mobiledevices. As Android's use increases, so does the need for both forensic and privacy
toolsdesigned for the platform. This thesis presents the first methodology and toolset for
acquiringfull physical memory images from Android devices, a proposed methodology for
forensicallysecuring both volatile and non-volatile storage, and details of a vulnerability
discovered by theauthor that allows the bypass of the Android security model and enables …