Forensic analysis of Google Allo messenger on Android platform

PurposeThe purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of the data stored by this application in the internal memory of the mobile device, with minimal use of third-party applications. The findings w...

Full description

Saved in:
Bibliographic Details
Published in:Information and computer security Vol. 27; no. 1; pp. 62 - 80
Main Authors: Agrawal, Vinayak, Tapaswi, Shashikala
Format: Journal Article
Language:English
Published: Bingley Emerald Group Publishing Limited 11.03.2019
Subjects:
ISSN:2056-4961, 2056-497X
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract PurposeThe purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of the data stored by this application in the internal memory of the mobile device, with minimal use of third-party applications. The findings were compared with the already existing works on this topic. Android is the most popular operating system for mobile devices, and these devices often contain a massive amount of personal information about the user such as photos and contact details. Analysis of these applications is required in case of a forensic investigation and makes the process easier for forensic analysts.Design/methodology/approachLogical acquisition of the data stored by these applications was performed. A locked Android device was used for this purpose. Some scripts are presented to help in data acquisition using Android Debug Bridge (ADB). Manual forensic analysis of the device image was performed to see whether the activities carried out on these applications are stored in the internal memory of the device. A comparative analysis of an existing mobile forensic tool was also performed to show the effectiveness of the methodology adopted.FindingsForensic artifacts were recovered from Allo application. Multimedia content such as images were also retrieved from the internal memory.Research limitations/implicationsAs this study was conducted for forensic analysis, it assumed that the mobile device used already has USB debugging enabled on it, although this might not be the applicable in some of the cases. This work provides an optimal approach to acquiring artifacts with minimal use of third-party applications.Practical implicationsMost of the mobile devices contain messaging application such as Allo installed. A large amount of personal information can be obtained from the forensic analysis of these applications, which can be useful in any criminal investigation.Originality/valueThis is the first study which focuses on the Google Allo application. The proposed methodology was able to extract almost as much as the data obtained using earlier approaches, but with minimal third-party application usage.
AbstractList PurposeThe purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of the data stored by this application in the internal memory of the mobile device, with minimal use of third-party applications. The findings were compared with the already existing works on this topic. Android is the most popular operating system for mobile devices, and these devices often contain a massive amount of personal information about the user such as photos and contact details. Analysis of these applications is required in case of a forensic investigation and makes the process easier for forensic analysts.Design/methodology/approachLogical acquisition of the data stored by these applications was performed. A locked Android device was used for this purpose. Some scripts are presented to help in data acquisition using Android Debug Bridge (ADB). Manual forensic analysis of the device image was performed to see whether the activities carried out on these applications are stored in the internal memory of the device. A comparative analysis of an existing mobile forensic tool was also performed to show the effectiveness of the methodology adopted.FindingsForensic artifacts were recovered from Allo application. Multimedia content such as images were also retrieved from the internal memory.Research limitations/implicationsAs this study was conducted for forensic analysis, it assumed that the mobile device used already has USB debugging enabled on it, although this might not be the applicable in some of the cases. This work provides an optimal approach to acquiring artifacts with minimal use of third-party applications.Practical implicationsMost of the mobile devices contain messaging application such as Allo installed. A large amount of personal information can be obtained from the forensic analysis of these applications, which can be useful in any criminal investigation.Originality/valueThis is the first study which focuses on the Google Allo application. The proposed methodology was able to extract almost as much as the data obtained using earlier approaches, but with minimal third-party application usage.
