{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T19:10:37Z","timestamp":1761419437986,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,20]],"date-time":"2020-10-20T00:00:00Z","timestamp":1603152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,20]]},"DOI":"10.1145\/3424978.3425068","type":"proceedings-article","created":{"date-parts":[[2020,10,15]],"date-time":"2020-10-15T19:09:24Z","timestamp":1602788964000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Android Encryption Database Forensic Analysis Based on Static Analysis"],"prefix":"10.1145","author":[{"given":"Yu","family":"Zhang","sequence":"first","affiliation":[{"name":"Information Engineering University, Zhengzhou, China"}]},{"given":"Binglong","family":"Li","sequence":"additional","affiliation":[{"name":"Information Engineering University, Zhengzhou, China"}]},{"given":"Yifeng","family":"Sun","sequence":"additional","affiliation":[{"name":"Zhengzhou Information Science and Technology Institute, Zhengzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2020,10,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Shah F F and Wani M A","author":"Bhat W A","year":"2019","unstructured":"Bhat W A , Jalal M F , Khan S S , Shah F F and Wani M A ( 2019 ). Forensic analysis of Sync. com and FlipDrive cloud applications on Android platform. Forensic science international, 302, 109845. Bhat W A, Jalal M F, Khan S S, Shah F F and Wani M A (2019). Forensic analysis of Sync. com and FlipDrive cloud applications on Android platform. Forensic science international, 302, 109845."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS.2018.8355344"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.01.011"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.04.011"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2018.8546876"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23089"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183575"},{"key":"e_1_3_2_1_8_1","volume-title":"Alshehri S and Buhari S M","author":"Alzaidi A","year":"2019","unstructured":"Alzaidi A , Alshehri S and Buhari S M ( 2019 ). DroidRista: a highly precise static data flow analysis framework for android applications. International Journal of Information Security , 1 -14. Alzaidi A, Alshehri S and Buhari S M (2019). DroidRista: a highly precise static data flow analysis framework for android applications. International Journal of Information Security, 1 -14."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.04.012"},{"key":"e_1_3_2_1_10_1","volume-title":"Xiong X and Du L","author":"Wu S","year":"2017","unstructured":"Wu S , Zhang Y , Wang X , Xiong X and Du L ( 2017 ). Forensic analysis of WeChat on Android smartphones. Digital investigation, 21, 3--10. Wu S, Zhang Y, Wang X, Xiong X and Du L (2017). Forensic analysis of WeChat on Android smartphones. Digital investigation, 21, 3--10."},{"key":"e_1_3_2_1_11_1","volume-title":"International Conference on Cybercrime, Security and Digital Forensics, http:\/\/www.schuba.fh-aachen.de\/papers\/11-cyberforensics.pdf.","author":"Maus S","year":"2011","unstructured":"Maus S , H\u00f6fken H and Schuba M ( 2011 , June). Forensic analysis of geodata in android smartphones . In International Conference on Cybercrime, Security and Digital Forensics, http:\/\/www.schuba.fh-aachen.de\/papers\/11-cyberforensics.pdf. Maus S, H\u00f6fken H and Schuba M (2011, June). Forensic analysis of geodata in android smartphones. In International Conference on Cybercrime, Security and Digital Forensics, http:\/\/www.schuba.fh-aachen.de\/papers\/11-cyberforensics.pdf."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766509"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837661"},{"key":"e_1_3_2_1_15_1","first-page":"543","volume-title":"Klein J and Le Traon Y","author":"Octeau D","year":"2013","unstructured":"Octeau D , McDaniel P , Jha S , Bartel A , Bodden E , Klein J and Le Traon Y ( 2013 ). Effective inter-component communication mapping in android: An essential step towards holistic security analysis. In Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13), pp. 543 -- 558 . Octeau D, McDaniel P, Jha S, Bartel A, Bodden E, Klein J and Le Traon Y (2013). Effective inter-component communication mapping in android: An essential step towards holistic security analysis. In Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security 13), pp. 543--558."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635869"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.01.015"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.03.003"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2018.04.012"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.01.011"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.30"},{"key":"e_1_3_2_1_22_1","volume-title":"DroidBench 2.0.","author":"DroidBench","year":"2015","unstructured":"DroidBench ( 2015 ). DroidBench 2.0. Retrieved from https:\/\/github.com\/secure-software-engineering\/DroidBench. DroidBench (2015). DroidBench 2.0. Retrieved from https:\/\/github.com\/secure-software-engineering\/DroidBench."}],"event":{"name":"CSAE 2020: The 4th International Conference on Computer Science and Application Engineering","acronym":"CSAE 2020","location":"Sanya China"},"container-title":["Proceedings of the 4th International Conference on Computer Science and Application Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424978.3425068","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3424978.3425068","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:16Z","timestamp":1750197736000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3424978.3425068"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,20]]},"references-count":22,"alternative-id":["10.1145\/3424978.3425068","10.1145\/3424978"],"URL":"https:\/\/doi.org\/10.1145\/3424978.3425068","relation":{},"subject":[],"published":{"date-parts":[[2020,10,20]]},"assertion":[{"value":"2020-10-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}