Tehničko veleučilište u Zagrebu · Zagreb

How To Do a Forensic Analysis of Android 11 Artifacts

izvorni znanstveni rad

izvorni znanstveni rad

How To Do a Forensic Analysis of Android 11 Artifacts

Vrsta prilog sa skupa (u zborniku)
Tip izvorni znanstveni rad
Godina 2022
Nadređena publikacija MIPRO 2022 : 45th Jubilee International Convention : Proceedings
Volumen I
Svesčić 45
Stranice str. 1190-1195
ISSN 1847-3946
Status objavljeno

Sažetak

This paper compares the results obtained using several forensic tools on various Android 11 operating system devices. New and old functionalities of Andriod 11 store a vast volume of raw data and important forensic artifacts on mobile devices. The amount and type of data found on mobile devices demand further development of mobile forensics procedures. This development should be based on the streamlined procedures for the existing forensic to obtain more useful forensic artifacts. This means not using only one forensic tool, but combining results from multiple forensic tools in the analysis phase, after the data acquisition from Android 11 devices. The used forensic tools are Belkasoft Evidence Center X, Autopsy, and ALEAPP, with results presented and compared. The collected digital evidence shows the combined results are more substantial than the sum of particular ones

Ključne riječi

mobile forensics, Android 11, forensic tools