REFERENCES
1. O’Dea S. Statista. Market share of mobile operating systems worldwide 2012-2021. Available from: https://www.statista.com/statistics/272698/global-market-share-held-by-mobile-operating-systems-since-2009/ [Last accessed on 28 Mar 2022].
2. Statcounter. Mobile Operating System Market Share Worldwide Feb 2020-Feb 2021. Available from: https://gs.statcounter.com/os-market-share/mobile/worldwide [Last accessed on 28 Mar 2022].
3. Statcounter. Operating System Market Share Worldwide Feb 2020-Feb 2021. Available from: https://gs.statcounter.com/os-market-share [Last accessed on 28 Mar 2022].
4. NetMarketShare. Operating System Market Share. Mobile 2019-11 to 2021-02. Available from: https://netmarketshare.com/operating-system-market-share.aspx?options=%7B%22filter%22%3A%7B%22%24and%22%3A%5B%7B%22deviceType%22%3A%7B%22%24in%22%3A%5B%22Mobile%22%5D%7D%7D%5D%7D%2C%22dateLabel%22%3A %22Trend%22%2C%22attributes%22%3A%22share%22%2C%22group%22%3A%22platform%22%2C%22sort%22%3A%7B%22s hare%22%3A-1%7D%2C%22id%22%3A%22platformsMobile%22%2C%22dateInterval%22%3A%22Monthly%22%2C%22dateStart %22%3A%222019-11%22%2C%22dateEnd%22%3A%222020-10%22%2C%22segments%22%3A%22-1000%22%7D [Last accessed on 28 Mar 2022].
5. Popal N, Reith R. IDC. Smartphone market share. Available from: https://www.idc.com/promo/smartphone-market-share [Last accessed on 28 Mar 2022].
6. Google. Data Practices & Transparency. Available from: https://safety.google/privacy/data/ [Last accessed on 28 Mar 2022].
7. Google. How Google uses information from sites or apps that use our services. Available from: https://policies.google.com/technologies/partner-sites?hl=en-US [Last accessed on 28 Mar 2022].
8. Schmidt DC. Google data collection research. Available from: https://digitalcontentnext.org/blog/2018/08/21/google-data-collection-research/ [Last accessed on 28 Mar 2022].
9. Nakashima R. AP Exclusive: Google tracks your movements, like it or not. Available from: https://apnews.com/article/north-america-science-technology-business-ap-top-news-828aefab64d4411bac257a07c1af0ecb [Last accessed on 28 Mar 2022].
10. Baker C. What would your phone tell police? Data plays growing role in investigations. Available from: https://www.sctimes.com/story/news/local/2018/08/02/cell-phone-data-plays-growing-role-st-cloud-police-investigations-digitalfootprint/759365002/ [Last accessed on 28 Mar 2022].
11. McKellop M. Why smartphone data warrants are the future of criminal investigation. Available from: https://www.theburnin.com/category/featured/page/58/ [Last accessed on 28 Mar 2022].
12. Dukes T. To find suspects, police quietly turn to Google. Available from: https://www.wral.com/Raleigh-polic e-search-google-location-history/17377435/ [Last accessed on 28 Mar 2022].
13. Brewster T. Feds Order Google To Hand Over A Load Of Innocent Americans’ Locations. Available from: https://www.forbes.com/sites/thomasbrewster/2018/10/23/feds-are-ordering-google-to-hand-over-a-load-of-innocent-peoples-locations/?sh=6d1ff6995a0d [Last accessed on 28 Mar 2022].
14. Mak A. Police departments are using “reverse location search warrants” to force Google to hand over data on anyone near a crime scene. Available from: https://slate.com/technology/2019/02/reverse-location-search-warrants-google-police.html [Last accessed on 28 Mar 2022].
15. Brewster T. FBI Uses Google Location Data To Ensnare Alleged Capitol Hill Rioter. Forbes; 2021. Available from: https://www.forbes.com/sites/thomasbrewster/2021/03/10/fbi-uses-google-location-data-to-ensnare-alleged-capitol-hill-rioter/?sh=61c073c8104e [Last accessed on 28 Mar 2022].
16. Corder M. European police crack encrypted phones, arrest hundreds. Available from: https://apnews.com/article/international-news-technology-netherlands-crime-arrests-a9916c80e8493c9a26412f45919d7a96 [Last accessed on 28 Mar 2022].
17. Ang MC, Mendoza E, Yeneza J. LokiBot Gains New Persistence Mechanism, Steganography. Trend Micro; 2019. Available from: https://www.trendmicro.com/en_us/research/19/h/lokibot-gains-new-persistence-mechanism-uses-steganography-to-hide-its-tracks.html [Last accessed on 28 Mar 2022].
