{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:12:06Z","timestamp":1725808326862},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125671"},{"type":"electronic","value":"9783319125688"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44952-3_14","type":"book-chapter","created":{"date-parts":[[2014,10,9]],"date-time":"2014-10-09T12:38:21Z","timestamp":1412858301000},"page":"209-225","source":"Crossref","is-referenced-by-count":4,"title":["Preserving Dates and Timestamps for Incident Handling in Android Smartphones"],"prefix":"10.1007","author":[{"given":"Robin","family":"Verma","sequence":"first","affiliation":[]},{"given":"Jayaprakash","family":"Govindaraj","sequence":"additional","affiliation":[]},{"given":"Gaurav","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","first-page":"380","volume-title":"Proceedings of the International Conference on Broadband and Wireless Computing, Communications and Applications","author":"P. Albano","year":"2011","unstructured":"P. Albano, A. Castiglione, G. Cattaneo and A. De Santis, A novel anti-forensics technique for the Android OS, Proceedings of the International Conference on Broadband and Wireless Computing, Communications and Applications, pp. 380\u2013385, 2011."},{"key":"14_CR2","first-page":"273","volume-title":"Proceedings of the Second International Conference on Computer and Network Technology","author":"M. Ansari","year":"2010","unstructured":"M. Ansari, A. Chattopadhayay and S. Das, A kernel level VFS logger for building efficient filesystem intrusion detection systems, Proceedings of the Second International Conference on Computer and Network Technology, pp. 273\u2013279, 2010."},{"key":"14_CR3","first-page":"5424","volume-title":"Proceedings of the Forty-Fifth Hawaii International Conference on System Science","author":"S. Azadegan","year":"2012","unstructured":"S. Azadegan, W. Yu, H. Liu, M. Sistani and S. Acharya, Novel anti-forensics approaches for smartphones, Proceedings of the Forty-Fifth Hawaii International Conference on System Science, pp. 5424\u20135431, 2012."},{"issue":"S","key":"14_CR4","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.diin.2007.06.007","volume":"4","author":"M. Barik","year":"2007","unstructured":"M. Barik, G. Gupta, S. Sinha, A. Mishra and C. Mazumdar, An efficient technique for enhancing the forensic capabilities of the Ext2 filesystem, Digital Investigation, vol. 4(S), pp. S55\u2013S61, 2007.","journal-title":"Digital Investigation"},{"key":"14_CR5","first-page":"96","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"M. Becher","year":"2011","unstructured":"M. Becher, F. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck and C. Wolf, Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices, Proceedings of the IEEE Symposium on Security and Privacy, pp. 96\u2013111, 2011."},{"key":"14_CR6","volume-title":"Proceedings of the Fifth Digital Forensic Research Workshop","author":"F. Buchholz","year":"2005","unstructured":"F. Buchholz and C. Falk, Design and implementation of Zeitline: A forensic timeline editor, Proceedings of the Fifth Digital Forensic Research Workshop, 2005."},{"key":"14_CR7","volume-title":"Proceedings of the Fourth Digital Forensic Research Workshop","author":"B. Carrier","year":"2004","unstructured":"B. Carrier and E. Spafford, An event-based digital forensic investigation framework, Proceedings of the Fourth Digital Forensic Research Workshop, 2004."},{"key":"14_CR8","volume-title":"Proceedings of the Fifth Annual Workshop on Cyber Security and Information Intelligence Research","author":"S. Das","year":"2009","unstructured":"S. Das, A. Chattopadhayay, D. Kalyani and M. Saha, Filesystem intrusion detection by preserving MAC DTS: A loadable kernel module based approach for Linux kernel 2.6.x, Proceedings of the Fifth Annual Workshop on Cyber Security and Information Intelligence Research, art. 57, 2009."},{"issue":"S","key":"14_CR9","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.diin.2010.05.011","volume":"7","author":"A. Distefano","year":"2010","unstructured":"A. Distefano, G. Me and F. Pace, Android anti-forensics through a local paradigm, Digital Investigation, vol. 7(S), pp. S83\u2013S94, 2010.","journal-title":"Digital Investigation"},{"issue":"2","key":"14_CR10","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1145\/1089733.1089735","volume":"37","author":"E. Gal","year":"2005","unstructured":"E. Gal and S. Toledo, Algorithms and data structures for flash memories, ACM Computing Surveys, vol. 37(2), pp. 138\u2013163, 2005.","journal-title":"ACM Computing Surveys"},{"issue":"S","key":"14_CR11","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.diin.2013.06.002","volume":"10","author":"J. Grover","year":"2013","unstructured":"J. Grover, Android forensics: Automated data collection and reporting from a mobile device, Digital Investigation, vol. 10(S), pp. S12\u2013S20, 2013.","journal-title":"Digital Investigation"},{"key":"14_CR12","volume-title":"Market Share Analysis: Mobile Phones, Worldwide, 2Q13","author":"A. Gupta","year":"2013","unstructured":"A. Gupta, C. Milanesi, R. Cozza and C. Lu, Market Share Analysis: Mobile Phones, Worldwide, 2Q13, Gartner, Stamford, Connecticut, August 13, 2013."},{"issue":"S","key":"14_CR13","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.diin.2006.06.005","volume":"3","author":"R. Harris","year":"2006","unstructured":"R. Harris, Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem, Digital Investigation, vol. 3(S), pp. S44\u2013S49, 2006.","journal-title":"Digital Investigation"},{"key":"14_CR14","unstructured":"B. Henderson, Linux Loadable Kernel Module HOWTO (\n                    \n                      http:\/\/tldp.org\/HOWTO\/Module-HOWTO\n                    \n                    \n                  ), September 24, 1006."},{"key":"14_CR15","unstructured":"HTC Corporation, The HTC Developer Center, Taoyuan, Taiwan (\n                    \n                      www.htcdev.com\/devcenter\n                    \n                    \n                  ), 2013."},{"key":"14_CR16","unstructured":"International Data Corporation, Worldwide mobile phone market forecast to grow 7.3% in 2013 driven by 1 billion smartphone shipments, according to IDC, Press Release, Framingham, Massachusetts, September 4, 2013."},{"issue":"1","key":"14_CR17","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1109\/SURV.2012.013012.00028","volume":"15","author":"M. Polla La","year":"2013","unstructured":"M. La Polla, F. Martinelli and D. Sgandurra, A survey on security for mobile devices, IEEE Communications Surveys and Tutorials, vol. 15(1), pp. 446\u2013471, 2013.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"S","key":"14_CR18","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.diin.2011.05.007","volume":"8","author":"A. Marrington","year":"2011","unstructured":"A. Marrington, I. Baggili, G. Mohay and A. Clark, CAT Detect (Computer Activity Timeline Detection): A tool for detecting inconsistency in computer activity timelines, Digital Investigation, vol. 8(S), pp. S52\u2013S61, 2011.","journal-title":"Digital Investigation"},{"issue":"5","key":"14_CR19","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MITP.2012.93","volume":"14","author":"K. Miller","year":"2012","unstructured":"K. Miller, J. Voas and G. Hurlburt, BYOD: Security and privacy considerations, IT Professional, vol. 14(5), pp. 53\u201355, 2012.","journal-title":"IT Professional"},{"issue":"S","key":"14_CR20","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.diin.2009.06.008","volume":"6","author":"J. Olsson","year":"2009","unstructured":"J. Olsson and M. Boldt, Computer forensic timeline visualization tool, Digital Investigation, vol. 6(S), pp. S78\u2013S87, 2009.","journal-title":"Digital Investigation"},{"key":"14_CR21","volume-title":"DEF CON 18","author":"C. Papathanasiou","year":"2010","unstructured":"C. Papathanasiou and N. Percoco, This is not the droid you\u2019re looking for..., presented at DEF CON 18, 2010."},{"key":"14_CR22","volume-title":"Proceedings of the Twenty-First USENIX Security Symposium","author":"J. Reardon","year":"2012","unstructured":"J. Reardon, S. Capkun and D. Basin, Data node encrypted filesystem: Efficient secure deletion for flash memory, Proceedings of the Twenty-First USENIX Security Symposium, 2012."},{"key":"14_CR23","unstructured":"Samsung, Samsung Open Source Release Center, Suwon, South Korea (\n                    \n                      http:\/\/opensource.samsung.com\n                    \n                    \n                  ), 2013."},{"issue":"3","key":"14_CR24","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MSP.2009.144","volume":"8","author":"A. Shabtai","year":"2010","unstructured":"A. Shabtai, Y. Fledel and Y. Elovici, Securing Android-powered mobile devices using SELinux, IEEE Security and Privacy, vol. 8(3), pp. 36\u201344, 2010.","journal-title":"IEEE Security and Privacy"},{"key":"14_CR25","volume-title":"Linux Security Summit","author":"S. Smalley","year":"2011","unstructured":"S. Smalley, The case for SE Android, presented at the Linux Security Summit, 2011."},{"key":"14_CR26","volume-title":"Linux Security Modules: General Security Hooks for Linux","author":"S. Smalley","year":"2001","unstructured":"S. Smalley, T. Fraser and C. Vance, Linux Security Modules: General Security Hooks for Linux, NAI Labs, Santa Clara, California (\n                    \n                      http:\/\/tali.admingilde.org\/linux-docbook\/lsm.pdf\n                    \n                    \n                  ), 2001."},{"key":"14_CR27","volume-title":"Smartphone Ownership 2013","author":"A. Smith","year":"2013","unstructured":"A. Smith, Smartphone Ownership 2013, Pew Research Center, Washington, DC, June 5, 2013."},{"key":"14_CR28","unstructured":"M. Weil, Dynamic time and date stamp analysis, International Journal of Digital Evidence, vol. 1(2), 2002."},{"key":"14_CR29","volume-title":"Bring Your Own Device: The Facts and the Future","author":"D. Willis","year":"2013","unstructured":"D. Willis, Bring Your Own Device: The Facts and the Future, Gartner, Stamford, Connecticut, April 11, 2013."}],"container-title":["Lecture Notes in Computer Science","Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44952-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T22:57:12Z","timestamp":1558997832000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-44952-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125671","9783319125688"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44952-3_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}