A Novel Anti-forensics Technique for the Android OS, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications, pp.380-385, 2011. ,
DOI : 10.1109/BWCCA.2011.62
A kernel level VFS logger for building efficient filesystem intrusion detection systems, Proceedings of the Second International Conference on Computer and Network Technology, pp.273-279, 2010. ,
Novel antiforensics approaches for smartphones, Proceedings of the Forty-Fifth Hawaii International Conference on System Science, pp.5424-5431, 2012. ,
An efficient technique for enhancing the forensic capabilities of the Ext2 filesystem, Digital Investigation, pp.55-61, 2007. ,
Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices, 2011 IEEE Symposium on Security and Privacy, pp.96-111, 2011. ,
DOI : 10.1109/SP.2011.29
Design and implementation of Zeitline: A forensic timeline editor, Proceedings of the Fifth Digital Forensic Research Workshop, 2005. ,
An event-based digital forensic investigation framework, Proceedings of the Fourth Digital Forensic Research Workshop, 2004. ,
Filesystem intrusion detection by preserving MAC DTS: A loadable kernel module based approach for Linux kernel 2.6.x, Proceedings of the Fifth Annual Workshop on Cyber Security and Information Intelligence Research, p.57, 2009. ,
Android anti-forensics through a local paradigm, Digital Investigation, pp.83-94, 2010. ,
DOI : 10.1016/j.diin.2010.05.011
Algorithms and data structures for flash memories, ACM Computing Surveys, vol.37, issue.2, pp.138-163, 2005. ,
DOI : 10.1145/1089733.1089735
Android forensics: Automated data collection and reporting from a mobile device, Digital Investigation, pp.12-20, 2013. ,
DOI : 10.1016/j.diin.2013.06.002
Market Share Analysis: Mobile Phones, 2013. ,
Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem, Digital Investigation, vol.3, pp.44-49, 2006. ,
DOI : 10.1016/j.diin.2006.06.005
Linux Loadable Kernel Module HOWTO (tldp, 1006. ,
A Survey on Security for Mobile Devices, IEEE Communications Surveys & Tutorials, vol.15, issue.1, pp.446-471, 2013. ,
DOI : 10.1109/SURV.2012.013012.00028
CAT Detect (Computer Activity Timeline Detection): A tool for detecting inconsistency in computer activity timelines, Digital Investigation, pp.52-61, 2011. ,
DOI : 10.1016/j.diin.2011.05.007
BYOD: Security and privacy considerations, IT Professional, pp.53-55, 2012. ,
DOI : 10.1109/mitp.2012.93
Computer forensic timeline visualization tool, Digital Investigation, pp.78-87, 2009. ,
DOI : 10.1016/j.diin.2009.06.008
This is not the droid you're looking for..., presented at DEF CON 18, 2010. ,
Data node encrypted filesystem: Efficient secure deletion for flash memory, Proceedings of the Twenty-First USENIX Security Symposium, 2012. ,
Samsung Open Source Release Center, p.2013 ,
Securing Android-Powered Mobile Devices Using SELinux, IEEE Security & Privacy Magazine, vol.8, issue.3, pp.36-44, 2010. ,
DOI : 10.1109/MSP.2009.144
The case for SE Android, presented at the Linux Security Summit, 2011. ,
Linux Security Modules: General Security Hooks for Linux, NAI Labs, 2001. ,
Smartphone Ownership 2013, Pew Research Center, 2013. ,
Dynamic time and date stamp analysis, International Journal of Digital Evidence, vol.1, issue.2, 2002. ,
Bring Your Own Device: The Facts and the Future, 2013. ,