We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Android Forensics, how the police investigates your device

Formal Metadata

Title
Android Forensics, how the police investigates your device
Title of Series
Number of Parts
46
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Ever wondered how the Police is analyzing the communication traces on a criminal case? My trips in the latest years brought me in contact with companies in security area from Europe, Russia, China and Malaysia. Teaching Android Internals for national security agencies forced me to align the Android Internals knowledge with the forensics on Android devices. I will demo how the Android Internals are constructed and how the police force can extract from an Android device sensitive informations. I will demo the way they can hack into a phone internals using Android platform features like: Binder, Kernel architecture, file system, ADB. The presentation will be backed-up by a practical lab where we analyze live a device from audience.