{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T20:14:29Z","timestamp":1769631269896,"version":"3.49.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/issa.2015.7335065","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T17:50:11Z","timestamp":1448301011000},"page":"1-8","source":"Crossref","is-referenced-by-count":7,"title":["Playing hide-and-seek: Detecting the manipulation of Android Timestamps"],"prefix":"10.1109","author":[{"given":"Heloise","family":"Pieterse","sequence":"first","affiliation":[]},{"given":"Martin S.","family":"Olivier","sequence":"additional","affiliation":[]},{"given":"Renier P.","family":"van Heerden","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Android architecture","year":"0"},{"key":"ref11","first-page":"59","article-title":"Forensic analysis of YAFFS 2","author":"zimmermann","year":"2012","journal-title":"Sicherheit"},{"key":"ref12","first-page":"1","article-title":"Android forensics: Simplifying cell phone examinations","volume":"4","author":"lessard","year":"2010","journal-title":"Small Scale Digital Device Forensics Journal"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1007\/978-3-642-27552-4_98","article-title":"Tuning the Ext4 filesystem performance for Android-based smartphones","author":"kim","year":"2012","journal-title":"Frontiers in Computer Education"},{"key":"ref14","first-page":"151","article-title":"Forensic analysis of smartphones: The Android Data Extractor Lite (ADEL)","author":"freiling","year":"2011","journal-title":"Proceedings of the Conference on Digital Forensics Security and Law"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-011-0428-7"},{"key":"ref16","article-title":"About SQLite","year":"0"},{"key":"ref17","article-title":"The SQLite database file format","year":"0"},{"key":"ref18","article-title":"Database recovery mechanism for Android devices","author":"patodi","year":"2012","journal-title":"Indian Institute of Technology Bombay2008"},{"key":"ref19","article-title":"The forensic implications of sqlite's write ahead log","author":"caithness","year":"0"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44952-3_16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.005"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2014.05.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/BWCCA.2011.62"},{"key":"ref6","article-title":"Poster: iSecureRing: Forensic ready secure iOS apps for jailbroken iPhones","author":"govindaraj","year":"2014","journal-title":"Proc 35th IEEE Symp Security and Privacy"},{"key":"ref29","author":"ugboma","year":"2009","journal-title":"Learn Database Programming using SQL of MS Access 2007"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44952-3_14"},{"key":"ref8","first-page":"63","article-title":"Evaluating Android OS for embedded real-time systems","author":"maia","year":"2010","journal-title":"Workshop on Operating Systems Platforms for Embedded Real-Time applications"},{"key":"ref7","article-title":"Open handset alliance - android","year":"0"},{"key":"ref2","article-title":"Mobile statistics report, 2014&#x2013;2018","author":"radicati","year":"2014","journal-title":"The Radicati Group Inc Tech Rep"},{"key":"ref9","author":"speckmann","year":"2008","journal-title":"The Android Mobile Platform"},{"key":"ref1","article-title":"Gartner says smartphone sales surpassed one billion units in 2014","year":"0"},{"key":"ref20","article-title":"Write-ahead logging","year":"0"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MALWARE.2009.5403026"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MITE.2014.7020308"},{"key":"ref24","article-title":"How to use ADB in Android studio to view an SQLite DB","year":"0"},{"key":"ref23","article-title":"Android Debug Bridge","year":"0"},{"key":"ref26","article-title":"Dropboxmanager","year":"0"},{"key":"ref25","article-title":"Resurrecting the read_logs permission on samsung devices","author":"johnson","year":"2015","journal-title":"Black Hat Asia 2015"}],"event":{"name":"2015 Information Security for South Africa (ISSA)","location":"Johannesburg, South Africa","start":{"date-parts":[[2015,8,12]]},"end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7328027\/7335039\/07335065.pdf?arnumber=7335065","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T20:14:44Z","timestamp":1498248884000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7335065\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/issa.2015.7335065","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}