13
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Recovering Data from Password Protected Data Security Applications in Android Based Smartphones

      Read this article at

      ScienceOpenPublisherDOAJ
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The standard method of mobile forensic analysis is to attach the mobile device to forensic tools and to perform logical, file system, or physical extraction. A hindrance in analysis arises if the mobile is not properly supported or data in the handset is secured using data security android applications. The techniques discussed in this paper help in the analysis and extraction of data files secured using data hiding password protected android based applications. A few well known data protection android applications are analyzed. The analysis was performed on both partially supported and fully supported sets.

          Related collections

          Author and article information

          Journal
          Arab Journal of Forensic Sciences & Forensic Medicine
          Naif University Publishing House
          01 June 2016
          : 1
          : 3
          Affiliations
          [1 ] Punjab Forensic Science Agency, Government of the Punjab, Lahore
          Article
          da2691a085244e8c8c28d054a53477f5
          a829e552-6b01-42c7-91f9-05816afbb905

          This work is licensed under Attribution-NonCommercial-NoDerivatives 4.0 International license. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-nd/4.0/

          History
          Categories
          Medicine (General)
          R5-920

          Entomology,Pathology,Forensic science,Criminology,Dentistry,Anthropology
          Mobile Forensics, Data Security Applications, Password Protected Android Applications, Data Hiding, Information Security

          Comments

          Comment on this article