Forensic analysis of Google Allo messenger on Android platform
PurposeThe purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of the data stored by this application in the internal memory of the mobile device, with minimal use of third-party applications. The findings w...
Saved in:
| Published in: | Information and computer security Vol. 27; no. 1; pp. 62 - 80 |
|---|---|
| Main Authors: | , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Bingley
Emerald Group Publishing Limited
11.03.2019
|
| Subjects: | |
| ISSN: | 2056-4961, 2056-497X |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | PurposeThe purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of the data stored by this application in the internal memory of the mobile device, with minimal use of third-party applications. The findings were compared with the already existing works on this topic. Android is the most popular operating system for mobile devices, and these devices often contain a massive amount of personal information about the user such as photos and contact details. Analysis of these applications is required in case of a forensic investigation and makes the process easier for forensic analysts.Design/methodology/approachLogical acquisition of the data stored by these applications was performed. A locked Android device was used for this purpose. Some scripts are presented to help in data acquisition using Android Debug Bridge (ADB). Manual forensic analysis of the device image was performed to see whether the activities carried out on these applications are stored in the internal memory of the device. A comparative analysis of an existing mobile forensic tool was also performed to show the effectiveness of the methodology adopted.FindingsForensic artifacts were recovered from Allo application. Multimedia content such as images were also retrieved from the internal memory.Research limitations/implicationsAs this study was conducted for forensic analysis, it assumed that the mobile device used already has USB debugging enabled on it, although this might not be the applicable in some of the cases. This work provides an optimal approach to acquiring artifacts with minimal use of third-party applications.Practical implicationsMost of the mobile devices contain messaging application such as Allo installed. A large amount of personal information can be obtained from the forensic analysis of these applications, which can be useful in any criminal investigation.Originality/valueThis is the first study which focuses on the Google Allo application. The proposed methodology was able to extract almost as much as the data obtained using earlier approaches, but with minimal third-party application usage. |
|---|---|
| AbstractList | PurposeThe purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of the data stored by this application in the internal memory of the mobile device, with minimal use of third-party applications. The findings were compared with the already existing works on this topic. Android is the most popular operating system for mobile devices, and these devices often contain a massive amount of personal information about the user such as photos and contact details. Analysis of these applications is required in case of a forensic investigation and makes the process easier for forensic analysts.Design/methodology/approachLogical acquisition of the data stored by these applications was performed. A locked Android device was used for this purpose. Some scripts are presented to help in data