Digital Forensics Security Analysis on iOS Devices

被引:0
|
作者
Wu, Min-Hao [1 ]
Chang, Ting-Cheng [1 ]
Yi Li-Min [1 ]
机构
[1] Guangzhou Panyu Polytech, Coll Informat Engn, Guangzhou 511483, Guangdong, Peoples R China
来源
JOURNAL OF WEB ENGINEERING | 2021年 / 20卷 / 03期
关键词
Mobile forensics; iOS forensics; Instant messaging; Social networking; WeChat; QQ; Jailbreak;
D O I
10.13052/jwe1540-9589.20310
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
With the rapid development of the Internet era, cell phones play an essential and indispensable role in nowadays life. Smartphones have profoundly influenced our social relationships and our daily lives. Generally speaking, the most common tools we hear about in our daily lives are QQ, WeChat, and other Internet communication services that allow users to send text messages, pictures, and documents, providing a more convenient and faster medium for people to communicate and chat. The popularity and convenience of mobile technology have changed people's habits of communication. People no longer need to rely on computers to communicate, and computers cannot communicate anytime and anywhere. In the kernel of Linux and Windows, as long as the Message Hooker will install, it can monitor the messages of other programs, including WeChat and QQ, in this research. We can provide relevant law enforcement officers with effective evidence collection so that criminals will not be able to hide. The suspects often delete their WeChat or QQ records after committing the crime. It impossible for our law enforcement agencies to obtain evidence directly from the cell phone and the crime facts. Our research hopes to use some technology to help law enforcement units effectively obtain strong evidence in the iPhone not to hide the crime facts.
引用
收藏
页码:775 / 793
页数:19
相关论文
共 50 条
  • [1] iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
    Liu, Jigang
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2011, 6 (04) : 63 - 66
  • [2] Digital forensics and analysis for Android devices
    Li, Zhi
    Xi, Bin
    Wu, Shunxiang
    [J]. 2016 11TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE), 2016, : 496 - 500
  • [3] Methodology and Challenges in Digital Security Forensics of Wireless Systems and Devices
    Achi, H.
    Hellany, A.
    Nagrial, M.
    [J]. 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES 2009), 2009, : 283 - 287
  • [4] Network Security Approach for Digital Forensics Analysis
    Achi, H.
    Hellany, A.
    Nagrial, M.
    [J]. ICCES: 2008 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2007, : 263 - 267
  • [5] Security and privacy challenges in the field of iOS device forensics
    Bullock, Dave
    Aliyu, Aliyu
    Maglaras, Leandros
    Ferrag, Mohamed Amine
    [J]. AIMS Electronics and Electrical Engineering, 2020, 4 (03): : 249 - 258
  • [6] Read the digital fingerprints: log analysis for digital forensics and security
    Kara, Ilker
    [J]. Computer Fraud and Security, 2021, 2021 (07): : 11 - 16
  • [7] iPhone and iOS Forensic: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
    Garfinkel, Simson
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2013, 8 (04) : 65 - 67
  • [8] Digital Forensics Curriculum in Security Education
    Srinivasan, S.
    [J]. JOURNAL OF INFORMATION TECHNOLOGY EDUCATION-INNOVATIONS IN PRACTICE, 2013, 12 : 147 - 157
  • [9] iOS Encryption Systems Deploying iOS Devices in Security-critical Environments
    Teufl, Peter
    Zefferer, Thomas
    Stromberger, Christof
    Hechenblaikner, Christoph
    [J]. PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 170 - 182
  • [10] An Ontology for Digital Security and Digital Forensics Investigative Techniques
    Ellison, Dagney
    Venter, Hein
    [J]. PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 119 - 127