18. Davis K. Global investigation into drug traffickers’ use of encrypted phones lands in San Diego. Available from: https://www.sandiegouniontribune.com/news/courts/story/2021-03-13/sky-global-eap-encryption-san-diego-indictment [Last accessed on 28 Mar 2022].
19. Bond S. Apple Declines DOJ Request To Unlock Pensacola Gunman’s Phones. Available from: https://www.npr.org/2020/01/14/796160524/apple-declines-doj-request-to-unlock-pensacola-gunmans-phones#:~:text=Apple%20Declines%20DOJ% 20Request%20To%20Unlock%20Pensacola%20Gunman’s%20Phones%20Apple,government%20and%20Apple%20over%20privacy [Last accessed on 28 Mar 2022].
20. Greenblatt M, Cribb R. Encrypted evidence is increasingly hampering criminal investigations, police say. Available from: https://www.wptv.com/news/national/encrypted-evidence-is-increasingly-hampering-criminal-investigations-police-say [Last accessed on 28 Mar 2022].
21. McMillen D. Steganography: A Safe Haven for Malware. Available from: https://securityintelligence.com/steganography-a-safe-haven-for-malware/ [Last accessed on 28 Mar 2022].
22. Stone-Gross B. Malware Analysis of the Lurk Downloader. Available from: https://www.secureworks.com/research/malware-analysis-of-the-lurk-downloader [Last accessed on 28 Mar 2022].
23. Fox S. FBI: Russian spies hid codes in online photos. Available from: https://www.nbcnews.com/id/wbna38028696 [Last accessed on 28 Mar 2022].
25. Leguesse Y, Vella M, Colombo C, Hernandez-castro J. Reducing the forensic footprint with Android accessibility attacks. In: Markantonakis K, Petrocchi M, editors. Security and trust management. Cham: Springer International Publishing; 2020. p. 22-38.
27. Pieterse H, Olivier M, van Heerden R. Detecting manipulated smartphone data on Android and iOS devices. In: Venter H, Loock M, Coetzee M, Eloff M, Eloff J, editors. Information Security. Cham: Springer International Publishing; 2019. p. 89-103.
29. Conlan K, Baggili I, Breitinger F. Anti-forensics: furthering digital forensic science through a new extended, granular taxonomy. Digital Investigation 2016;18:S66-75.
33. Sporea I, Aziz B, McIntyre Z. On the availability of anti-forensic tools for smartphones. International Journal of Security 2012;6:58-64.
34. Asbeh S, Al-Sewadi H, Hammoudeh S, Hammoudeh A. Hex symbols algorithm for anti-forensic artifacts on android devices. IJACSA 2016;7:4.
35. Ceballos Delgado AA, Glisson WB, Grispos G, Choo KR. FADE: a forensic image generator for android device education. WIREs Forensic Science 2022;4:e1432.
36. Du X, Hargreaves C, Sheppard J, Scanlon M. TraceGen: user activity emulation for digital forensic test image generation. Forensic Science International: Digital Investigation 2021;38:301133.
37. Scanlon M, Du X, Lillis D. EviPlant: an efficient digital forensic challenge creation, manipulation and distribution solution. Digital Investigation 2017;20:S29-36.
38. Oates BJ. Researching information systems and computing. Sage; 2005. Available from: https://uk.sagepub.com/en-gb/eur/researching-information-systems-and-computing/book226898 [Last accessed on 28 Mar 2022].
39. Van Rossum G, Drake Jr FL. Python reference manual. Centrum voor Wiskunde en Informatica Amsterdam; 1995. Available from: https://dl.acm.org/doi/10.5555/869369 [Last accessed on 28 Mar 2022].
40. GIMP. Available from: https://www.gimp.org/ [Last accessed on 28 Mar 2022].
41. Carrier B. Autopsy. Available from: https://www.sleuthkit.org/autopsy/ [Last accessed on 28 Mar 2022].
42. Cellebrite. Inspector. Available from: https://www.cellebrite.com/en/inspector/ [Last accessed on 28 Mar 2022].
43. Hipp R. SQLite. Available from: https://www.sqlite.org/index.html [Last accessed on 28 Mar 2022].
44. Google. Android Debug Bridge (adb). Available from: https://developer.android.com/studio/command-line/adb [Last accessed on 28 Mar 2022].
45. Lucas R. Automating Input Events on Android. Available from: https://www.rightpoint.com/rplabs/automating-input-events-abd-keyevent [Last accessed on 28 Mar 2022].