M. Hadadi and A. Alshidhani, Smartphone forensics analysis: A case study, International Journal of Computer and Electrical Engineering, vol.5, issue.6, pp.576-580, 2013.

A. Developers, Storage Options (developer.android.com/ guide/topics/data/data-storage, p.2016

M. Bader and I. Baggili, iPhone 3GS forensics: Logical analysis using Apple iTunes Backup Utility, Small Scale Digital Device Forensics Journal, vol.4, issue.1, 2010.

DOI : 10.1016/B0-12-369399-3/00062-8

F. Cohen, Digital Forensic Evidence Examination, 2009.
URL : https://hal.archives-ouvertes.fr/hal-01060607

K. Curran, A. Robinson, S. Peacocke, and S. Cassidy, Mobile phone forensic analysis, in Crime Prevention Technologies and Applications for Advancing Criminal Investigations, IGI Global, pp.250-262, 2012.

W. Eixelsberger, M. Ogris, H. Gall, and B. Bellay, Software architecture recovery of a program family, Proceedings of the 20th International Conference on Software Engineering, pp.508-511, 1998.
DOI : 10.1109/ICSE.1998.671617

W. Enck, M. Ongtang, and P. Mcdaniel, On lightweight mobile phone application certification, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.235-245, 2009.
DOI : 10.1145/1653662.1653691

URL : http://www.enck.org/pubs/ccs09-enck.pdf

F. Freiling, M. Spreitzenbarth, and S. Schmitt, Forensic analysis of smartphones: The Android Data Extractor Lite, Proceedings of the ADFSL Conference on Digital Forensics, Security and Law, pp.151-160, 2011.

S. Garfinkel, Anti-forensics: Techniques, detection and countermeasures, Proceedings of the Second International Conference on i- Warfare and Security, pp.77-84, 2007.

M. Goadrich and M. Rogers, Smart smartphone development, Proceedings of the 42nd ACM technical symposium on Computer science education, SIGCSE '11, pp.607-612, 2011.
DOI : 10.1145/1953163.1953330

J. Govindaraj, R. Verma, R. Mata, and G. Gupta, iSecureRing: Forensic-ready secure iOS apps for jailbroken iPhones, poster paper presented at the IEEE Symposium on Security and Privacy, 2014.

A. Grosskurth and M. Godfrey, A reference architecture for Web browsers, 21st IEEE International Conference on Software Maintenance (ICSM'05), pp.661-664, 2005.
DOI : 10.1109/ICSM.2005.13

M. Hannon, An increasingly important requirement: Authentication of digital evidence, Journal of the Missouri Bar, vol.70, issue.6, pp.314-323, 2014.

R. Harris, Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem, Digital Investigation, vol.3, pp.44-49, 2006.
DOI : 10.1016/j.diin.2006.06.005

A. Hassan and R. Holt, A reference architecture for Web servers, Proceedings Seventh Working Conference on Reverse Engineering, pp.150-159, 2000.
DOI : 10.1109/WCRE.2000.891462

T. Iulia-maria and H. Ciocarlie, Best practices in iPhone programming: Model-view-controller architecture — Carousel component development, 2011 IEEE EUROCON, International Conference on Computer as a Tool, 2011.
DOI : 10.1109/EUROCON.2011.5929308

B. Jacobs, iOS from Scratch with Swift: Data Persistence and Sandboxing on iOS, Envato Tuts+ (code.tutsplus.com/tutorials/ ios-from-scratch-with-swift-data-persistence-and-sandb oxing-on-ios--cms-25505), 2015.

M. Joorabchi and A. Mesbah, Reverse Engineering iOS Mobile Applications, 2012 19th Working Conference on Reverse Engineering, pp.177-186, 2012.
DOI : 10.1109/WCRE.2012.27

A. Kubi, S. Saleem, and O. Popov, Evaluation of some tools for extracting e-evidence from mobile devices, 2011 5th International Conference on Application of Information and Communication Technologies (AICT), 2011.
DOI : 10.1109/ICAICT.2011.6110999

J. Lessard and G. Kessler, Android forensics: Simplifying cell phone examinations, Small Scale Digital Device Forensics Journal, vol.4, issue.1, 2010.

M. Losavio, Non-technical manipulation of digital data, in Advances in Digital Forensics, pp.51-63, 2005.

C. Miller, Mobile Attacks and Defense, IEEE Security & Privacy Magazine, vol.9, issue.4, pp.68-70, 2011.
DOI : 10.1109/MSP.2011.85

H. Pieterse, M. Olivier, and R. Van-heerden, Playing hide-and-seek: Detecting the manipulation of Android Timestamps, 2015 Information Security for South Africa (ISSA), 2015.
DOI : 10.1109/ISSA.2015.7335065

H. Pieterse, M. Olivier, and R. Van-heerden, Reference architecture for Android applications to support the detection of manipulated evidence, SAIEE Africa Research Journal, vol.107, issue.2, pp.92-103, 2016.

A. Prasad, Android to rule smartphone market with 85% share in 2020 says IDC report, International Business Times, 2016.

I. Sporea, B. Aziz, and Z. Mcintyre, On the availability of antiforensic tools for smartphones, International Journal of Security, vol.6, issue.4, pp.58-64, 2012.

L. Thomson, Mobile devices: New challenges for admissibility of electronic evidence, Scitech Lawyer, vol.9, issue.3, p.2013

R. Verma, J. Govindaraj, and G. Gupta, Preserving Dates and Timestamps for Incident Handling in Android Smartphones, Advances in Digital Forensics X, pp.209-225, 2014.
DOI : 10.1007/978-3-662-44952-3_14

URL : https://hal.archives-ouvertes.fr/hal-01393772