{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T11:21:42Z","timestamp":1767612102355,"version":"3.41.0"},"reference-count":46,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2017,1,10]],"date-time":"2017-01-10T00:00:00Z","timestamp":1484006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003399","name":"Shanghai Science and Technology Commission","doi-asserted-by":"crossref","award":["15511103002"],"award-info":[{"award-number":["15511103002"]}],"id":[{"id":"10.13039\/501100003399","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Research on Mobile Smart Device Application Security Testing and Evaluating","award":["2015.6.30-2017.6.30"],"award-info":[{"award-number":["2015.6.30-2017.6.30"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Embed. Comput. Syst."],"published-print":{"date-parts":[[2017,5,31]]},"abstract":"<jats:p>\n            Smart mobile devices are becoming the main vessel of personal privacy information. While they carry valuable information, data erasure is somehow much more vulnerable than was predicted. The security mechanisms provided by the Android system are not flexible enough to thoroughly delete sensitive data. In addition to the weakness among several provided data-erasing and file-deleting mechanisms, we also target the Android OS design flaws in data erasure, and unveil that the design of the Android OS contradicts some secure data-erasure demands. We present the data-erasure flaws in three typical scenarios on mainstream Android devices, such as the\n            <jats:italic>data clearing flaw<\/jats:italic>\n            ,\n            <jats:italic>application uninstallation flaw<\/jats:italic>\n            , and\n            <jats:italic>factory reset flaw<\/jats:italic>\n            . Some of these flaws are inherited data-deleting security issues from the Linux kernel, and some are new vulnerabilities in the Android system. Those scenarios reveal the data leak points in Android systems. Moreover, we reveal that the data remanence on the disk is rarely affected by the user\u2019s daily operation, such as file deletion and app installation and uninstallation, by a real-world data deletion latency experiment. After one volunteer used the Android phone for 2 months, the data remanence amount was still considerable. Then, we proposed\n            <jats:italic>DataRaider<\/jats:italic>\n            for file recovering from disk fragments. It adopts a file-carving technique and is implemented as an automated sensitive information recovering framework.\n            <jats:italic>DataRaider<\/jats:italic>\n            is able to extract private data in a raw disk image without any file system information, and the recovery rate is considerably high in the four test Android phones. We propose some mitigation for data remanence issues, and give the users some suggestions on data protection in Android systems.\n          <\/jats:p>","DOI":"10.1145\/3007211","type":"journal-article","created":{"date-parts":[[2017,1,10]],"date-time":"2017-01-10T15:41:17Z","timestamp":1484062877000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Why Data Deletion Fails? A Study on Deletion Flaws and Data Remanence in Android Systems"],"prefix":"10.1145","volume":"16","author":[{"given":"Junliang","family":"Shu","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Minhang District, Shanghai, China"}]},{"given":"Yuanyuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Minhang District, Shanghai, China"}]},{"given":"Juanru","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Minhang District, Shanghai, China"}]},{"given":"Bodong","family":"Li","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Minhang District, Shanghai, China"}]},{"given":"Dawu","family":"Gu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Minhang District, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2017,1,10]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_2_1_2_1","volume-title":"Kim-Kwang Raymond Choo, and Lin Liu","author":"Azfar Abdullah","year":"2015","unstructured":"Abdullah Azfar , Kim-Kwang Raymond Choo, and Lin Liu . 2015 . Forensic taxonomy of popular Android mHealth apps. arXiv preprint arXiv:1505.02905 (2015). Abdullah Azfar, Kim-Kwang Raymond Choo, and Lin Liu. 2015. Forensic taxonomy of popular Android mHealth apps. arXiv preprint arXiv:1505.02905 (2015)."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1111\/1556-4029.13164"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-015-9208-1"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36742-7_39"},{"key":"e_1_2_1_6_1","volume-title":"Usenix Security Symposium","volume":"174","author":"Bauer Steven","year":"2001","unstructured":"Steven Bauer and Nissanka Bodhi Priyantha . 2001 . Secure data deletion for Linux file systems . In Usenix Security Symposium , Vol. 174 . Steven Bauer and Nissanka Bodhi Priyantha. 