scispace - formally typeset
X

Xiong Xiong

Researcher at Chinese Ministry of Public Security

Publications -  10
Citations -  78

Xiong Xiong is an academic researcher from Chinese Ministry of Public Security. The author has contributed to research in topics: Android (operating system) & Password. The author has an hindex of 3, co-authored 10 publications receiving 66 citations.

Papers
More filters
Journal ArticleDOI

Forensic analysis of WeChat on Android smartphones

TL;DR: This paper describes several common questions that arise in forensic examinations of Android WeChat and provides corresponding technical methods that are useful to address these questions.
Patent

Feature extraction achieving method based on deploy and control data mining

TL;DR: In this article, a feature extraction achieving method based on deploy and control data mining is proposed, which includes that deploy-and-control data in an instant messaging tool is obtained; online time of different instant messaging accounts with the same internet protocol (IP) address is analyzed to obtain time relation among the accountants; password data, behavior data of all instant messaging users, and same-person relation value among the accounts are obtained through comprehensive analysis according to the time relation, the password relation, and the behavior relation.
Patent

Mobile phone evidence obtaining method based on recovery

TL;DR: In this article, a mobile phone evidence obtaining method based on recovery of the structure is adopted to perform mobile phone information reading on the Android mobile phone so that Android mobile phones information reading efficiency is greatly enhanced, data reading is complete and effective, judicial evidence obtaining and actual work demands can be effectively assisted.
Patent

Memory device data recovery achieving method based on flash memory chip

TL;DR: In this article, the authors proposed a data recovery method based on a flash memory chip, where the data is rearranged in a logic arrangement mode from a physical arrangement mode according to marked information in a backup data area, and the file mirror images capable of being recognized by the operation system are restored according to the data storage rules.
Journal ArticleDOI

Efficient Privacy Leakage Discovery for Android Applications Based on Static Analysis

TL;DR: This work proposes a static analysis framework to discovery the sensitive data propagation paths and extract execution conditions (including data inputs and events inputs) of these paths and shows that this scheme can effectively help discover the privacy leakage behaviors in the malicious apps.