Android Memory Analysis and Acquisition
Android Memory Analysis and Acquisition
After investigation different themes, The Theme Human view deals with
categories and code found out. These the forensic investigators ability and interest
themes, categories and code purely to work with particular tool and technique.
dependent on data previously gathered. How much comfortable an investigator feels
during the utilization of forensic analysis
Themes Category Code
tools and techniques. In “Human view”
Capability Recovery,
theme two categories established
Technical Fault tolerant,
view accessibility “Investigation time” and “inter-related
Standardizatio Mobile skills”. Furthermore “investigation time”
contain codes that explain the time required more than one factors to consider for choice.
by tools and techniques to fulfill particular Result indicated that various factors come
operation of an investigator. The code into consideration when its need to decide
“inter-related skills” elaborate skills needed about forensic analysis tools and techniques
by an investigator to successfully perform [9], [14]; Investigator should take into
desired forensic operation. After data account technical, human and domain view
observation it elaborate it always a before choosing particular technique or tool.
preference for forensic investigator to done These findings are similar to Rao & S.
its task in an efficient manner. Forensic (2016) [7]. These all aspects are important.
investigators also preferred tools that These tools and techniques might recovered
demands little inter-related skills from data but there are also other aspects to
investigator side and performing most of the consider. This study contributes clearly, how
task by automated way [7]. tools and techniques can play a vital role in
forensic investigation. It will help to
The theme “Domain view” consider
understand how suitable techniques and
different aspects of particular domain. It
tools can be considered. Study strongly
shows the external entities that may
recommended the need for establishment of
influence mobile phone forensic
standardized way to perform android
investigation. It comprise of two categories
forensic analysis and acquisition. These
“Legitimate Factor” and “Market”. Category
results are also supported by Dian & Hudec
“Legitimate Factor” explain different
(2019), Tayeb & varol [11], [12];
aspects of law. Category “Market” draws
from literature where it points out how VI. DELIMITATIONS AND
innovation in mobile phones can affect the LIMITATIONS
procedure of forensic analysis. As observed
Qualitative approach has been
various investigator feels little awkwardness
choose for this research. Proposed research
when they need to carve themselves
put focus on depth of memory analysis and
according to the rules and regulations law
acquisition. This study is constrained by
apposing on them. Also diversity demand
amount of data gathered due to pandemic
from them to be an active learner to keep up
issue. It didn’t included all existing material
with this field. It’s also a concern how
available about forensic memory analysis
different mobile manufacturers switching
and acquisition.
towards a cloud perspective [11], [12].
VII. FUTURE WORK
V. DISCUSSION
Future studies should take into
There are too many tools and
account various ways of data gathering and
techniques available in market for android
an exhaustive study should be conducted on
forensic analysis but it always a confusion
this topic. It will help to understand hidden
which technique will works best. The
aspects of memory analysis and acquisition.
research question established was how
forensic tools and techniques play role in VIII. REFERENCES
gathering forensic data & why some forensic
tools preferred over others. There are always [1]"Smartphone users by country 2019 |
Statista", Statista, 2020.
[2]"How Many People Have Smartphones in [10]N. L. Htun, M. M. S. Thwin, and C. C.
2020 | Oberlo", Oberlo, 2020. San, “Evidence Data Collection with
ANDROSICS Tool for Android Forensics,”
[3] A. Nisioti, A. Mylonas, V. Katos, P. D.
2018 10th International Conference on
Yoo, and A. Chryssanthou, “You can run
Information Technology and Electrical
but you cannot hide from memory:
Engineering (ICITEE), 2018.
Extracting IM evidence of Android apps,”
2017 IEEE Symposium on Computers and [11] F. Dian and J. Hudec, “Efficient
Communications (ISCC), 2017. Sensitive Data Gathering with Forensic
Analysis of Android Operating System,”
[4]L. Tung, "Bigger than Windows, bigger
2019 17th International Conference on
than iOS: Google now has 2.5 billion active
Emerging eLearning Technologies and
Android devices | ZDNet", ZDNet, 2020.
Applications (ICETA), 2019.
[5] N. A. Barghouthy and A. Marrington, “A
[12] H. F. Tayeb and C. Varol, “Android
Comparison of Forensic Acquisition
Mobile Device Forensics: A Review,” 2019
Techniques for Android Devices: A Case
7th International Symposium on Digital
Study Investigation of Orweb Browsing
Forensics and Security (ISDFS), 2019.
Sessions,” 2014 6th International
Conference on New Technologies, Mobility [13]H. H. Lwin, W. P. Aung, and K. K. Lin,
and Security (NTMS), 2014. “Comparative Analysis of Android Mobile
Forensics Tools,” 2020 IEEE Conference on
[6]P. Wachter and M. Gruhn, “Practicability
Computer Applications (ICCA), 2020.
study of android volatile memory forensic
research,” 2015 IEEE International [14] “Non-probability sampling: Lærd
Workshop on Information Forensics and Dissertation,” Non-probability sampling |
Security (WIFS), 2015. Lærd Dissertation. [Online]. Available:
http://dissertation.laerd.com/non-
[7]V. Rao and A. S., "Survey on Android
probability-sampling.php. [Accessed: 27-
Forensic Tools and Methodologies",
Jun-2020].
International Journal of Computer
Applications, vol. 154, no. 8, pp. 17-21, [15]J. Brannen, “Mixing Methods: The
2016. Available: 10.5120/ijca2016912182. Entry of Qualitative and Quantitative
Approaches into the Research Process,”
[8]N. Varol, A. F. Aydogan, and A. Varol,
International Journal of Social Research
“Cyber attacks targeting Android
Methodology, vol. 8, no. 3, pp. 173–184,
cellphones,” 2017 5th International
2005.
Symposium on Digital Forensic and
Security (ISDFS), 2017. [16]L. S. Nowell, J. M. Norris, D. E. White,
and N. J. Moules, “Thematic Analysis,”
[9] S. C. Sathe and N. M. Dongre, “Data
International Journal of Qualitative
acquisition techniques in mobile forensics,”
Methods, vol. 16, no. 1, p.
2018 2nd International Conference on
160940691773384, 2017.
Inventive Systems and Control (ICISC),
2018. [17]D. Peters, "Qualitative Methods in
Monitoring and Evaluation: Ethical
Considerations in Qualitative Research",
American University Online, 2020.