Author Tapaswi, Shashikala
Agrawal, Vinayak
Author_xml – sequence: 1
  givenname: Vinayak
  surname: Agrawal
  fullname: Agrawal, Vinayak
– sequence: 2
  givenname: Shashikala
  surname: Tapaswi
  fullname: Tapaswi, Shashikala
BookMark eNp1kE1LAzEQhoNUsNbePQY8RzPZ3WRzEUqxH1DwoIK3kGSTsmWb1GR76L93S8WD4GnegecdhucWjUIMDqF7oI8AtH5az98ILQijIAilAFdozGjFSSnF5-g3c7hB05x3dEAk8ILDGD0vYnIhtxbroLtTbjOOHi9j3HYOz7ou4r3L2YWtSzgGPAtNim2DD53ufUz7O3TtdZfd9GdO0Mfi5X2-IpvX5Xo-2xBbAPSkATBQNsYaw7SopKsEc7qCclh1aaQx0spGs9IDl14wbysvZS25gcIIVxQT9HC5e0jx6-hyr3bxmIaPs2JQc2ACajlQ9ELZFHNOzqtDavc6nRRQdRalBlGKFuosSp1FDRX-p2LbXvdtDH3Sbfd_8Ru3FG32
CitedBy_id crossref_primary_10_1111_1556_4029_14750
crossref_primary_10_1108_ICS_03_2021_0038
crossref_primary_10_3390_info14120629
Cites_doi 10.1504/IJESDF.2009.024901
10.1108/ICS-02-2014-0013
10.1016/j.diin.2004.11.007
10.1016/j.diin.2012.05.007
10.1016/j.diin.2011.05.003
10.1016/j.diin.2016.04.012
ContentType Journal Article
Copyright Emerald Publishing Limited 2019
Copyright_xml – notice: Emerald Publishing Limited 2019
DBID AAYXX
CITATION
0-V
7SC
7WY
7WZ
7XB
8AO
8FD
8FE
8FG
8FI
ABUWG
AFKRA
ALSLI
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
BGRYB
CCPQU
CNYFK
DWQXO
E3H
F2A
FYUFA
F~G
GNUQQ
HCIFZ
JQ2
K6~
K7-
L.-
L.0
L7M
L~C
L~D
M0C
M0N
M0O
M0T
M1O
P5Z
P62
PHGZM
PHGZT
PJZUB
PKEHL
PPXIY
PQBIZ
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PRQQA
PYYUZ
Q9U
DOI 10.1108/ICS-03-2017-0011
DatabaseName CrossRef
ProQuest Social Sciences Premium Collection【Remote access available】
Computer and Information Systems Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
Hospital Premium Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Social Science Premium Collection
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Business Premium Collection
ProQuest Technology Collection
Criminology Collection
ProQuest One
Library & Information Science Collection
ProQuest Central Korea
Library & Information Sciences Abstracts (LISA)
Library & Information Science Abstracts (LISA)
Health Research Premium Collection
ABI/INFORM Global (Corporate)
ProQuest Central Student
SciTech Collection (ProQuest)
ProQuest Computer Science Collection
ProQuest Business Collection
Computer Science Database
ABI/INFORM Professional Advanced
ABI/INFORM Professional Standard
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
Criminal Justice Database
Healthcare Administration Database
Library Science Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest Health & Medical Research Collection
ProQuest One Academic Middle East (New)
ProQuest One Health & Nursing
ProQuest One Business
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest One Social Sciences
ABI/INFORM Collection China
ProQuest Central Basic
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Library and Information Science Abstracts (LISA)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
SciTech Premium Collection
ProQuest Central China
ABI/INFORM Complete
ProQuest One Applied & Life Sciences
Health Research Premium Collection
Health & Medical Research Collection
Library & Information Science Collection
ProQuest Central (New)
Advanced Technologies & Aerospace Collection
Business Premium Collection
Social Science Premium Collection
ABI/INFORM Global
ProQuest One Academic Eastern Edition
ProQuest Hospital Collection
ProQuest Technology Collection
ProQuest Business Collection
Criminology Collection
ProQuest Social Sciences Premium Collection
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ABI/INFORM Global (Corporate)
ProQuest One Business
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest One Health & Nursing
ProQuest Pharma Collection
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest Library Science
ProQuest Health & Medical Research Collection
ProQuest Criminal Justice
ABI/INFORM Professional Standard
ProQuest Central Korea
Advanced Technologies Database with Aerospace
ProQuest Computing
ProQuest One Social Sciences
ProQuest Central Basic
ProQuest Health Management
ABI/INFORM China
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
DatabaseTitleList Computer Science Database
Database_xml – sequence: 1
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
Library & Information Science
Business
EISSN 2056-497X
EndPage 80
ExternalDocumentID 10_1108_ICS_03_2017_0011
GroupedDBID .WU
0-V
3FY
5VS
7WY
8AO
8FE
8FG
8FI
8FW
9F-
AAGBP
AAKOT
AAMCF
AAUDR
AAVEV
AAXBI
AAYXX
ABIJV
ABJNI
ABSDC
ABUWG
ABXQL
ABYQI
ACGFS
ACTSA
ACZKX
ADBBV
ADFLA
ADOMW
ADQHX
ADWNT
AFFHD
AFKRA
AHMHQ
AILOG
AJEBP
AJZCB
ALMA_UNASSIGNED_HOLDINGS
ALSLI
AODMV
AQUVI
ARALO
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
BGRYB
BPHCQ
BVXVI
CCPQU
CITATION
CNYFK
DWQXO
EBS
ECCUG
EJD
FNNZZ
FYUFA
GEA
GEI
GMX
GNUQQ
GQ.