acquisition using Android Debug Bridge (ADB). Manual forensic analysis of the device image was performed to see whether the activities carried out on these applications are stored in the internal memory of the device. A comparative analysis of an existing mobile forensic tool was also performed to show the effectiveness of the methodology adopted.FindingsForensic artifacts were recovered from Allo application. Multimedia content such as images were also retrieved from the internal memory.Research limitations/implicationsAs this study was conducted for forensic analysis, it assumed that the mobile device used already has USB debugging enabled on it, although this might not be the applicable in some of the cases. This work provides an optimal approach to acquiring artifacts with minimal use of third-party applications.Practical implicationsMost of the mobile devices contain messaging application such as Allo installed. A large amount of personal information can be obtained from the forensic analysis of these applications, which can be useful in any criminal investigation.Originality/valueThis is the first study which focuses on the Google Allo application. The proposed methodology was able to extract almost as much as the data obtained using earlier approaches, but with minimal third-party application usage. |
| Author | Tapaswi, Shashikala Agrawal, Vinayak |
| Author_xml | – sequence: 1 givenname: Vinayak surname: Agrawal fullname: Agrawal, Vinayak – sequence: 2 givenname: Shashikala surname: Tapaswi fullname: Tapaswi, Shashikala |
| BookMark | eNp1kE1LAzEQhoNUsNbePQY8RzPZ3WRzEUqxH1DwoIK3kGSTsmWb1GR76L93S8WD4GnegecdhucWjUIMDqF7oI8AtH5az98ILQijIAilAFdozGjFSSnF5-g3c7hB05x3dEAk8ILDGD0vYnIhtxbroLtTbjOOHi9j3HYOz7ou4r3L2YWtSzgGPAtNim2DD53ufUz7O3TtdZfd9GdO0Mfi5X2-IpvX5Xo-2xBbAPSkATBQNsYaw7SopKsEc7qCclh1aaQx0spGs9IDl14wbysvZS25gcIIVxQT9HC5e0jx6-hyr3bxmIaPs2JQc2ACajlQ9ELZFHNOzqtDavc6nRRQdRalBlGKFuosSp1FDRX-p2LbXvdtDH3Sbfd_8Ru3FG32 |
| CitedBy_id | crossref_primary_10_1111_1556_4029_14750 crossref_primary_10_1108_ICS_03_2021_0038 crossref_primary_10_3390_info14120629 |
| Cites_doi | 10.1504/IJESDF.2009.024901 10.1108/ICS-02-2014-0013 10.1016/j.diin.2004.11.007 10.1016/j.diin.2012.05.007 10.1016/j.diin.2011.05.003 10.1016/j.diin.2016.04.012 |
| ContentType | Journal Article |
| Copyright | Emerald Publishing Limited 2019 |
| Copyright_xml | – notice: Emerald Publishing Limited 2019 |
| DBID | AAYXX CITATION 0-V 7SC 7WY 7WZ 7XB 8AO 8FD 8FE 8FG 8FI ABUWG AFKRA ALSLI ARAPS AZQEC BENPR BEZIV BGLVJ BGRYB CCPQU CNYFK DWQXO E3H F2A FYUFA F~G GNUQQ HCIFZ JQ2 K6~ K7- L.- L.0 L7M L~C L~D M0C M0N M0O M0T M1O P5Z P62 PHGZM PHGZT PJZUB PKEHL PPXIY PQBIZ PQEST PQGLB PQQKQ PQUKI PRINS PRQQA PYYUZ Q9U |
| DOI | 10.1108/ICS-03-2017-0011 |
| DatabaseName | CrossRef ProQuest Social Sciences Premium Collection Computer and Information Systems Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection Hospital Premium Collection ProQuest Central (Alumni Edition) ProQuest Central UK/Ireland Social Science Premium Collection Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Business Premium Collection Technology collection Criminology Collection ProQuest One Community College Library & Information Science Collection ProQuest Central Korea Library & Information Sciences Abstracts (LISA) Library & Information Science Abstracts (LISA) Health Research Premium Collection ABI/INFORM Global (Corporate) ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced ABI/INFORM Professional Standard Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global Computing Database Criminal Justice Database Healthcare Administration Database Library Science Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest Health & Medical Research Collection ProQuest One Academic Middle East (New) ProQuest One Health & Nursing ProQuest One Business (UW System Shared) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China ProQuest One Social Sciences ABI/INFORM Collection China ProQuest Central Basic |
| DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Library and Information Science Abstracts (LISA) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts SciTech Premium Collection ProQuest Central China ABI/INFORM Complete ProQuest One Applied & Life Sciences Health Research Premium Collection Health & Medical Research Collection Library & Information Science Collection ProQuest Central (New) Advanced Technologies & Aerospace Collection Business Premium Collection Social Science Premium Collection ABI/INFORM Global ProQuest One Academic Eastern Edition ProQuest Hospital Collection ProQuest Technology Collection ProQuest Business Collection Criminology Collection ProQuest Social Sciences Premium Collection ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ABI/INFORM Global (Corporate) ProQuest One Business Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Central (Alumni Edition) ProQuest One Community College ProQuest One Health & Nursing ProQuest Pharma Collection ProQuest Central ABI/INFORM Professional Advanced ProQuest Library Science ProQuest Health & Medical Research Collection ProQuest Criminal Justice ABI/INFORM Professional Standard ProQuest Central Korea Advanced Technologies Database with Aerospace ProQuest Computing ProQuest One Social Sciences ProQuest Central Basic ProQuest Health Management ABI/INFORM China ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database |
| DatabaseTitleList | Computer Science Database |
| Database_xml | – sequence: 1 dbid: BENPR name: ProQuest Central url: https://www.proquest.com/central sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science Library & Information Science Business |
| EISSN | 2056-497X |
| EndPage | 80 |
| ExternalDocumentID | 10_1108_ICS_03_2017_0011 |
| GroupedDBID | .WU 0-V 3FY 5VS 7WY 8AO 8FE 8FG 8FI 8FW 9F- AAGBP AAKOT AAMCF AAUDR AAVEV AAXBI AAYXX ABIJV ABJNI ABSDC ABUWG ABXQL ABYQI ACGFS ACTSA ACZKX ADBBV ADFLA ADOMW ADQHX ADWNT AFFHD AFKRA AHMHQ AILOG AJEBP AJZCB ALMA_UNASSIGNED_HOLDINGS ALSLI AODMV AQUVI ARALO ARAPS AZQEC BENPR BEZIV BGLVJ BGRYB BPHCQ BVXVI CCPQU CITATION CNYFK DWQXO EBS ECCUG EJD FNNZZ FYUFA GEA GEI GMX GNUQQ GQ. H13 HCIFZ K6V K6~ K7- KBGRL M0C M0O M0T M1O M42 P62 PHGZM PHGZT PJZUB PPXIY PQBIZ PQGLB PQQKQ PROAC PRQQA SCAQC SDURG SLOBJ TEM TGG TMF TMI TMT UKHRP Z11 Z12 Z21 ZYZAG .DC 29I 4.4 5GY 70U 77I 77K 7SC 7XB 8FD 8R4 8R5 9E0 AAPSD ABEAN ACGFO AEBZA AEDOK AEMMR AETHF AFNZV AIAFM AJFKA APPLU ATGMP CS3 DU5 E3H F2A GEB GEC GMM GMN J1Y JI- JL0 JQ2 L.- L.0 L7M L~C L~D M0N P2P PKEHL PQEST PQUKI PRINS Q2X Q3A Q9U RWL TAE TDQ TET TMD TMK TMX Z22 |
| ID | FETCH-LOGICAL-c311t-d11b14dbcbb2a759e572ea514b2aa4b9bb9c9da24f169f72fc5f99896b13b7e33 |
| IEDL.DBID | M0C |
| ISICitedReferencesCount | 5 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000459747900004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 2056-4961 |