2001. Secure data deletion for Linux file systems. In Usenix Security Symposium, Vol. 174."},{"key":"e_1_2_1_7_1","first-page":"1","article-title":"Solid state drives: The beginning of the end for current practice in digital forensic recovery","volume":"5","author":"Bell Graeme B.","year":"2010","unstructured":"Graeme B. Bell and Richard Boddington . 2010 . Solid state drives: The beginning of the end for current practice in digital forensic recovery ? Journal of Digital Forensics, Security and Law 5 , 3, 1 -- 20 . Graeme B. Bell and Richard Boddington. 2010. Solid state drives: The beginning of the end for current practice in digital forensic recovery? Journal of Digital Forensics, Security and Law 5, 3, 1--20.","journal-title":"Journal of Digital Forensics, Security and Law"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.01.003"},{"key":"e_1_2_1_9_1","unstructured":"Sven Bugiel Stephan Heuser and Ahmad-Reza Sadeghi. 2013. Flexible and fine-grained mandatory access control on Android for diverse security and privacy policies. In Usenix Security. 131--146.   Sven Bugiel Stephan Heuser and Ahmad-Reza Sadeghi. 2013. Flexible and fine-grained mandatory access control on Android for diverse security and privacy policies. In Usenix Security. 131--146."},{"key":"e_1_2_1_10_1","volume-title":"ClockworkMod Recovery. Retrieved","author":"CWM.","year":"2016","unstructured":"CWM. 2015. ClockworkMod Recovery. Retrieved December 6, 2016 from https:\/\/www.clockworkmod.com. CWM. 2015. ClockworkMod Recovery. Retrieved December 6, 2016 from https:\/\/www.clockworkmod.com."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0138449"},{"key":"e_1_2_1_12_1","unstructured":"Nikolay Elenkov. 2014. Revisiting Android disk encryption. http:\/\/nelenkov.blogspot.com\/2014\/10\/revisiting-android-disk-encryption.html. (2014).  Nikolay Elenkov. 2014. Revisiting Android disk encryption. http:\/\/nelenkov.blogspot.com\/2014\/10\/revisiting-android-disk-encryption.html. (2014)."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619091"},{"volume-title":"Retrieved","year":"2016","key":"e_1_2_1_14_1","unstructured":"Ext4 Wiki. 2015. Ext4 and Ext2\/Ext3) Wiki. Retrieved December 6, 2016 from https:\/\/ext4.wiki.kernel.org\/ index.php\/Main_Page. Ext4 Wiki. 2015. Ext4 and Ext2\/Ext3) Wiki. Retrieved December 6, 2016 from https:\/\/ext4.wiki.kernel.org\/ index.php\/Main_Page."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1852666.1852691"},{"volume-title":"Solid State Driver Forensics. Retrieved","year":"2016","key":"e_1_2_1_16_1","unstructured":"ForensicsWiki. 2014. Solid State Driver Forensics. Retrieved December 6, 2016 from http:\/\/www.forensicswiki.org\/wiki\/Solid_State_Drive_(SSD)_Forensics. ForensicsWiki. 2014. Solid State Driver Forensics. Retrieved December 6, 2016 from http:\/\/www.forensicswiki.org\/wiki\/Solid_State_Drive_(SSD)_Forensics."},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the 23rd USENIX Conference on Security Symposium (SEC\u201914)","author":"Heuser Stephan","year":"2014","unstructured":"Stephan Heuser , Adwait Nadkarni , William Enck , and Ahmad-Reza Sadeghi . 2014 . ASM: A programmable interface for extending Android security . In Proceedings of the 23rd USENIX Conference on Security Symposium (SEC\u201914) . USENIX Association, Berkeley, CA, 1005--1019. http:\/\/dl.acm.org\/citation.cfm?id&equals;2671225.2671289 Stephan Heuser, Adwait Nadkarni, William Enck, and Ahmad-Reza Sadeghi. 2014. ASM: A programmable interface for extending Android security. In Proceedings of the 23rd USENIX Conference on Security Symposium (SEC\u201914). USENIX Association, Berkeley, CA, 1005--1019. http:\/\/dl.acm.org\/citation.cfm?id&equals;2671225.2671289"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.488"},{"key":"e_1_2_1_19_1","unstructured":"JEDEC. 2014. Flash Memory. Retrieved from http:\/\/www.jedec.org\/category\/technology-focus-area\/flash- memory-ssds-ufs-emmc.  JEDEC. 2014. Flash Memory. Retrieved from http:\/\/www.jedec.org\/category\/technology-focus-area\/flash- memory-ssds-ufs-emmc."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381938"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-4516-2_44"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27552-4_98"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2011.05.013"},{"key":"e_1_2_1_24_1","first-page":"265","article-title":"Secure file erasure. (Nov. 23 1993)","volume":"5","author":"Kung Kenneth C.","year":"1993","unstructured":"Kenneth C. Kung . 1993 . Secure file erasure. (Nov. 23 1993) . US Patent 5 , 265 ,159. Kenneth C. Kung. 1993. Secure file erasure. (Nov. 23 1993). US Patent 5,265,159.","journal-title":"US Patent"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1364093"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1111\/1556-4029.13203"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.483"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIST.2013.6747691"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_23"},{"volume-title":"Retrieved","year":"2016","key":"e_1_2_1_30_1","unstructured":"Piriform. 