H13
HCIFZ
K6V
K6~
K7-
KBGRL
M0C
M0O
M0T
M1O
M42
P62
PHGZM
PHGZT
PJZUB
PPXIY
PQBIZ
PQGLB
PQQKQ
PROAC
PRQQA
SCAQC
SDURG
SLOBJ
TEM
TGG
TMF
TMI
TMT
UKHRP
Z11
Z12
Z21
ZYZAG
.DC
29I
4.4
5GY
70U
77I
77K
7SC
7XB
8FD
8R4
8R5
9E0
AAPSD
ABEAN
ACGFO
AEBZA
AEDOK
AEMMR
AETHF
AFNZV
AIAFM
AJFKA
APPLU
ATGMP
CS3
DU5
E3H
F2A
GEB
GEC
GMM
GMN
J1Y
JI-
JL0
JQ2
L.-
L.0
L7M
L~C
L~D
M0N
P2P
PKEHL
PQEST
PQUKI
PRINS
Q2X
Q3A
Q9U
RWL
TAE
TDQ
TET
TMD
TMK
TMX
Z22
ID FETCH-LOGICAL-c311t-d11b14dbcbb2a759e572ea514b2aa4b9bb9c9da24f169f72fc5f99896b13b7e33
IEDL.DBID M0C
ISICitedReferencesCount 5
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000459747900004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 2056-4961
IngestDate Sat Nov 15 03:21:35 EST 2025
Sat Nov 29 07:44:25 EST 2025
Tue Nov 18 22:25:53 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License https://www.emerald.com/insight/site-policies
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c311t-d11b14dbcbb2a759e572ea514b2aa4b9bb9c9da24f169f72fc5f99896b13b7e33
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2186127189
PQPubID 31135
PageCount 19
ParticipantIDs proquest_journals_2186127189
crossref_primary_10_1108_ICS_03_2017_0011
crossref_citationtrail_10_1108_ICS_03_2017_0011
PublicationCentury 2000
PublicationDate 2019-03-11
PublicationDateYYYYMMDD 2019-03-11
PublicationDate_xml – month: 03
  year: 2019
  text: 2019-03-11
  day: 11
PublicationDecade 2010
PublicationPlace Bingley
PublicationPlace_xml – name: Bingley
PublicationTitle Information and computer security
PublicationYear 2019
Publisher Emerald Group Publishing Limited
Publisher_xml – name: Emerald Group Publishing Limited
References (key2020092412195939400_ref017) 2012; 8
(key2020092412195939400_ref011) 2004; 1
(key2020092412195939400_ref016) 2015; 23
Simao, Andre morum de L., fabio caus sicoli, Laerte peotta de melo, and Rafael Timoteo de Sousa junior (key2020092412195939400_ref015) 2011
(key2020092412195939400_ref001) 2012; 9
(key2020092412195939400_ref010) 2016
New ACPO guide for forensics (key2020092412195939400_ref013) 2007
key2020092412195939400_ref006
key2020092412195939400_ref004
(key2020092412195939400_ref005) 2016; 18
key2020092412195939400_ref002
(key2020092412195939400_ref009) 2010; 4
key2020092412195939400_ref012
(key2020092412195939400_ref018) 2011; 8
(key2020092412195939400_ref003) 2011
(key2020092412195939400_ref008) 2009; 2
(key2020092412195939400_ref014) 2015
key2020092412195939400_ref007
References_xml – ident: key2020092412195939400_ref004
– ident: key2020092412195939400_ref002
– start-page: 20
  year: 2007
  ident: key2020092412195939400_ref013
  article-title: Computer fraud and security
– volume: 2
  start-page: 169
  issue: 2
  year: 2009
  ident: key2020092412195939400_ref008
  article-title: Mobile phone forensics: an overview of technical and legal aspects
  publication-title: International Journal of Electronic Security and Digital Forensics
