Key Technologies for Mobile Phone Forensics and Application

被引:1
|
作者
Su, Qingchao [1 ]
Xi, Bin [1 ]
机构
[1] Xiamen Univ, Dept Automat, Xiamen, Peoples R China
关键词
mobile phone forensics; SQLite; decryption; data-recovery;
D O I
10.1109/ICMIP.2017.15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile phone is an important source of evidence for judicial staff, but the research of mobile phone forensics system is quite deficient compared with computer forensics. Toward this end, this paper proposed an integrated framework of the mobile phone forensics system, which is based on the characteristic and difficulties of mobile phone forensics. To begin with, the inner structure and forensic process of the system are introduced, which are crucial fundamental techniques for follow-up work. To be specific, it applied three-step strategy, namely, moreover, this paper studies the method of data collection and analyzes the functions of the mobile phone forensics system. At the same time, in order to deal with the database scenario, it proposed a decryption method and a data-recovery method based on SQLite, which is the key part of this paper. Finally, the practicability of this system is shown by graphic demonstration.
引用
收藏
页码:335 / 340
页数:6
相关论文
共 50 条
  • [1] Key Technologies of Phone Storage Forensics Based on ARM Architecture
    Zhang, Jianghan
    Che, Shengbing
    [J]. 2017 INTERNATIONAL SYMPOSIUM ON APPLICATION OF MATERIALS SCIENCE AND ENERGY MATERIALS (SAMSE 2017), 2018, 322
  • [2] Challenges in Mobile Phone Forensics
    Lutes, Kyle D.
    Mislan, Richard P.
    [J]. IMETI 2008: INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL I, PROCEEDINGS, 2008, : 348 - +
  • [3] Mobile phone forensics: an overview of technical and legal aspects
    Induruwa, Abhaya
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2009, 2 (02) : 169 - 181
  • [4] Camera/mobile phone source identification for digital forensics
    Tsai, Min-Jen
    Lai, Cheng-Liang
    Liu, Jung
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PTS 1-3, 2007, : 221 - +
  • [5] Research on UAV Forensics and Its Key Technologies
    Liang, Guangjun
    Jia, Zhen
    Ni, Xueli
    Guo, Xiangmin
    Xia, Lingling
    [J]. ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT II, 2022, 13339 : 670 - 679
  • [6] Use of Mobile Phone Technologies in Learning
    Draganova, Chrisina
    [J]. ITICSE 2009: PROCEEDING OF THE 2009 ACM SIGSE ANNUAL CONFERENCE ON INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, 2009, : 399 - 399
  • [7] Mobile phone forensics - a systematic approach, tools, techniques and challenges
    Kumar, Manish
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (01) : 64 - 87
  • [8] The application design of mobile terminal - Key technologies of mobile location based service
    Tong, XH
    Liu, JG
    Wang, ZG
    Wang, SX
    [J]. APOC 2003: ASIA-PACIFIC OPTICAL AND WIRELESS COMMUNICATIONS; MOBILE SERVICE AND APPLICATION, 2003, 5283 : 108 - 113
  • [9] Instagram Mobile Application Digital Forensics
    Mubarik, Muhammad Asim
    Wang, Zhijian
    Nam, Yunyoung
    Kadry, Seifedine
    Waqar, Muhammad Azam
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 37 (02): : 169 - 186
  • [10] DATA EXTRACTION ON MTK-BASED ANDROID MOBILE PHONE FORENSICS
    Kong, Joe
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2015, 10 (04) : 31 - 41