2015. Recuva. Retrieved December 6, 2016 from https:\/\/www.piriform.com\/recuva. Piriform. 2015. Recuva. Retrieved December 6, 2016 from https:\/\/www.piriform.com\/recuva."},{"key":"e_1_2_1_31_1","unstructured":"Hal Pomeranz. 2010. Understanding ext4. Retrieved from http:\/\/digital-forensics.sans.org\/blog\/2010\/12\/20\/digital-forensics-understanding-ext4-part-1-extents.  Hal Pomeranz. 2010. Understanding ext4. Retrieved from http:\/\/digital-forensics.sans.org\/blog\/2010\/12\/20\/digital-forensics-understanding-ext4-part-1-extents."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.02.001"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.07.001"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.28"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414493"},{"volume-title":"extundelete. Retrieved","year":"2016","key":"e_1_2_1_36_1","unstructured":"SourceForge. 2013. extundelete. Retrieved December 6, 2016 from http:\/\/extundelete.sourceforge.net\/. SourceForge. 2013. extundelete. Retrieved December 6, 2016 from http:\/\/extundelete.sourceforge.net\/."},{"volume-title":"Retrieved","year":"2016","key":"e_1_2_1_37_1","unstructured":"SourceForge. 2015. Foremost. Retrieved December 6, 2016 from http:\/\/foremost.sourceforge.net\/. (2015). SourceForge. 2015. Foremost. Retrieved December 6, 2016 from http:\/\/foremost.sourceforge.net\/. (2015)."},{"volume-title":"SQLite3 File Format. Retrieved","year":"2016","key":"e_1_2_1_38_1","unstructured":"SQLite. 2015. SQLite3 File Format. Retrieved December 6, 2016 from https:\/\/www.sqlite.org\/fileformat.html. SQLite. 2015. SQLite3 File Format. Retrieved December 6, 2016 from https:\/\/www.sqlite.org\/fileformat.html."},{"key":"e_1_2_1_39_1","volume-title":"Team Win Recovery Project. Retrieved","author":"TWRP.","year":"2016","unstructured":"TWRP. 2015. Team Win Recovery Project. Retrieved December 6, 2016 from http:\/\/teamw.in\/project\/twrp2. (2015). TWRP. 2015. Team Win Recovery Project. Retrieved December 6, 2016 from http:\/\/teamw.in\/project\/twrp2. (2015)."},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2012.31"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/1960475.1960483"},{"volume-title":"Flash Memory: SSDs, UFS, e.MMC. Retrieved","year":"2014","key":"e_1_2_1_42_1","unstructured":"Wikipedia. 2014 . Flash Memory: SSDs, UFS, e.MMC. Retrieved December 6, 2016 from http:\/\/en.wikipedia.org\/w\/index.php?title&equals;Flash_memory. Wikipedia. 2014. Flash Memory: SSDs, UFS, e.MMC. Retrieved December 6, 2016 from http:\/\/en.wikipedia.org\/w\/index.php?title&equals;Flash_memory."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23164"},{"key":"e_1_2_1_44_1","volume-title":"Retrieved","author":"Developers XDA","year":"2016","unstructured":"XDA Developers . 2015a. Rooting. Retrieved December 6, 2016 from http:\/\/forum.xda-developers.com\/wiki\/Root. XDA Developers. 2015a. Rooting. Retrieved December 6, 2016 from http:\/\/forum.xda-developers.com\/wiki\/Root."},{"key":"e_1_2_1_45_1","volume-title":"Android Recovery Wiki. Retrieved","author":"Developers XDA","year":"2016","unstructured":"XDA Developers . 2015b. Android Recovery Wiki. Retrieved December 6, 2016 from http:\/\/forum.xda-developers.com\/wiki\/Recovery. XDA Developers. 2015b. Android Recovery Wiki. Retrieved December 6, 2016 from http:\/\/forum.xda-developers.com\/wiki\/Recovery."},{"volume-title":"Proceedings of the 21st USENIX Conference on Security.","author":"Xu R.","key":"e_1_2_1_46_1","unstructured":"R. Xu , H. Saidi , and R. Anderson . 2012. Aurasium: Practical policy enforcement for Android applications . In Proceedings of the 21st USENIX Conference on Security. R. Xu, H. Saidi, and R. Anderson. 2012. Aurasium: Practical policy enforcement for Android applications. In Proceedings of the 21st USENIX Conference on Security."}],"container-title":["ACM Transactions on Embedded Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3007211","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3007211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:41Z","timestamp":1750220621000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3007211"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1,10]]},"references-count":46,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,5,31]]}},"alternative-id":["10.1145\/3007211"],"URL":"https:\/\/doi.org\/10.1145\/3007211","relation":{},"ISSN":["1539-9087","1558-3465"],"issn-type":[{"type":"print","value":"1539-9087"},{"type":"electronic","value":"1558-3465"}],"subject":[],"published":{"date-parts":[[2017,1,10]]},"assertion":[{"value":"2015-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-10-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2017-01-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}