  doi: 10.1504/IJESDF.2009.024901
– volume: 23
  start-page: 450
  issue: 5
  year: 2015
  ident: key2020092412195939400_ref016
  article-title: Logical acquisition and analysis of data from android mobile devices
  publication-title: Information and Computer Security
  doi: 10.1108/ICS-02-2014-0013
– ident: key2020092412195939400_ref012
– volume-title: Digital Evidence and Computer Crime, Third Edition: Forensic Science, computers, and the Internet
  year: 2011
  ident: key2020092412195939400_ref003
– volume: 1
  start-page: 266
  issue: 4
  year: 2004
  ident: key2020092412195939400_ref011
  article-title: Forensic examination of mobile phones
  publication-title: Digital Investigation
  doi: 10.1016/j.diin.2004.11.007
– volume: 9
  start-page: S24
  year: 2012
  ident: key2020092412195939400_ref001
  article-title: Forensic analysis of social networking applications on mobile devices
  publication-title: Digital Investigation
  doi: 10.1016/j.diin.2012.05.007
– start-page: 496
  volume-title: 2016 11th International Conference on
  year: 2016
  ident: key2020092412195939400_ref010
  article-title: Digital forensics and analysis for android devices, computer science and education (ICCSE)
– volume: 8
  start-page: S14
  year: 2011
  ident: key2020092412195939400_ref018
  article-title: Toward a general collection methodology for android devices
  publication-title: Digital Investigation
  doi: 10.1016/j.diin.2011.05.003
– volume: 4
  start-page: 1
  issue: 1
  year: 2010
  ident: key2020092412195939400_ref009
  article-title: Android forensics: simplifying cell phone examinations
  publication-title: Small, in Scale Digital Device Forensics Journal
– ident: key2020092412195939400_ref006
– volume: 8
  start-page: 175
  issue: 3/4
  year: 2012
  ident: key2020092412195939400_ref017
  article-title: Acquisition and analysis of volatile memory from android devices
  publication-title: Digital Investigation
– volume: 18
  start-page: S46
  year: 2016
  ident: key2020092412195939400_ref005
  article-title: Rapid differential forensic imaging of mobile devices
  publication-title: Digital Investigation
  doi: 10.1016/j.diin.2016.04.012
– start-page: 116
  volume-title: in 9th Australian Digital Forensics Conference
  year: 2011
  ident: key2020092412195939400_ref015
  article-title: Acquisition of digital evidence in android smartphones
– start-page: 13
  volume-title: in Sixth International Conference on Emerging Security Technologies (EST), IEEE Computer Society
  year: 2015
  ident: key2020092412195939400_ref014
  article-title: Forensic acquisitions of WhatsApp data on popular mobile platforms
– ident: key2020092412195939400_ref007
SSID ssj0001916361
ssj0004345
Score 2.187066
Snippet PurposeThe purpose of this paper is to conduct a forensic analysis of Google Allo messenger on an Android-based mobile phone. The focus was on the analysis of...
