Data Extraction on MTK-based Android Mobile Phone Forensics

Joe Kong

Abstract


In conducting criminal investigations it is quite common that forensic examiners need to recover evidentiary data from smartphones used by offenders.  However, examiners encountered difficulties in acquiring complete memory dump from MTK Android phones, a popular brand of smartphones, due to a lack of technical knowledge on the phone architecture and that system manuals are not always available.  This research will perform tests to capture data from MTK Android phone by applying selected forensic tools and compare their effectiveness by analyzing the extracted results.  It is anticipated that a generic extraction tool, once identified, can be used on different brands of smartphones equipped with the same CPU chipset.

Keywords


Mobile forensics; MTK Android phones; Android forensics; physical extraction; flash memory; MT6582;

Full Text:

PDF

Refbacks

  • There are currently no refbacks.


Copyright (c) 2016 Journal of Digital Forensics, Security and Law

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

(c) 2006-2015 Association of Digital Forensics, Security and Law