Table 1.
A comparison of adversary models.
Fig 1.
Android evidence collection and analysis methodology (adapted from [5]).
Table 2.
A mapping of methodology stages to adversary capabilities, constraints and adherence to forensic soundness constraints.
Table 3.
A comparison of Android data collection methodologies.