D. Apostolopoulos, G. Marinakis, C. Ntantogian, and C. Xenakis, Discovering Authentication Credentials in Volatile Memory of Android Mobile Devices, Proceedings of the Twelfth IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, pp.178-185, 2013.
DOI : 10.1007/978-3-642-37437-1_15

URL : https://hal.archives-ouvertes.fr/hal-01470532

K. Barmpatsalou, D. Damopoulos, G. Kambourakis, and V. Katos, A critical review of seven years of mobile device forensics, Digital Investigation, pp.323-349, 2013.

T. Cannon and S. Bradford, Into the droid: Gaining access to Android user data, presented at the Defcon Hacking Conference, 2012.

S. Devik, Linux on-the-fly kernel patching without LKM, Phrack, 2001.

G. Garcia, Forensic physical memory analysis: An overview of tools and techniques, presented at the TKK T-110.5290 Seminar on Network Security, 2007.

X. Ge, H. Vijayakumar, and T. Jaeger, Sprobes: Enforcing kernel code integrity in the TrustZone architecture, 2014.

I. Kollar, Forensic RAM Dump Image Analyzer, Master's Thesis, 2009.

A. Lineberry, Malicious code injection via /dev/mem, presented at the Black Hat Europe Conference, 2009.

K. Lucic, Over 27.44% users root their phone(s) in order to remove built-in apps, Android Headlines, 2014.

H. Macht, Live Memory Forensics on Android with Volatility, Diploma Thesis in Computer Science, 2013.

T. Muller and M. Spreitzenbarth, FROST ? Forensic recovery of scrambled telephones, Proceedings of the Eleventh International Conference on Applied Cryptography and Network Security, pp.373-388, 2013.

. Opensignal, Android fragmentation visualized United Kingdom (opensignal.com/reports, p.2015, 2015.

J. Park and S. Choi, Studying Security Weaknesses of Android System, International Journal of Security and Its Applications, vol.9, issue.3, pp.7-12, 2015.
DOI : 10.14257/ijsia.2015.9.3.02

J. Stuttgen and M. Cohen, Robust Linux memory acquisition with minimal target impact, Digital Investigation, pp.112-119, 2014.
DOI : 10.1016/j.diin.2014.03.014

H. Sun, K. Sun, Y. Wang, J. Jing, and S. Jajodia, TrustDump: Reliable Memory Acquisition on Smartphones, Proceedings of the Nineteenth European Symposium on Research in Computer Security, pp.202-218, 2014.
DOI : 10.1007/978-3-319-11203-9_12

J. Sylve, A. Case, L. Marziale, and G. Richard, Acquisition and analysis of volatile memory from android devices, Digital Investigation, pp.3-4, 2012.
DOI : 10.1016/j.diin.2011.10.003

V. Thing, K. Ng, and E. Chang, Live memory forensics of mobile phones, Digital Investigation, pp.74-82, 2010.
DOI : 10.1016/j.diin.2010.05.010

S. Willassen, Forensic analysis of mobile phone internal memory, in Advances in Digital Forensics, pp.191-204, 2005.

W. Xu, Ah! Universal Android rooting is back, presented at the Black Hat USA Conference, 2015.

W. Xu and Y. Fu, Own your Android! Yet another universal root, presented at the Ninth USENIX Workshop on Offensive Technologies, 2015.