Post-Exploitation. http://www.irongeek.com. Ac-
cessed: 24.03.2021.
Case, A., Maggio, R. D., Firoz-Ul-Amin, M., Jalalzai,
M. M., Ali-Gombe, A., Sun, M., and Richard III,
G. G. (2020). Hooktracer: Automatic detection and
analysis of keystroke loggers using memory forensics.
Computers & Security, 96:101872.
Case, A. and Richard III, G. G. (2017). Memory forensics:
The path forward. Digital Investigation, 20:23–33.
Chabot, Y., Bertaux, A., Nicolle, C., and Kechadi, M.-T.
(2014). A complete formalized knowledge represen-
tation model for advanced digital forensics timeline
analysis. Digital Investigation, 11:S95–S105.
Chabot, Y., Bertaux, A., Nicolle, C., and Kechadi, T.
(2015). An ontology-based approach for the recon-
struction and analysis of digital incidents timelines.
Digital Investigation, 15:83–100.
Chen, J., Wang, C., Zhao, Z., Chen, K., Du, R., and Ahn,
G.-J. (2017). Uncovering the face of android ran-
somware: Characterization and real-time detection.
IEEE TIFS, 13(5):1286–1300.
Cosic, J. and Baca, M. (2010). A framework to (im) prove
“chain of custody” in digital investigation process. In
CECIIS, page 435.
Diamantaris, M., Papadopoulos, E. P., Markatos, E. P.,
Ioannidis, S., and Polakis, J. (2019). Reaper: real-
time app analysis for augmenting the Android permis-
sion system. In ACM CODASPY, pages 37–48.
Google. File-based encryption. https://source.android.com/
security/encryption/file-based Accessed: 24.03.2021.
Google. Timesketch: forensic timeline analysis. https://
github.com/google/timesketch Accessed: 24.03.2021.
Guðjónsson, K. (2010). Mastering the super timeline with
log2timeline. SANS Institute.
Hargreaves, C. and Patterson, J. (2012). An automated time-
line reconstruction approach for digital forensic inves-
tigations. Digital Investigation, 9:S69–S79.
Heuser, S., Nadkarni, A., Enck, W., and Sadeghi, A.-R.
(2014). ASM: A programmable interface for extend-
ing Android security. In USENIX, pages 1005–1019.
Hoog, A. (2011). Android forensics: investigation, analysis
and mobile security for Google Android.
Kaspersky (2016). Triada: organized crime on An-
droid. https://www.kaspersky.com/blog/triada-trojan/
11481. Accessed: 24.03.2021.
Leguesse, Y., Vella, M., Colombo, C., and Hernandez-
Castro, J. (2020). Reducing the forensic footprint with
Android accessibility attacks. In STM, pages 22–38.
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Lud-
winiak, R., and Russell, G. (2015). Real-time moni-
toring of privacy abuses and intrusion detection in An-
droid system. In HAS, pages 379–390.
Luttgens, J. T., Pepe, M., and Mandia, K. (2014). Incident
Response & Computer Forensics. McGraw-Hill Edu-
cation Group, 3rd edition.
Mohammad, R. M. A. and Alqahtani, M. (2019). A com-
parison of machine learning techniques for file system
forensics analysis. Journal of Information Security
and Applications, 46:53–61.
Pagani, F., Fedorov, O., and Balzarotti, D. (2019). Intro-
ducing the temporal dimension to memory forensics.
ACM TOPS, 22(2):1–21.
Saltaformaggio, B., Bhatia, R., Gu, Z., Zhang, X., and
Xu, D. (2015). Vcr: App-agnostic recovery of pho-
tographic evidence from android device memory im-
ages. In ACM SIGSAC, pages 146–157.
Scrivens, N. and Lin, X. (2017). Android digital forensics:
data, extraction and analysis. In ACM, pages 1–10.
Shi, L., Fu, J., Guo, Z., and Ming, J. (2019). “jekyll and
Hyde” is risky: Shared-everything threat mitigation in
dual-instance apps. In MOBISYS, pages 222–235.
Srivastava, H. and Tapaswi, S. (2015). Logical acquisition
and analysis of data from android mobile devices. In-
formation & Computer Security.
Stefanko, Lukas (2020). Insidious Android malware
gives up all malicious features but one to gain stealth.
https://www.welivesecurity.com/2020/05/22/insidious-
android-malware-gives-up-all-malicious-features
-but-one-gain-stealth/. Accessed: 24.03.2021.
Taubmann, B., Alabduljaleel, O., and Reiser, H. P. (2018).
DroidKex: Fast extraction of ephemeral TLS keys
from the memory of Android apps. Digital Investi-
gation, 26:S67–S76.
ThreatFabric (2020). 2020 - year of the RAT. https://www.
threatfabric.com/blogs/2020_year_of_the_rat.html.
Accessed: 24.03.2021.
Whittaker, Zack (2020). Eventbot: A new mobile bank-
ing trojan is born. https://www.cybereason.com/blog/
eventbot-a-new-mobile-banking-trojan-is-born. Ac-
cessed: 24.03.2021.
Yang, S. J., Choi, J. H., Kim, K. B., and Chang, T. (2015).
New acquisition method based on firmware update
protocols for android smartphones. Digital Investiga-
tion, 14:S68–S76.
Responding to Living-Off-the-Land Tactics using Just-In-Time Memory Forensics (JIT-MF) for Android
369