{"id":"https://openalex.org/W3094416214","doi":"https://doi.org/10.1145/3424978.3425068","title":"Android Encryption Database Forensic Analysis Based on Static Analysis","display_name":"Android Encryption Database Forensic Analysis Based on Static Analysis","publication_year":2020,"publication_date":"2020-10-15","ids":{"openalex":"https://openalex.org/W3094416214","doi":"https://doi.org/10.1145/3424978.3425068","mag":"3094416214"},"language":"en","primary_location":{"id":"doi:10.1145/3424978.3425068","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3424978.3425068","pdf_url":null,"source":{"id":"https://openalex.org/S4306523839","display_name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101886854","display_name":"Yu Zhang","orcid":"https://orcid.org/0000-0003-3119-084X"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yu Zhang","raw_affiliation_strings":["Information Engineering University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101527863","display_name":"Binglong Li","orcid":"https://orcid.org/0000-0003-3421-5432"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Binglong Li","raw_affiliation_strings":["Information Engineering University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024097973","display_name":"Yi-Feng Sun","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yifeng Sun","raw_affiliation_strings":["Zhengzhou Information Science and Technology Institute, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"Zhengzhou Information Science and Technology Institute, Zhengzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101886854"],"corresponding_institution_ids":["https://openalex.org/I169689159"],"apc_list":null,"apc_paid":null,"fwci":0.6734,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.69415292,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.821112334728241},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.749142587184906},{"id":"https://openalex.org/keywords/android","display_name":"Android (operating system)","score":0.7079728245735168},{"id":"https://openalex.org/keywords/flow-chart","display_name":"Flow chart","score":0.5750446319580078},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.5215437412261963},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.46989795565605164},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.44992247223854065},{"id":"https://openalex.org/keywords/chart","display_name":"Chart","score":0.41430675983428955},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21700745820999146},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.15956774353981018},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11172288656234741}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.821112334728241},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.749142587184906},{"id":"https://openalex.org/C557433098","wikidata":"https://www.wikidata.org/wiki/Q94","display_name":"Android (operating system)","level":2,"score":0.7079728245735168},{"id":"https://openalex.org/C2984431290","wikidata":"https://www.wikidata.org/wiki/Q185092","display_name":"Flow chart","level":2,"score":0.5750446319580078},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.5215437412261963},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.46989795565605164},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.44992247223854065},{"id":"https://openalex.org/C190812933","wikidata":"https://www.wikidata.org/wiki/Q28923","display_name":"Chart","level":2,"score":0.41430675983428955},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21700745820999146},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.15956774353981018},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11172288656234741},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C199639397","wikidata":"https://www.wikidata.org/wiki/Q1788588","display_name":"Engineering drawing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3424978.3425068","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3424978.3425068","pdf_url":null,"source":{"id":"https://openalex.org/S4306523839","display_name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th International Conference on Computer Science and Application Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7900000214576721,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1630356589","https://openalex.org/W2017025011","https://openalex.org/W2047421912","https://openalex.org/W2127723417","https://openalex.org/W2277576447","https://openalex.org/W2569064808","https://openalex.org/W2791387126","https://openalex.org/W2802602290","https://openalex.org/W2803054784","https://openalex.org/W2884079571","https://openalex.org/W2902470568","https://openalex.org/W2924675185","https://openalex.org/W2941988636","https://openalex.org/W2951301237","https://openalex.org/W2962610426","https://openalex.org/W2977319245","https://openalex.org/W4244726870","https://openalex.org/W4251541794","https://openalex.org/W6731426603","https://openalex.org/W6907222693","https://openalex.org/W6999986095"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2363898576","https://openalex.org/W590639328","https://openalex.org/W2382151475","https://openalex.org/W2241816416","https://openalex.org/W2391243165","https://openalex.org/W3180186477","https://openalex.org/W2372687724","https://openalex.org/W157588844"],"abstract_inverted_index":{"Forensic":[0],"analysis":[1,34,70,170,182,230],"of":[2,35,51,84,124,171,180,231,265,271,277],"mobile":[3,61,93,112],"applications":[4,215,233],"plays":[5],"a":[6,41,90,110,140,165,185,191],"crucial":[7],"part":[8],"in":[9,23,38,44,98,226,236,252],"gathering":[10],"evidence":[11,16],"against":[12],"criminals.":[13],"Because":[14],"the":[15,32,52,82,121,125,146,154,169,178,197,202,222,227,244,253,262,275],"data":[17,141,207,224],"obtained":[18],"may":[19],"often":[20],"be":[21,77],"stored":[22,225],"an":[24,72,133,269],"encrypted":[25,36,173,223,250],"local":[26],"database":[27,94,155,198],"or":[28],"is":[29,40,65,106,158,234],"itself":[30],"encrypted,":[31],"forensic":[33,53,85],"databases":[37,56,251,267],"smartphones":[39,100],"critical":[42],"process":[43],"digital":[45],"crime":[46],"forensics":[47,96],"investigation.":[48,86],"However,":[49],"most":[50],"research":[54],"on":[55,59,102,145,151,201],"currently":[57],"focuses":[58],"specific":[60,111],"applications.":[62],"Moreover,":[63],"it":[64],"difficult":[66],"to":[67,80,109,128,167,195,216,220],"automate":[68,168],"dynamic":[69],"because":[71],"appropriate":[73],"runtime":[74],"environment":[75],"must":[76],"set":[78],"up":[79],"meet":[81],"needs":[83],"This":[87],"paper":[88],"proposes":[89,190],"method":[91,119,157,176,200,219,246,259,264],"for":[92],"encryption":[95,156,199,263],"investigation":[97],"Android":[99,126,172,214],"based":[101,144],"static":[103,181],"analysis,":[104,131],"which":[105],"not":[107],"limited":[108],"application":[113,127],"and":[114,138,160,189,206,273],"features":[115],"automated":[116],"analytics.":[117],"The":[118,229],"uses":[120],"installation":[122],"package":[123],"perform":[129],"reverse":[130],"constructs":[132],"inter-program":[134],"control":[135,147,203],"flow":[136,142,148,204,208],"chart,":[137],"builds":[139],"graph":[143],"graph.":[149],"Based":[150],"this":[152],"graph,":[153],"searched":[159],"identified.":[161],"We":[162],"also":[163],"implement":[164],"system":[166],"data.":[174],"Our":[175,239],"overcomes":[177],"challenges":[179],"by":[183],"using":[184],"self-made":[186],"probability":[187],"model":[188],"specifically":[192],"devised":[193],"algorithm":[194],"search":[196],"chart":[205],"chart.":[209],"Finally,":[210],"we":[211],"select":[212],"100":[213,254],"verify":[217],"our":[218,258],"analyze":[221],"database.":[228],"all":[232],"completed":[235],"39.6":[237],"h.":[238],"experimental":[240],"results":[241],"show":[242],"that":[243],"proposed":[245],"could":[247],"find":[248],"705":[249],"apps.":[255],"In":[256],"addition,":[257],"successfully":[260],"determines":[261],"584":[266],"with":[268],"accuracy":[270],"82.9%":[272],"realizes":[274],"decryption":[276],"these":[278],"databases.":[279]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