| IngestDate | Sat Nov 15 03:21:35 EST 2025 Sat Nov 29 07:44:25 EST 2025 Tue Nov 18 22:25:53 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| License | https://www.emerald.com/insight/site-policies |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c311t-d11b14dbcbb2a759e572ea514b2aa4b9bb9c9da24f169f72fc5f99896b13b7e33 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| PQID | 2186127189 |
| PQPubID | 31135 |
| PageCount | 19 |
| ParticipantIDs | proquest_journals_2186127189 crossref_primary_10_1108_ICS_03_2017_0011 crossref_citationtrail_10_1108_ICS_03_2017_0011 |
| PublicationCentury | 2000 |
| PublicationDate | 2019-03-11 |
| PublicationDateYYYYMMDD | 2019-03-11 |
| PublicationDate_xml | – month: 03 year: 2019 text: 2019-03-11 day: 11 |
| PublicationDecade | 2010 |
| PublicationPlace | Bingley |
| PublicationPlace_xml | – name: Bingley |
| PublicationTitle | Information and computer security |
| PublicationYear | 2019 |
| Publisher | Emerald Group Publishing Limited |
| Publisher_xml | – name: Emerald Group Publishing Limited |
| References | (key2020092412195939400_ref017) 2012; 8 (key2020092412195939400_ref011) 2004; 1 (key2020092412195939400_ref016) 2015; 23 Simao, Andre morum de L., fabio caus sicoli, Laerte peotta de melo, and Rafael Timoteo de Sousa junior (key2020092412195939400_ref015) 2011 (key2020092412195939400_ref001) 2012; 9 (key2020092412195939400_ref010) 2016 New ACPO guide for forensics (key2020092412195939400_ref013) 2007 key2020092412195939400_ref006 key2020092412195939400_ref004 (key2020092412195939400_ref005) 2016; 18 key2020092412195939400_ref002 (key2020092412195939400_ref009) 2010; 4 key2020092412195939400_ref012 (key2020092412195939400_ref018) 2011; 8 (key2020092412195939400_ref003) 2011 (key2020092412195939400_ref008) 2009; 2 (key2020092412195939400_ref014) 2015 key2020092412195939400_ref007 |
| References_xml | – ident: key2020092412195939400_ref004 – ident: key2020092412195939400_ref002 – start-page: 20 year: 2007 ident: key2020092412195939400_ref013 article-title: Computer fraud and security – volume: 2 start-page: 169 issue: 2 year: 2009 ident: key2020092412195939400_ref008 article-title: Mobile phone forensics: an overview of technical and legal aspects publication-title: International Journal of Electronic Security and Digital Forensics doi: 10.1504/IJESDF.2009.024901 – volume: 23 start-page: 450 issue: 5 year: 2015 ident: key2020092412195939400_ref016 article-title: Logical acquisition and analysis of data from android mobile devices publication-title: Information and Computer Security doi: 10.1108/ICS-02-2014-0013 – ident: key2020092412195939400_ref012 – volume-title: Digital Evidence and Computer Crime, Third Edition: Forensic Science, computers, and the Internet year: 2011 ident: key2020092412195939400_ref003 – volume: 1 start-page: 266 issue: 4 year: 2004 ident: key2020092412195939400_ref011 article-title: Forensic examination of mobile phones publication-title: Digital Investigation doi: 10.1016/j.diin.2004.11.007 – volume: 9 start-page: S24 year: 2012 ident: key2020092412195939400_ref001 article-title: Forensic analysis of social networking applications on mobile devices publication-title: Digital Investigation doi: 10.1016/j.diin.2012.05.007 – start-page: 496 volume-title: 2016 11th International Conference on year: 2016 ident: key2020092412195939400_ref010 article-title: Digital forensics and analysis for android devices, computer science and education (ICCSE) – volume: 8 start-page: S14 year: 2011 ident: key2020092412195939400_ref018 article-title: Toward a general collection methodology for android devices publication-title: Digital Investigation doi: 10.1016/j.diin.2011.05.003 – volume: 4 start-page: 1 