Comparative Analysis of Commercial and Open Source Mobile Device Forensic Tools

被引:0
|
作者
Padmanabhan, Radhika [1 ]
Lobo, Karen [1 ]
Ghelani, Mrunali [1 ]
Sujan, Dhanika [1 ]
Shirole, Mahesh [1 ]
机构
[1] Veermata Jijabai Technol Inst, Dept Comp Sci & Informat Technol, Bombay, Maharashtra, India
关键词
Mobile Forensics; Mobile Device; Open Source; Cyber-Crime; Data Acquisition; Digital Evidence;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
With forensics playing such a crucial role in today's data-driven world, this paper addresses the need to explore the different mobile device forensic tools available. Open Source and Commercial tools are two domains in close contention, with contrasting considerations such as accessibility and security. This paper aims at performing a comparative analysis of the various commercial and open source mobile device forensic tools, with respect to predefined software parameters and by employing a cross-device and testdriven approach. The test scenarios are structured to assess whether the selected tools possess the capabilities of a holistic one, while responding to threats and scenarios pertaining to the digital realm. The Commercial Tools under consideration are MOBILedit! Forensic (including Phone Forensics Express) and Cellebrite's UFED Physical Analyzer, while the Open Source Tools are - The Sleuth Kit (including Autopsy) and SANS SIFT. The result of this paper is a comparison matrix, which could help in identifying the best-fit solution as per the need of the investigation. It could also indicate the degree to which open source tools are comparable to (or better than) their commercial counterparts, and answer questions like Can open source tools be a suitable replacement for the proprietary tools? Can this in reality, be a feasible shift for the forensic industry?
引用
收藏
页码:278 / 283
页数:6
相关论文
共 50 条
  • [31] Using Open Source Forensic Carving tools on split dd and EWF files.
    Palmieri, Gareth
    Zargari, Shahrzad
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, : 379 - 383
  • [32] A FEATURE-BASED ANALYSIS OF OPEN SOURCE TOOLS FOR ENTERPRISE 2.0 Open Source Tools for Team Collaboration in SMEs
    Schauer, Bettina
    Zeiller, Michael
    Matzinger, Robert
    [J]. KMIS 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON KNOWLEDGE MANAGEMENT AND INFORMATION SHARING, 2011, : 57 - 66
  • [33] OPEN SOURCE, 3-D TERRAIN VISUALIZATION ON A MOBILE DEVICE
    Rios, Joseph
    Hogan, Patrick
    Gaskins, Tom
    Collins, David
    [J]. 2014 IEEE/AIAA 33RD DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2014,
  • [34] Open source tools for geographic analysis in transport planning
    Robin Lovelace
    [J]. Journal of Geographical Systems, 2021, 23 : 547 - 578
  • [35] Open source tools for geographic analysis in transport planning
    Lovelace, Robin
    [J]. JOURNAL OF GEOGRAPHICAL SYSTEMS, 2021, 23 (04) : 547 - 578
  • [36] A Comparative Study of Enterprise and Open Source Big Data Analytical Tools
    Chandrasekhar, Udaigiri
    Reddy, Amareswar
    Rath, Rohan
    [J]. 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICT 2013), 2013, : 372 - 377
  • [37] Open Source District Heating Modeling Tools-A Comparative Study
    Becker, Gregor
    Klemm, Christian
    Vennemann, Peter
    [J]. ENERGIES, 2022, 15 (21)
  • [38] Forensic Requirements Specification for Mobile Device Malware Forensic Models
    Alashjaee, Abdullah Mujawib
    Haney, Michael
    [J]. 2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 930 - 935
  • [39] Uncovering Mobile Phone Users' Malicious Activities Using Open Source Tools
    Kotsopoulos, P. A.
    Stamatiou, Y. C.
    [J]. 2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 927 - 933
  • [40] A Comparative Analysis of Digital Forensic Investigation Tools on Facebook Messenger Applications
    Sunardi
    Herman
    Ardiningtias, Syifa Riski
    [J]. Journal of Cyber Security and Mobility, 2022, 11 (05): : 655 - 672