Smartphone forensics analysis: A case study, International Journal of Computer and Electrical Engineering, vol.5, issue.6, pp.576-580, 2013. ,
Storage Options (developer.android.com/ guide/topics/data/data-storage, p.2016 ,
iPhone 3GS forensics: Logical analysis using Apple iTunes Backup Utility, Small Scale Digital Device Forensics Journal, vol.4, issue.1, 2010. ,
COMPUTER CRIME AND DIGITAL EVIDENCE, 2011. ,
DOI : 10.1016/B0-12-369399-3/00062-8
Digital Forensic Evidence Examination, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-01060607
Mobile phone forensic analysis, in Crime Prevention Technologies and Applications for Advancing Criminal Investigations, IGI Global, pp.250-262, 2012. ,
Software architecture recovery of a program family, Proceedings of the 20th International Conference on Software Engineering, pp.508-511, 1998. ,
DOI : 10.1109/ICSE.1998.671617
On lightweight mobile phone application certification, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.235-245, 2009. ,
DOI : 10.1145/1653662.1653691
URL : http://www.enck.org/pubs/ccs09-enck.pdf
Forensic analysis of smartphones: The Android Data Extractor Lite, Proceedings of the ADFSL Conference on Digital Forensics, Security and Law, pp.151-160, 2011. ,
Anti-forensics: Techniques, detection and countermeasures, Proceedings of the Second International Conference on i- Warfare and Security, pp.77-84, 2007. ,
Smart smartphone development, Proceedings of the 42nd ACM technical symposium on Computer science education, SIGCSE '11, pp.607-612, 2011. ,
DOI : 10.1145/1953163.1953330
iSecureRing: Forensic-ready secure iOS apps for jailbroken iPhones, poster paper presented at the IEEE Symposium on Security and Privacy, 2014. ,
A reference architecture for Web browsers, 21st IEEE International Conference on Software Maintenance (ICSM'05), pp.661-664, 2005. ,
DOI : 10.1109/ICSM.2005.13
An increasingly important requirement: Authentication of digital evidence, Journal of the Missouri Bar, vol.70, issue.6, pp.314-323, 2014. ,
Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem, Digital Investigation, vol.3, pp.44-49, 2006. ,
DOI : 10.1016/j.diin.2006.06.005
A reference architecture for Web servers, Proceedings Seventh Working Conference on Reverse Engineering, pp.150-159, 2000. ,
DOI : 10.1109/WCRE.2000.891462
Best practices in iPhone programming: Model-view-controller architecture — Carousel component development, 2011 IEEE EUROCON, International Conference on Computer as a Tool, 2011. ,
DOI : 10.1109/EUROCON.2011.5929308
iOS from Scratch with Swift: Data Persistence and Sandboxing on iOS, Envato Tuts+ (code.tutsplus.com/tutorials/ ios-from-scratch-with-swift-data-persistence-and-sandb oxing-on-ios--cms-25505), 2015. ,
Reverse Engineering iOS Mobile Applications, 2012 19th Working Conference on Reverse Engineering, pp.177-186, 2012. ,
DOI : 10.1109/WCRE.2012.27
Evaluation of some tools for extracting e-evidence from mobile devices, 2011 5th International Conference on Application of Information and Communication Technologies (AICT), 2011. ,
DOI : 10.1109/ICAICT.2011.6110999
Android forensics: Simplifying cell phone examinations, Small Scale Digital Device Forensics Journal, vol.4, issue.1, 2010. ,
Non-technical manipulation of digital data, in Advances in Digital Forensics, pp.51-63, 2005. ,
Mobile Attacks and Defense, IEEE Security & Privacy Magazine, vol.9, issue.4, pp.68-70, 2011. ,
DOI : 10.1109/MSP.2011.85
Playing hide-and-seek: Detecting the manipulation of Android Timestamps, 2015 Information Security for South Africa (ISSA), 2015. ,
DOI : 10.1109/ISSA.2015.7335065
Reference architecture for Android applications to support the detection of manipulated evidence, SAIEE Africa Research Journal, vol.107, issue.2, pp.92-103, 2016. ,
Android to rule smartphone market with 85% share in 2020 says IDC report, International Business Times, 2016. ,
On the availability of antiforensic tools for smartphones, International Journal of Security, vol.6, issue.4, pp.58-64, 2012. ,
Mobile devices: New challenges for admissibility of electronic evidence, Scitech Lawyer, vol.9, issue.3, p.2013 ,
Preserving Dates and Timestamps for Incident Handling in Android Smartphones, Advances in Digital Forensics X, pp.209-225, 2014. ,
DOI : 10.1007/978-3-662-44952-3_14
URL : https://hal.archives-ouvertes.fr/hal-01393772