou formato deste site ou acabar com a sua operação ou suas ferramentas a seu critério único e sem aviso prévio. Ao acessar este portal, você, usuário pessoa física ou jurídica, se declara compreender e aceitar as condições aqui estabelecidas, da seguinte forma: