X
Xiong Xiong
Researcher at Chinese Ministry of Public Security
Publications - 10
Citations - 78
Xiong Xiong is an academic researcher from Chinese Ministry of Public Security. The author has contributed to research in topics: Android (operating system) & Password. The author has an hindex of 3, co-authored 10 publications receiving 66 citations.
Papers
More filters
Journal ArticleDOI
Forensic analysis of WeChat on Android smartphones
TL;DR: This paper describes several common questions that arise in forensic examinations of Android WeChat and provides corresponding technical methods that are useful to address these questions.
Patent
Feature extraction achieving method based on deploy and control data mining
TL;DR: In this article, a feature extraction achieving method based on deploy and control data mining is proposed, which includes that deploy-and-control data in an instant messaging tool is obtained; online time of different instant messaging accounts with the same internet protocol (IP) address is analyzed to obtain time relation among the accountants; password data, behavior data of all instant messaging users, and same-person relation value among the accounts are obtained through comprehensive analysis according to the time relation, the password relation, and the behavior relation.
Patent
Mobile phone evidence obtaining method based on recovery
TL;DR: In this article, a mobile phone evidence obtaining method based on recovery of the structure is adopted to perform mobile phone information reading on the Android mobile phone so that Android mobile phones information reading efficiency is greatly enhanced, data reading is complete and effective, judicial evidence obtaining and actual work demands can be effectively assisted.
Patent
Memory device data recovery achieving method based on flash memory chip
TL;DR: In this article, the authors proposed a data recovery method based on a flash memory chip, where the data is rearranged in a logic arrangement mode from a physical arrangement mode according to marked information in a backup data area, and the file mirror images capable of being recognized by the operation system are restored according to the data storage rules.
Journal ArticleDOI
Efficient Privacy Leakage Discovery for Android Applications Based on Static Analysis
TL;DR: This work proposes a static analysis framework to discovery the sensitive data propagation paths and extract execution conditions (including data inputs and events inputs) of these paths and shows that this scheme can effectively help discover the privacy leakage behaviors in the malicious apps.