• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

安卓平台上 Sync.com 和 FlipDrive 云应用的取证分析。

Forensic analysis of Sync.com and FlipDrive cloud applications on Android platform.

机构信息

Department of Computer Sciences, University of Kashmir, India.

出版信息

Forensic Sci Int. 2019 Sep;302:109845. doi: 10.1016/j.forsciint.2019.06.003. Epub 2019 Jun 12.

DOI:10.1016/j.forsciint.2019.06.003
PMID:31248622
Abstract

The complex architecture and legal restrictions associated with cloud services make the acquisition of data from servers almost impossible in digital investigations involving cloud services. However, smartphones used to access these cloud services can serve as potential sources. In this paper, we investigate Sync.com and FlipDrive cloud client applications on Android platform for artefacts left behind by user activities. Our experiments demonstrate that rich information arising from user activities is left behind by these applications. This information includes installation details, login credentials, names and timestamps of files uploaded, downloaded, deleted and shared. The study also identifies mechanisms for extracting these artefacts from the devices. These findings assist forensic investigators in performing complete, credible and conclusive digital investigation by allowing them to create complete file management history of these applications. Finally, based on these findings, we make many recommendations relevant to the digital investigation involving these applications.

摘要

云服务复杂的架构和法律限制使得在涉及云服务的数字调查中几乎不可能从服务器获取数据。然而,用于访问这些云服务的智能手机可以作为潜在的来源。在本文中,我们研究了 Android 平台上的 Sync.com 和 FlipDrive 云客户端应用程序,以寻找用户活动留下的痕迹。我们的实验表明,这些应用程序会留下丰富的用户活动信息。这些信息包括安装详细信息、登录凭据、上传、下载、删除和共享文件的名称和时间戳。该研究还确定了从设备中提取这些痕迹的机制。这些发现通过允许法医调查人员创建这些应用程序的完整文件管理历史记录,帮助他们进行完整、可信和结论性的数字调查。最后,根据这些发现,我们针对涉及这些应用程序的数字调查提出了许多相关建议。

相似文献

1
Forensic analysis of Sync.com and FlipDrive cloud applications on Android platform.安卓平台上 Sync.com 和 FlipDrive 云应用的取证分析。
Forensic Sci Int. 2019 Sep;302:109845. doi: 10.1016/j.forsciint.2019.06.003. Epub 2019 Jun 12.
2
Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study.合作存储云服务的法医调查:以Symform为例进行研究
J Forensic Sci. 2017 May;62(3):641-654. doi: 10.1111/1556-4029.13271. Epub 2016 Nov 25.
3
Digital Forensic Investigation of Healthcare Data in Cloud Computing Environment.云计算环境中医疗数据的数字取证调查。
J Healthc Eng. 2022 Mar 16;2022:9709101. doi: 10.1155/2022/9709101. eCollection 2022.
4
Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications.思科WebEx桌面客户端、网络和安卓智能手机应用程序的法医调查。
Ann Telecommun. 2023;78(3-4):183-208. doi: 10.1007/s12243-022-00919-6. Epub 2022 Aug 12.
5
Analyzing Data Remnant Remains on User Devices to Determine Probative Artifacts in Cloud Environment.
J Forensic Sci. 2018 Jan;63(1):112-121. doi: 10.1111/1556-4029.13506. Epub 2017 Apr 10.
6
Digital Forensic Analysis to Improve User Privacy on Android.数字取证分析提升安卓用户隐私保护
Sensors (Basel). 2022 May 24;22(11):3971. doi: 10.3390/s22113971.
7
A Forensically Sound Adversary Model for Mobile Devices.一种适用于移动设备的具有法证可靠性的对手模型。
PLoS One. 2015 Sep 22;10(9):e0138449. doi: 10.1371/journal.pone.0138449. eCollection 2015.
8
Forensic analysis of iOS binary cookie files.对 iOS 二进制 cookie 文件的取证分析。
J Forensic Sci. 2024 May;69(3):1075-1087. doi: 10.1111/1556-4029.15499. Epub 2024 Mar 5.
9
A case study on anonymised sharing platforms and digital traces left by their usage.匿名共享平台及其使用所留下的数字痕迹案例研究。
Sci Justice. 2021 Jan;61(1):97-106. doi: 10.1016/j.scijus.2020.09.002. Epub 2020 Sep 9.
10
An Android Communication App Forensic Taxonomy.一款安卓通信应用取证分类法。
J Forensic Sci. 2016 Sep;61(5):1337-50. doi: 10.1111/1556-4029.13164. Epub 2016 Jul 22.