SourceID proquest
crossref
SourceType Aggregation Database
Enrichment Source
Index Database
StartPage 62
SubjectTerms Application
Back up systems
Cellular telephones
Comparative analysis
Confidence intervals
Crime
Criminal investigations
Data
Data buses
Debugging
Electronic devices
Forensic analysis
Forensic sciences
Memory
Methodology
Mobile communication systems
Mobile operating systems
Mobile phones
Multimedia
Operating systems
Personal information
Political parties
Popularity
Privacy
Research methodology
Scripts
Smartphones
Social networks
Software
SummonAdditionalLinks – databaseName: Emerald Management 120
  dbid: TMT
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3NS8MwFA9jePDi_MTplBy8eCht0jRpLsIYTj04BCfsVpK01UHXjq3695uXtRNBBMFbC21aXt53X38_hK7CnBoqVO7FMeceAzWWWgQeY1QpKk0uuHJkE2IyiWcz-dRBk_ZfGDdWuWnHOD89L9dQpPowuG298BZwANhrHkbPMA1EwdFCauNDx9p_qxeFc8kB2On0cfrVcrGpUOgQVKkN-x6TnLQfLn9Y7Xug-u6nXfAZ9_77tffRXpOG4uFGbw5QJysPUa-leMCNxR-hG6DutE8xWDXoJbjK8V1VvRYZHhZFhRcAPg6tQVyVGMYjq3mKl4WqIRs-Ri_j2-no3msoFzwTElJ7KSGasFQbrakSkcwiQTNlkyp7qpiWWksjU0VZTrjMBc1NlNuCTXJNQi2yMDxB3bIqs1OETWQzURowEwKlScZjI1LBpIl5asMlDfrIb-WbmAaPHGgxisTVJUGcWEElQZiAoNzoXR9db-9YbrA4frl20G5Z0ljlOgH-LUJtNJZnf1jqHO3aYwl7RsgAdevVe3aBdsxHPV-vLp2KfQJTANWp
  priority: 102
  providerName: Emerald
Title Forensic analysis of Google Allo messenger on Android platform
URI https://www.proquest.com/docview/2186127189
Volume 27
WOSCitedRecordID wos000459747900004&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVMCB
  databaseName: Emerald Management 120
  customDbUrl:
  eissn: 2056-497X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0001916361
  issn: 2056-4961
  databaseCode: TMT
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: https://www.emerald.com/insight
  providerName: Emerald
– providerCode: PRVPQU
  databaseName: ABI/INFORM Collection
  customDbUrl:
  eissn: 2056-497X
  dateEnd: 20241212
  omitProxy: false
  ssIdentifier: ssj0001916361
  issn: 2056-4961
  databaseCode: 7WY
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/abicomplete
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ABI/INFORM Global
  customDbUrl:
  eissn: 2056-497X
  dateEnd: 20241212
  omitProxy: false
  ssIdentifier: ssj0001916361
  issn: 2056-4961
  databaseCode: M0C
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/abiglobal
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Advanced Technologies & Aerospace Database
  customDbUrl:
  eissn: 2056-497X
  dateEnd: 20241212
  omitProxy: false
  ssIdentifier: ssj0001916361
  issn: 2056-4961
  databaseCode: P5Z
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/hightechjournals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Computer Science Database (ProQuest)
  customDbUrl:
  eissn: 2056-497X
  dateEnd: 20241212
  omitProxy: false
  ssIdentifier: ssj0001916361
  issn: 2056-4961
  databaseCode: K7-
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/compscijour
