publication . Conference object . 2018

A forensic investigation of Android mobile applications

John, Kontos; Grammati, Pantziou; Stefanos, Gritzalis; Christos, Douligeris; Kitsaki, Theodoula-Ioanna; Angelogianni, Anna; Ntantogian, Christoforos; Xenakis, Christos;
Open Access English
  • Published: 30 Nov 2018
  • Publisher: ACM
This paper performs a forensic investigation to a set of Android mobile applications aiming at discovering sensitive information related to the owner of the mobile device. These applications were chosen based on the fact that: i) they are very popular on Google Play Store, ii) they handle sensitive personal information, iii) they have not been researched by previous works and iv) they are free to download and install. The three chosen applications belong to the following categories: bank, mobile network carrier and public transport. The evaluation of the security of the applications was performed using two techniques: code and disk analysis, as followed in the l...
Persistent Identifiers
free text keywords: Forensics, Android, Mobile applications, Privacy., Multimedia, computer.software_genre, computer, Public transport, business.industry, business, Cellular network, Mobile device, Computer science, Personally identifiable information, Information sensitivity, Download, Android (operating system)
Funded by
EC| FutureTPM
Future Proofing the Connected World: A Quantum-Resistant Trusted Platform Module
  • Funder: European Commission (EC)
  • Project Code: 779391
  • Funding stream: H2020 | RIA
Validated by funder
EC| SealedGRID
Scalable, trustEd, and interoperAble pLatform for sEcureD smart GRID
  • Funder: European Commission (EC)
  • Project Code: 777996
  • Funding stream: H2020 | MSCA-RISE
Any information missing or wrong?Report an Issue