P. Albano, A. Castiglione, G. Cattaneo, and A. Santis, A Novel Anti-forensics Technique for the Android OS, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications, pp.380-385, 2011.
DOI : 10.1109/BWCCA.2011.62

M. Ansari, A. Chattopadhayay, and S. Das, A kernel level VFS logger for building efficient filesystem intrusion detection systems, Proceedings of the Second International Conference on Computer and Network Technology, pp.273-279, 2010.

S. Azadegan, W. Yu, H. Liu, M. Sistani, and S. Acharya, Novel antiforensics approaches for smartphones, Proceedings of the Forty-Fifth Hawaii International Conference on System Science, pp.5424-5431, 2012.

M. Barik, G. Gupta, S. Sinha, A. Mishra, and C. Mazumdar, An efficient technique for enhancing the forensic capabilities of the Ext2 filesystem, Digital Investigation, pp.55-61, 2007.

M. Becher, F. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck et al., Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices, 2011 IEEE Symposium on Security and Privacy, pp.96-111, 2011.
DOI : 10.1109/SP.2011.29

F. Buchholz and C. Falk, Design and implementation of Zeitline: A forensic timeline editor, Proceedings of the Fifth Digital Forensic Research Workshop, 2005.

B. Carrier and E. Spafford, An event-based digital forensic investigation framework, Proceedings of the Fourth Digital Forensic Research Workshop, 2004.

S. Das, A. Chattopadhayay, D. Kalyani, and M. Saha, Filesystem intrusion detection by preserving MAC DTS: A loadable kernel module based approach for Linux kernel 2.6.x, Proceedings of the Fifth Annual Workshop on Cyber Security and Information Intelligence Research, p.57, 2009.

A. Distefano, G. Me, and F. Pace, Android anti-forensics through a local paradigm, Digital Investigation, pp.83-94, 2010.
DOI : 10.1016/j.diin.2010.05.011

E. Gal and S. Toledo, Algorithms and data structures for flash memories, ACM Computing Surveys, vol.37, issue.2, pp.138-163, 2005.
DOI : 10.1145/1089733.1089735

J. Grover, Android forensics: Automated data collection and reporting from a mobile device, Digital Investigation, pp.12-20, 2013.
DOI : 10.1016/j.diin.2013.06.002

A. Gupta, C. Milanesi, R. Cozza, and C. Lu, Market Share Analysis: Mobile Phones, 2013.

R. Harris, Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem, Digital Investigation, vol.3, pp.44-49, 2006.
DOI : 10.1016/j.diin.2006.06.005

B. Henderson, Linux Loadable Kernel Module HOWTO (tldp, 1006.

M. L. Polla, F. Martinelli, and D. Sgandurra, A Survey on Security for Mobile Devices, IEEE Communications Surveys & Tutorials, vol.15, issue.1, pp.446-471, 2013.
DOI : 10.1109/SURV.2012.013012.00028

A. Marrington, I. Baggili, G. Mohay, A. Clark, and C. Detect, CAT Detect (Computer Activity Timeline Detection): A tool for detecting inconsistency in computer activity timelines, Digital Investigation, pp.52-61, 2011.
DOI : 10.1016/j.diin.2011.05.007

K. Miller, J. Voas, and G. Hurlburt, BYOD: Security and privacy considerations, IT Professional, pp.53-55, 2012.
DOI : 10.1109/mitp.2012.93

J. Olsson and M. Boldt, Computer forensic timeline visualization tool, Digital Investigation, pp.78-87, 2009.
DOI : 10.1016/j.diin.2009.06.008

C. Papathanasiou and N. Percoco, This is not the droid you're looking for..., presented at DEF CON 18, 2010.

J. Reardon, S. Capkun, and D. Basin, Data node encrypted filesystem: Efficient secure deletion for flash memory, Proceedings of the Twenty-First USENIX Security Symposium, 2012.

. Samsung, Samsung Open Source Release Center, p.2013

A. Shabtai, Y. Fledel, and Y. Elovici, Securing Android-Powered Mobile Devices Using SELinux, IEEE Security & Privacy Magazine, vol.8, issue.3, pp.36-44, 2010.
DOI : 10.1109/MSP.2009.144

S. Smalley, The case for SE Android, presented at the Linux Security Summit, 2011.

S. Smalley, T. Fraser, and C. Vance, Linux Security Modules: General Security Hooks for Linux, NAI Labs, 2001.

A. Smith, Smartphone Ownership 2013, Pew Research Center, 2013.

M. Weil, Dynamic time and date stamp analysis, International Journal of Digital Evidence, vol.1, issue.2, 2002.

D. Willis, Bring Your Own Device: The Facts and the Future, 2013.