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Criminal Justice Database
  customDbUrl:
  eissn: 2056-497X
  dateEnd: 20241212
  omitProxy: false
  ssIdentifier: ssj0001916361
  issn: 2056-4961
  databaseCode: M0O
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/criminaljusticeperiodicals
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Healthcare Administration Database
  customDbUrl:
  eissn: 2056-497X
  dateEnd: 20241212
  omitProxy: false
  ssIdentifier: ssj0001916361
  issn: 2056-4961
  databaseCode: M0T
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/healthmanagement
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Library Science Database
  customDbUrl:
  eissn: 2056-497X
  dateEnd: 20241212
  omitProxy: false
  ssIdentifier: ssj0001916361
  issn: 2056-4961
  databaseCode: M1O
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: https://search.proquest.com/libraryscience
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 2056-497X
  dateEnd: 20241212
  omitProxy: false
  ssIdentifier: ssj0001916361
  issn: 2056-4961
  databaseCode: BENPR
  dateStart: 20150101
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1LT-QwDLZ4Ce2F14JggVEOaCUO0TRp2jQXEIx4CTGMdme1wKVK0hYhdaezzMDvJw4piAsXLlajNlFUO7bjOP4A9uKKWy51RbMsTalAMVZGRlQIrjVXtpKp9mATst_Pbm7UIATcJiGtstWJXlEXjcUYeRexkxh3mlQdjv9TRI3C09UAoTEL8-jZYErfVdR7vxcZe5Bi7ow8FSpl7TFllHUver8xk4ijkka36KNZ-qiVvak5Xf7qJFdgKTiZ5OhVKlZhphytwWKb474Gu-G2AvlJwnUkZA8J6_w7HCBg58jxj-hQs4Q0FTlrmvu6JEd13ZB_WHIcA4LE9cOkyOahIONaT3G0dfhzejLsndMAtEBtzNiUFowZJgpjjeFaJqpMJC-1c6VcUwujjFFWFZqLiqWqkryySeW2aSo1LDayjOMNmBs1o3ITiE2c_8kjYWMEMinTzMpCCmWztHBGkkdb0G3_c25DFXIEw6hzvxuJstxxJo_iHDnjE-62YP-tx_i1Ascn3-60fMnDWpzk70z58fnrbfjmRlIoF4ztwNz08anchQX7PH2YPHZgVv697cD88Ul_8Mu1LiXteHHz9NrTIVKGz4PkztHh1fAFLvvbtw
linkProvider ProQuest
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Bb9MwFH6qNsS4DOg20dGCD4C0g9XYceP4AFNVGK1aKiSKtFuwHQdVCk3XFhB_it-IX5qs2qW3HThGiS0l_vK99-z33gfwKsy45VJnNI6jiAqEsTIyoEJwrbmymYx0KTYhp9P4-lp9bsDfuhYG0yprTiyJOi0s7pF3UTuJcc-k6nJ5Q1E1Ck9XawmNLSzG7s9vH7Kt347e-_V9zfnVh9lgSCtVAWpDxjY0ZcwwkRprDNeyp1xPcqe93-AvtTDKGGVVqrnIWKQyyTPby3xMoiLDQiMdboB6yj8UYSzxvxpLuqvDDEtRZO6dCipUxOpj0SDujgZfMHOJo1FAN-yuGbxrBUrTdvX4f_soT-C4cqJJf4v6p9BwiyY8rHP4m9CpqjHIG1KVWyH8SMVjJ_AOBUkXHp9EVz1ZSJGRj0XxPXekn-cF-YEt1XHDk_hxmPRZzFOyzPUGZzuFr_fydmdwsCgW7hkQ2_P-NQ-EDVGoxUWxlakUysZR6p0AHrSgW69rYqsu6yj2kSdltBXEiUdCEoQJIqFMKGzBxe2I5bbDyJ5n2zUOkopr1skOBOf7b7-Eo-Hs0ySZjKbj5_DIz6oQk4y14WCz-uk68MD-2szXqxclrAl8u2_I_AM1QzIm
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Forensic+analysis+of+Google+Allo+messenger+on+Android+platform&rft.jtitle=Information+management+%26+computer+security&rft.au=Agrawal%2C+Vinayak&rft.au=Tapaswi%2C+Shashikala&rft.date=2019-03-11&rft.pub=Emerald+Group+Publishing+Limited&rft.issn=2056-4961&rft.eissn=2056-497X&rft.volume=27&rft.issue=1&rft.spage=62&rft.epage=80&rft_id=info:doi/10.1108%2FICS-03-2017-0011
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon