Advertisement!
Author Information Pack
Editorial Board
Submit article
Special Issue
Editor's selection process
Join as Reviewer/Editor
List of Reviewer
Indexing Information
Most popular articles
Purchase Single Articles
Archive
Free Online Access
Current Issue
Recommend this journal to your library
Advertiser
Accepted Articles
Search Articles
Email Alerts
FAQ
Contact Us
Journal of Clinical Forensic Science

Volume  8, Issue 1, Jan. June 2025, Pages 51-55
 

Review Article

Forensic Techniques for Android Devices Using Logical Extraction and Temporary Root Methods

Vinay Chauhan1, Neeraj Kumar2, Atul Kumar Tiwari3, Dev Brat Mishra4

1 Security Researcher, M.C.A, Chandigarh University, Ludhiana, Highway, Chandigarh, Punjab 140413, India. 2 Research Scholar, Fish Biology Research Lab, Department of Zoology, Tilak Dhari Collage, Jaunpur 222002, Uttar  Pradesh, India. 3 Associate Professor and Head, Department of Environmental Biology, Awadhesh Pratap Singh University, Rewa  Madhya Pradesh 486003, India. 4 Assistant Professor, Fish Biology Research Lab, Department of Zoology, Tilak Dhari Collage, Jau

Choose an option to locate / access this Article:
days Access
Check if you have access through your login credentials.        PDF      |
|

Open Access: View PDF

DOI: n.a

Abstract

This paper presents a comprehensive analysis of forensic techniques for Android devices, focusing on logical extraction methods and temporary root techniques. As Android smartphones continue to dominate the mobile market, they serve as critical sources of digital evidence in forensic investigations. However, security mechanisms such as application sandboxing, encryption, and file-based access controls pose challenges to forensic data acquisition. Logical extraction techniques provide a non-intrusive approach to retrieving user-accessible data, ensuring evidence integrity while maintaining the device’s operational state. This method is particularly useful for standard forensic investigations where access to unaltered, user-level data is required. Conversely, temporary root methods exploit system vulnerabilities to gain elevated privileges, allowing forensic experts to access deleted and system-level files with minimal modification to the device. This approach is essential for advanced forensic investigations requiring deeper insights into device storage structures. The paper evaluates the strengths and limitations of both methodologies, considering factors such as data accessibility, forensic soundness, and legal admissibility. Additionally, it discusses the evolving landscape of Android security, highlighting challenges introduced by encryption, cloud storage, and anti-forensic techniques. A comparative analysis underscores the importance of selecting the appropriate technique based on investigative needs and device security constraints. The findings suggest that a hybrid forensic strategy beginning with logical extraction and escalating to temporary root techniques when necessary can optimize evidence acquisition while preserving forensic integrity. This study provides forensic practitioners with insights into effective Android forensic methodologies, ensuring comprehensive digital investigations within legal and ethical frameworks.
 


Keywords : • Android Forensics • Logical Extraction • Temporary Root • Digital Evidence • Data Acquisition • Evidence Integrity
Corresponding Author : Neeraj Kumar