A computational forensic framework for detection of hidden applications on android

Smartphones, since their emergence has become a significant part of our lives and Android is popular of all. They are successful due to the increasing availability of user applications to answer every possible need, so it is of great importance to ensure security and privacy when handling personal a...

Full description

Saved in:
Bibliographic Details
Main Authors: Rasul, Tahira (Author), Latif, Rabia (Author), Mohd Jamail, Nor Shahida (Author)
Format: EJournal Article
Published: Institute of Advanced Engineering and Science, 2020-10-01.
Subjects:
Online Access:Get fulltext
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02778 am a22003133u 4500
001 ijeecs22465_14221
042 |a dc 
100 1 0 |a Rasul, Tahira  |e author 
100 1 0 |e contributor 
700 1 0 |a Latif, Rabia  |e author 
700 1 0 |a Mohd Jamail, Nor Shahida  |e author 
245 0 0 |a A computational forensic framework for detection of hidden applications on android 
260 |b Institute of Advanced Engineering and Science,   |c 2020-10-01. 
500 |a https://ijeecs.iaescore.com/index.php/IJEECS/article/view/22465 
520 |a Smartphones, since their emergence has become a significant part of our lives and Android is popular of all. They are successful due to the increasing availability of user applications to answer every possible need, so it is of great importance to ensure security and privacy when handling personal and sensitive information of the user. To secure the data on mobile devices, users use applications available on the Google Play store, which help to hide data on their devices known as Hidden Applications. Hidden applications are categorized as one of the major applications used for data hiding and storing. These applications can be used to hide date from snooping, intrusion and against the data theft. Therefore, the proposed framework in this research helps to find either they store and hide data in efficient manner or not and if they do so either it is encrypted or not. In this paper, main objective is to identify the privacy threats which end users face by using such applications, analyse these application's behaviour, working, their code to understand how data is hidden and if the information is encrypted, it can be retrieved or not. The work not only focuses on the identification of hidden data/apps; it also provides a mechanism to recover and reconstruct the data from these hidden parts of the memory. In the end, present the results obtained by using the proposed framework in a case file so that it can be used in a criminal court case. 
540 |a Copyright (c) 2020 Institute of Advanced Engineering and Science 
540 |a http://creativecommons.org/licenses/by-nc/4.0 
546 |a eng 
690
690 |a Android; Data hiding; Forensic investigation; Physical and logical; Rooted and non-rooted 
655 7 |a info:eu-repo/semantics/article  |2 local 
655 7 |a info:eu-repo/semantics/publishedVersion  |2 local 
655 7 |2 local 
786 0 |n Indonesian Journal of Electrical Engineering and Computer Science; Vol 20, No 1: October 2020; 353-360 
786 0 |n 2502-4760 
786 0 |n 2502-4752 
786 0 |n 10.11591/ijeecs.v20.i1 
787 0 |n https://ijeecs.iaescore.com/index.php/IJEECS/article/view/22465/14221 
856 4 1 |u https://ijeecs.iaescore.com/index.php/IJEECS/article/view/22465/14221  |z Get fulltext