Abstract
Smartphone is not only used for communication nowadays but also used for doing computational operations as well as storing information of a user. Due to enhancement, cyber criminals are using smartphones to install malicious software and hack the information of a user or do malicious activities. Smartphone forensics is one of the new topics of network forensics. In this chapter, smartphone forensic process model along all process is discussed. A standard process model consists of preservation, acquisition, examination, and analysis, and reporting of retrieved data is also discussed. Various frameworks for smartphone forensics are also discussed. Smartphone forensic tools are also discussed. In the last section the research challenges related to smartphone forensic are also discussed.
Similar content being viewed by others
References
Wayne J, Richard PA (2007) SP 800-101. Guidelines on cell phone forensics. National Institute of Standards & Technology, Gaithersburg, MD, United States
McKemmish R (2008) When is digital evidence forensically sound?. In: Advances in digital forensics IV, vol 285. Springer US, pp 3–15
Casey E (2011) Digital evidence and computer crime, 3rd edn. Academic Press
Bennett D (2012) The challenges facing computer forensics investigators in obtaining information from smartphone devices for use in criminal investigations. Inf Secur J Glob Perspect 21(3):159–168
Al-Zarouni M (2006) Mobile handset forensic evidence: a challenge for law enforcement. In: 4th Australian digital forensics conference, Edith Cowan University, Perth Western Australia
Lessard J, Kessler G (2010) Android forensics: simplifying cell phone examinations. Small Scale Digital Device Forensics (SSDDF’2010), p 12
ACPO (2007) Good practice guide for computer-based electronic evidence
Yu X, Jiang LH, Shu H, Yin Q, Liu T-M (2009) A process model for forensic analysis of Symbian smart phones. Commun Comput Inf Sci 59:86–93
Savoldi A, Gubian P (2009) Issues in Symbian S60 platform forensics. J Commun Comput 6(3):16
Breeuwsma IMF (2006) Forensic imaging of embedded systems using JTAG (boundary-scan). Digit Investig 3(1):32–42
Breeuwsma M, Jongh MD, Klaver C, Knijff RVD, Roeloffs M (2007) Forensic data recovery from flash memory. Small Scale Digit Device Forensics J 1(1):1–17
Mokhonoana PM, Olivier MS (2007) Acquisition of a Symbian smart phone’s content with an on-phone forensic tool. In: Southern Africa Telecommunication Networks and applications conference (SATNAC 2007), Sugar Beach Resort, Mauritius
Ramabhadran A (2009) Forensic investigation process model for windows mobile devices. Available: http://www.forensicfocus.com/downloads/windows-mobile-forensic-process-model.pdf, 31 Mar 2016
Valjarevic A, Venter HS (2012) Harmonised digital forensic investigation process model. In: IEEE information security for South Africa (ISSA’12), Johannesburg, Gauteng, pp 1–10
Omeleze S, Venter HS (2013) Testing the harmonised digital forensic investigation process model-using an Android smartphone phone. In: IEEE information security for South Africa, (ISSA’13), Johannesburg, pp 1–8
Ayers R, Brothers S, Jansen W (2014) Guidelines on mobile device forensics. [Online]. Available: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-101r1.pdf, 31 Mar 2016
Grispos G, Storer T, Glisson WB (2011) A comparison of forensic evidence recovery techniques for a windows mobile smart phone. Digit Investig 8(1):23–36
Quick D, Alzaabi M (2011) Forensic analysis of the android file system YAFFS2. In: 9th Australian digital forensics conference, Edith Cowan University, Perth Western Australia
Thing VLL, Chua TW (2012) Symbian smartphone forensics: linear bitwise data acquisition and fragmentation analysis. In: Computer applications for security, control and system engineering, vol 339. Springer, Berlin/Heidelberg, pp 62–69
Alghafli KA, Jones A, Martin TA (2012) Forensics data acquisition methods for mobile phones. In: IEEE 7th international conference for internet technology and secured transactions (ICITST-2012). London, pp 265–269
Sasidharan SK, Thomas KL (2011) BlackBerry forensics: an agent based approach for database acquisition. In: Advances in computing and communications, vol 190. Springer, Berlin/Heidelberg, pp 552–561
Park J, Chung H, Lee S (2012) Forensic analysis techniques for fragmented flash memory pages in smartphones. Digit Investig 9(2):109–118
Ahmed R, Dharaskar DRV, Thakare DVM (2013) Efficient generalized forensics framework for extraction and documentation of evidence from mobile devices. Int J Enhanc Res Manage Comput Appl, (IJERMCA’13), 2(1):7
Cellebrite (1999) Cellebrite UFED touch ultimate. Available: http://www.cellebrite.com/smartphone-forensics/products/standalone/ufed-touch-ultimate, 2014
Fedorov O (2009) Oxygen forensic suite. Available: http://www.oxygen-forensic.com/en/download/documentation, 2014
P Corporation (2004) Device seizure. Available: https://www.paraben.com/downloads/ds7-guide.pdf, 2015
A Data ( n.d.) Mobile Phone Examiner Plus (MPE+)
Hoog A (2014) Now secure forensic suite. Available: https://www.nowsecure.com/forensics/, 2015
F Data (n.d.) Final mobile forensics. Available: http://www.finaldata.com/Forum2/?s=PRD&c=18&n=51, 31 Mar 2016
M Systemation (2014) XRY complete. Available: https://www.msab.com/xry/xry-complete, 31 Mar 2016
K Forensics (2014) Lantern. Available: https://katanaforensics.com/products/, 31 Mar 2016
S Inc (1992) Secure view. Available: http://secureview.us/kits-and-more.html, 31 Mar 2016
Logicube (n.d.) CellDek. Available: http://www.logicube.com/knowledge/celldek-tek#sd, 31 Mar 2016
C Labs (2010) Mobiledit forensic. [Online]. Available: http://www.smartphonedit.com/forensic-guide, 31 Mar 2016
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer-Verlag London
About this chapter
Cite this chapter
Joshi, R.C., Pilli, E.S. (2016). Smartphone Forensics. In: Fundamentals of Network Forensics. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-7299-4_9
Download citation
DOI: https://doi.org/10.1007/978-1-4471-7299-4_9
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-7297-0
Online ISBN: 978-1-4471-7299-4
eBook Packages: Computer ScienceComputer Science (R0)