Impact of Android Phone Rooting on User Data Integrity in Mobile Forensics

Abstract

Modern cellular phones are potent computing de-vices, and their capabilities are constantly progressing. The Android operating system (OS) is widely used, and the number of accessible apps for Android OS phones is unprecedented. The increasing capabilities of these phones imply that they have distinctive software, memory designs, and storage mechanisms. Furthermore, they are increasingly being used to commit crimes at an alarming rate. This aspect has heightened the need for digital mobile forensics. Because of the rich user data they store, they may be relevant in forensic investigations, and the data must be extracted. However, as this study will show, most of the available tools for mobile forensics rely greatly on rooted (Android) devices to extract data. Rooting, as some of the selected papers in this research will show, poses a key challenge for forensic analysts: user data integrity. Rooting per se, as will be seen, is disadvantageous. It is possible for forensic analysts to extract useful data from Android phones via rooting, but the user data integrity during data acquisition from Android devices is a prime concern. In suggesting an alternative rooting technique for data acquisition from an Android handset, this paper determines whether rooting is forensically sound. This is particularly due to the device’s modification, which a root often requires, that may violate the data integrity.

Authors and Affiliations

Tahani Almehmadi, Omar Batarfi

Keywords

Related Articles

Role of Requirements Elicitation & Prioritization to Optimize Quality in Scrum Agile Development

One of most common aspect with traditional software development is managing requirements. As requirements emerge throughout the software development process and thus are needed to be addressed through proper communicatio...

Web Unique Method (WUM): An Open Source Blackbox Scanner for Detecting Web Vulnerabilities

The internet has provided a vast range of benefits to society, and empowering people in a variety of ways. Due to incredible growth of Internet usage in past 2 decades, everyday a number of new Web applications are also...

Dynamic Inertia Weight Particle Swarm Optimization for Solving Nonogram Puzzles

Particle swarm optimization (PSO) has shown to be a robust and efficient optimization algorithm therefore PSO has received increased attention in many research fields. This paper demonstrates the feasibility of applying...

A Hybrid Curvelet Transform and Genetic Algorithm for Image Steganography

In this paper, we present a new hybrid image steganography algorithm by combining two famous techniques which are curvelet transform and genetic algorithm GA. The proposed algorithm is called Hybrid Curvelet Transform an...

Some Modification in ID-Based Public key Cryptosystem using IFP and DDLP

In 1984, Shamir [1] introduced the concept of an identity-based cryptosystem. In this system, each user needs to visit a key authentication center (KAC) and identify him self before joining a communication network. Once...

Download PDF file
  • EP ID EP429251
  • DOI 10.14569/IJACSA.2018.091279
  • Views 94
  • Downloads 0

How To Cite

Tahani Almehmadi, Omar Batarfi (2018). Impact of Android Phone Rooting on User Data Integrity in Mobile Forensics. International Journal of Advanced Computer Science & Applications, 9(12), 561-566. https://europub.co.uk./articles/-A-429251