issue: 1 year: 2010 ident: key2020092412195939400_ref009 article-title: Android forensics: simplifying cell phone examinations publication-title: Small, in Scale Digital Device Forensics Journal – ident: key2020092412195939400_ref006 – volume: 8 start-page: 175 issue: 3/4 year: 2012 ident: key2020092412195939400_ref017 article-title: Acquisition and analysis of volatile memory from android devices publication-title: Digital Investigation – volume: 18 start-page: S46 year: 2016 ident: key2020092412195939400_ref005 article-title: Rapid differential forensic imaging of mobile devices publication-title: Digital Investigation doi: 10.1016/j.diin.2016.04.012 – start-page: 116 volume-title: in 9th Australian Digital Forensics Conference year: 2011 ident: key2020092412195939400_ref015 article-title: Acquisition of digital evidence in android smartphones – start-page: 13 volume-title: in Sixth International Conference on Emerging Security Technologies (EST), IEEE Computer Society year: 2015 ident: key2020092412195939400_ref014 article-title: Forensic acquisitions of WhatsApp data on popular mobile platforms – ident: key2020092412195939400_ref007 |
| SSID | ssj0001916361 ssj0004345 |
| Score | 2.186963 |
| Snippet | PurposeThe purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of... |
| SourceID | proquest crossref |
| SourceType | Aggregation Database Enrichment Source Index Database |
| StartPage | 62 |
| SubjectTerms | Application Back up systems Cellular telephones Comparative analysis Confidence intervals Crime Criminal investigations Data Data buses Debugging Electronic devices Forensic analysis Forensic sciences Memory Methodology Mobile communication systems Mobile operating systems Mobile phones Multimedia Operating systems Personal information Political parties Popularity Privacy Research methodology Scripts Smartphones Social networks Software |
| SummonAdditionalLinks | – databaseName: Emerald Management 120 dbid: TMT link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PS8MwFA5jePDi_InTKTl48VC6JE3bXIQxnAo6BCfsVpI01UHXjq3695uXtZOBCIK3Ftq0vCTvfe_19fsQujKBsTA4iD1DufaCOA09m6vEHlcky1SY2RDsKPMfo_E4nk7FcwuNm39hXFvluhzj_PSsWEGS6kPjtvXCG8IBUK95GL5ANxAFRwvQxoeKtf9ezXPnkvuwTydPk--Si4VCzDGoUhv2vUCEpPlw-cNo24Fq20-74DPq_Pdr76O9GobiwXrdHKCWKQ5Rp5F4wPWOP0I3IN1pn6KxrNlLcJnhu7J8yw0e5HmJ50A-DqVBXBYY2iPLWYoXuawADR-j19HtZHjv1ZILnmaEVF5KiCJBqrRSVEZcGB5RIy2osqcyUEIpoUUqaZCRUGQRzTTPbMImQkWYigxjJ6hdlIU5RdjGfsGl7DNttM1xuAyFYiE30nDD4ijuIr-xb6JrPnKQxcgTl5f048QaKumzBAzlWu-66Hpzx2LNxfHLtb1mypJ6V64S0N8i1EZjcfaHoc7Rrj0WMGeE9FC7Wn6YC7SjP6vZannpltgXNKDWiQ priority: 102 providerName: Emerald |
| Title | Forensic analysis of Google Allo messenger on Android platform |
| URI | https://www.proquest.com/docview/2186127189 |
| Volume | 27 |
| WOSCitedRecordID | wos000459747900004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVMCB databaseName: Emerald Management 120 customDbUrl: eissn: 2056-497X dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001916361 issn: 2056-4961 databaseCode: TMT dateStart: 20150101 isFulltext: true titleUrlDefault: https://www.emerald.com/insight providerName: Emerald – providerCode: PRVPQU databaseName: ABI/INFORM Collection customDbUrl: eissn: 2056-497X dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0001916361 issn: 2056-4961 databaseCode: 7WY dateStart: 20150101 isFulltext: true titleUrlDefault: https://www.proquest.com/abicomplete providerName: ProQuest – providerCode: PRVPQU databaseName: ABI/INFORM Global customDbUrl: eissn: 2056-497X dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0001916361 issn: 2056-4961 databaseCode: M0C dateStart: 20150101 isFulltext: true titleUrlDefault: https://search.proquest.com/abiglobal providerName: ProQuest – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 2056-497X dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0001916361 issn: 2056-4961 databaseCode: P5Z dateStart: 20150101 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 2056-497X dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0001916361 issn: 2056-4961 databaseCode: K7- dateStart: 20150101 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: Criminal Justice Database customDbUrl: eissn: 2056-497X dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0001916361 issn: 2056-4961 databaseCode: M0O dateStart: 20150101 isFulltext: true titleUrlDefault: https://search.proquest.com/criminaljusticeperiodicals providerName: ProQuest – providerCode: PRVPQU databaseName: Healthcare Administration Database customDbUrl: eissn: 2056-497X dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0001916361 issn: 2056-4961 databaseCode: M0T dateStart: 20150101 isFulltext: true titleUrlDefault: https://search.proquest.com/healthmanagement providerName: ProQuest – providerCode: PRVPQU databaseName: Library Science Database customDbUrl: eissn: 2056-497X dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0001916361 issn: 2056-4961 databaseCode: M1O dateStart: 20150101 isFulltext: true titleUrlDefault: https://search.proquest.com/libraryscience providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 2056-497X dateEnd: 20241213 omitProxy: false ssIdentifier: ssj0001916361 issn: 2056-4961 databaseCode: BENPR dateStart: 20150101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NT9swFH_iY5p2gQGbBiuVDwiJg9U4jpP4MlQqGAgo1SiC7RLZjjMhhabQjr9_fsYBceHC5SlWYsvKs9-Xn98PYMcm1pnBSU5tLAxN8jKlzlfJqdCsqnRaORXsS-afZcNhfnMjRyHgNgtpla1M9IK6bAzGyHuIncRiJ0nl_vSeImoUnq4GCI1FWEbLBlP6zqPBy71I7kGKY6fkaSJT1h5TRnnvZHCJmUQxCmk0i16rpddS2auao9X3TvIzrAQjk_SfVsUaLNjJOnxsc9zXYTvcViC7JFxHQvaQsM834AcCdk4c_4gKNUtIU5GfTfO3tqRf1w25w5LjGBAkrh8mRTa3JZnWao6jfYGro8Px4JgGoAVqOGNzWjKmWVJqo3WsMiGtyGKrnCnlmirRUmtpZKnipGKprLK4MqJybppMNeM6s5x_haVJM7HfgDiNL4VSETfWOM9GqFRqngqrrLA8z_JN6LX_uTChCjmCYdSF90aivHCcKSJeIGd8wt0m7D33mD5V4Hjj207LlyLsxVnxwpStt19_h09uJInrgrEOLM0f_tlt-GAe57ezhy4sZte_u7B8cDgc_XKt04x2_XLz9MLTMVKGzyPxx9Hx-fg_MFvclw |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1NT9wwEB0hWgGXUr5UvooPFImDtWsnTuIDIEQLrHa7QgIkbsF2nGqlsFnYbVH_VH8jM9kExIUbhx6jxJYSv8y8sWfmAez60CMNDhPupXI8TLKIY6yScGVFntsoRxdctczvxf1-cnOjL2bgX1MLQ2mVjU2sDHVWOtojb5F2kpBoSfXR6J6TahSdrjYSGlNYdP3fRwzZxged77i-36Q8_XF1cs5rVQHuAiEmPBPCijCzzlppYqW9iqU3yBvw0oRWW6udzowMcxHpPJa5UznGJDqyIrCxpw1QNPkfwiCJ6b_qxvylDjOoRJElkgoe6kg0x6LtpNU5uaTMJUlOgWjYazf42gtUru108X_7KJ_hU02i2fEU9Usw44fLMNfk8C_Ddl2NwfZYXW5F8GO1HVuBQxIkHSI-mal7srAyZ2dl-avw7LgoSnZHLdVpw5PhOEr6LAcZGxVmQrOtwvW7vN0azA7Lof8CDBmNVsa0A-cdRm7KRNoGkfLGK4-ISNah1axr6uou6yT2UaRVtNVOUkRC2g5SQkKVULgO-88jRtMOI288u9XgIK1tzTh9AcHG27d3YP786mcv7XX63U1YwFk1YVKILZidPPz22_DR_ZkMxg9fK1gzuH1vyDwBegMzBg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Forensic+analysis+of+Google+Allo+messenger+on+Android+platform&rft.jtitle=Information+management+%26+computer+security&rft.au=Agrawal%2C+Vinayak&rft.au=Tapaswi%2C+Shashikala&rft.date=2019-03-11&rft.pub=Emerald+Group+Publishing+Limited&rft.issn=2056-4961&rft.eissn=2056-497X&rft.volume=27&rft.issue=1&rft.spage=62&rft.epage=80&rft_id=info:doi/10.1108%2FICS-03-2017-0011 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon |