Skip to main content

Forensics Analysis on Mobile Devices:A Systematic Mapping Study

  • Conference paper
  • First Online:
Information and Communication Technologies of Ecuador (TIC.EC) (TICEC 2018)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 884))

Included in the following conference series:

  • 562 Accesses

Abstract

Nowadays, mobile devices have evolved vertiginously due to their massive adoption by users, who have several devices with different purposes. These devices contain greater capacity/functionality to manage information, with the embedded characteristics they become an important digital evidence container. In recent years, considerable research has been conducted on various types of digital electronic evidence, acquisition schemes and methods of extracting evidence from mobile devices. In this paper, a systematic mapping of the Forensics Analysis on Mobile Device is presented; this research has been conducted following the guidelines of Kitchenham’s methodology. The aim of this study is to provide a background of relevant activities that are considered by investigators to handle with potentially useful digital evidence from mobile devices. A total of 36 primary studies were selected and categorized to extract information regarding the aforementioned classification. The results presented in this contribution provide a detailed study about current analysis in research forensics field by the use of mobile devices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Petersen K, Feldt R, Mujtaba S, Mattsson M (2008) Systematic mapping studies in software engineering. EASE 8:68–77

    Google Scholar 

  2. Garfinkel SL (2010) Digital forensics research: the next 10 years. Digital Invest. 7:S64–S73

    Article  Google Scholar 

  3. Kitchenham B (2004) Procedures for performing systematic reviews. Keele, UK, Keele University, vol 33, pp 1–26 (2004)

    Google Scholar 

  4. Kitchenham B, Pearl Brereton O, Budgen D, Turner M, Bailey J, Linkman S (2009) Systematic literature reviews in software engineering – a systematic literature review. Inf Softw Technol 51(1):7–15

    Article  Google Scholar 

  5. Sánchez C, Cedillo P, Bermeo A (2007) A systematic mapping study for intelligent user interfaces. In: IEEE international conference on information systems and computer science (INCISCOS)

    Google Scholar 

  6. Cedillo P, Fernandez A, Insfran E, Abrahão S (2013) Quality of web mashups: a systematic mapping study. In: Sheng QZ, Kjeldskov J (eds.) Current Trends in Web Engineering, vol 8295, pp 66–78. Springer, Cham

    Chapter  Google Scholar 

  7. Szvetits M, Zdun U (2016) Systematic literature review of the objectives, techniques, kinds, and architectures of models at runtime. Softw Syst Model 15(1):31–69

    Article  Google Scholar 

  8. Petersen K, Vakkalanka S, Kuzniarz L (2015) Guidelines for conducting systematic mapping studies in software engineering: an update. Inf Softw Technol 64:1–18

    Article  Google Scholar 

  9. Alherbawi N, Shukur Z, Sulaiman R (2013) Systematic literature review on data carving in digital forensic. Procedia Technol 11:86–92

    Article  Google Scholar 

  10. Alharbi S, Weber-Jahnke J, Traore I (2011) The proactive and reactive digital forensics investigation process: A systematic literature review. In: International Conference on Information Security and Assurance, pp 87–100 (2011)

    Google Scholar 

  11. Robinson TM, Clemens C (2014) Service-learning and forensics: a systematic literature review. Forensic 99(2):35–49

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priscila Cedillo .

Editor information

Editors and Affiliations

ANNEX: Papers Selected

ANNEX: Papers Selected

  • [S01] K. Barmpatsalou, D. Damopoulos, G. Kambourakis, and V. Katos, “A critical review of 7 years of Mobile Device Forensics,” Digit. Investig., vol. 10, no. 4, pp. 323–349, 2013.

  • [S02] T. B. Tajuddin and A. A. Manaf, “Forensic investigation and analysis on digital evidence discovery through physical acquisition on smartphone,” 2015 World Congr. Internet Secur. WorldCIS 2015, pp. 132–138, 2015.

  • [S03] N. Scrivens and X. Lin, “Android digital forensics,” Proc. ACM Turing 50th Celebr. Conf. - China - ACM TUR-C’17, pp. 1–10, 2017.

  • [S04] R. Al Mushcab and P. Gladyshev, “iPhone 5 s Mobile Device,” Int. Work. Secur. Forensics Commun. Syst. 2015, pp. 146–151, 2015.

  • [S05] Y. Tso, S.-J. Wang, C.-T. Huang, and W. Wang, “iPhone social networking for evidence investigations using iTunes forensics,” Proc. 6th Int. Conf. Ubiquitous Inf. Manag. Commun. - ICUIMC’12, p. 1, 2012.

  • [S06] S. O’Shaughnessy and A. Keane, “Impact of Cloud Computing on Digital Forensic Investigations,” Adv. Digit. Forensics IX, pp. 291–303, 2013.

  • [S07] P. Sharma, D. Arora, and T. Sakthivel, “Information and Communication Technology for Intelligent Systems (ICTIS 2017) - Volume 1,” vol. 83, no. Mcc, 2018.

  • [S08] S. Yadav, K. Ahmad, and J. Shekhar, “Analysis of Digital Forensic Tools and Investigation Process,” High Perform. Archit. Grid …, pp. 435–441, 2011.

  • [S09] F. Amato, G. Cozzolino, A. Mazzeo, and N. Mazzocca, “Correlation of digital evidences in forensic investigation through semantic technologies,” Proc. - 31st IEEE Int. Conf. Adv. Inf. Netw. Appl. Work. WAINA 2017, pp. 668–673, 2017.

  • [S10] F. Cohen, “Two models of digital forensic examination,” 4th Int. Work. Syst. Approaches to Digit. Forensic Eng. SADFE 2009, pp. 42–53, 2009.

  • [S11] M. Harbawi and A. Varol, “An improved digital evidence acquisition model for the Internet of Things forensic I: A theoretical framework,” 2017 5th Int. Symp. Digit. Forensic Secur. ISDFS 2017, 2017.

  • [S12] A. Kubi, S. Saleem, and O. Popov, “Evaluation of some tools for extracting e-evidence from mobile devices,” Int. Conf. Appl. Inf. Commun. Technol. AICT, no. 10, 2011.

  • [S13] S. Omeleze and H. S. Venter, “Testing the harmonised digital forensic investigation process model-using an Android mobile phone,” Inf. Secur. South Africa, ISSA 2013.

  • [S14] K. M. Ovens and G. Morison, “Identification and analysis of email and contacts artefacts on iOS and OSX,” Int. Conf. Availab., Reliab. Secur. ARES 2016, pp. 321–327, 2016.

  • [S15] I. P. Agus, “Prototyping SMS Forensic Tool Application Based On Digital Forensic Research Workshop 2001 (DFRWS) Investigation Model,” 2016.

  • [S16] S. Varma, R. J. Walls, B. Lynn, and B. N. Levine, “Efficient Smart Phone Forensics Based on Relevance Feedback,” Proc. 4th ACM Work. Secur. Priv. Smartphones Mob. Devices - SPSM’14, pp. 81–91, 2014.

  • [S17] R. J. S. Rueda and B. Dewar Wilmer Rico, “Defining of a practical model for digital forensic analysis on Android device using a methodology post-mortem,” 2016 8th Euro Am. Conf. Telemat. Inf. Syst. EATIS 2016, pp. 0–4, 2016.

  • [S18] N. Al Mutawa, I. Baggili, and A. Marrington, “Forensic analysis of social networking applications on mobile devices,” Digit. Investig., vol. 9, no. SUPPL., pp. S24–S33, 2012.

  • [S19] T. Alyahya and F. Kausar, “Snapchat Analysis to Discover Digital Forensic Artifacts on Android Smartphone,” Procedia Comput. Sci., vol. 109, pp. 1035–1040, 2017.

  • [S20] C. Anglano, “Forensic analysis of whats app messenger on Android smartphones,” Digit. Investig., vol. 11, no. 3, pp. 201–213, 2014.

  • [S21] C. Anglano, M. Canonico, and M. Guazzone, “Forensic analysis of Telegram Messenger on Android smartphones,” Digit. Investig., vol. 23, pp. 31–49, 2017.

  • [S22] C. Ntantogian, D. Apostolopoulos, G. Marinakis, and C. Xenakis, “Evaluating the privacy of Android mobile applications under forensic analysis,” Comput. Secur., vol. 42, pp. 66–76, 2014.

  • [S23] M. I. Husain and R. Sridhar, “iForensics: Forensic analysis of instant messaging on smart phones,” Lect. Notes Inst. Comput. Sci. Soc. Telecommun. Eng., vol. 31, pp. 9–18, 2010.

  • [S24] A. Mylonas, V. Meletiadis, B. Tsoumas, L. Mitrou, and D. Gritzalis, “Smartphone forensics: A proactive investigation scheme for evidence acquisition,” IFIP Adv. Inf. Commun. Technol., vol. 376 AICT, no. September 2011, pp. 249–260, 2012.

  • [S25] M. Yates, “Practical investigations of digital forensics tools for mobile devices,” 2010 Inf. Secur. Curric. Dev. Conf., pp. 156–162, 2010.

  • [S26] A. Mylonas, V. Meletiadis, L. Mitrou, and D. Gritzalis, “Smartphone sensor data as digital evidence,” Comput. Secur., vol. 38, no. 2012, pp. 51–75, 2013.

  • [S27] M. Taylor, G. Hughes, J. Haggerty, D. Gresty, and P. Almond, “Digital evidence from mobile telephone applications,” Comput. Law Secur., vol. 28, no. 3, pp. 335–339, 2012.

  • [S28] D. Walnycky, I. Baggili, A. Marrington, J. Moore, and F. Breitinger, “Network and device forensic analysis of Android social-messaging applications,” Digit. Investig., vol. 14, no. S1, pp. S77–S84, 2015.

  • [S29] H. C. Chu, C. H. Lo, and H. C. Chao, “The disclosure of an Android smartphone’s digital footprint respecting the Instant Messaging utilizing Skype and MSN,” Electron. Commer. Res., vol. 13, no. 3, pp. 399–410, 2013.

  • [S30] L. Chen and Y. Mao, “Forensic analysis of email on android volatile memory,” 10th IEEE Int. Conf. Big Data Sci. Eng., pp. 945–951, 2016.

  • [S31] K. Hajdarevic and V. Dzaltur, “An approach to digital evidence collection for successful forensic application: An investigation of blackmail case,” 2015 38th Int. Conv. Inf. Commun. Technol. Electron. Microelectron. MIPRO 2015, pp. 1387–1392, 2015.

  • [S32] G. B. Satrya, P. T. Daely, and M. A. Nugroho, “Digital forensic analysis of Telegram Messenger on Android devices,” 2016 Int. Conf. Inf. Com. Technol. Syst., pp. 1–7, 2016.

  • [S33] A. Shortall and M. A. Bin Azhar, “Forensic Acquisitions of WhatsApp Data on Popular Mobile Platforms,” 6th Int. Conf. Emerg. Secur. Technol. EST 2015, pp. 13–17, 2016.

  • [S34] H. K. S. Tse, K. P. Chow, and M. Y. K. Kwan, “The next generation for the forensic extraction of electronic evidence from mobile telephones,” Int. Work. Syst. Approaches Digit. Forensics Eng., SADFE, 2014.

  • [S35] G. Grispos, W. B. Glisson, and T. Storer, “Using smartphones as a proxy for forensic evidence contained in cloud storage services,” Proc. Annu. Hawaii Int. Conf. Syst. Sci., pp. 4910–4919, 2013.

  • [S36] A. Blyth, I. Sutherland, H. Jahankhani, and A. Azam, “Review of Forensic Tools for Smartphones,” Ec2Nd 2006, pp. 69–84, 2007.

  • [S37] E. W. a Huebner, D. Bem, and O. Bem, “Computer forensics: past, present and future,” Inf. Secur. Tech. Rep., vol. 8, no. 2, pp. 32–36, 2003.

  • [S38] “Android Developers.” https://developer.android.com/. [Accessed: 3-Aug-2018].

  • [S39] “Forensic Toolkit.” https://accessdata.com/products-services/forensic-toolkit-ftk. [Accessed: 3-Aug-2018].

  • [S40] “Product Downloads.” https://accessdata.com/product-download/mobile-phone-examiner-plus-mpe-5.5.4. [Accessed: 3-Aug-2018].

  • [S41] “Oxygen Forensics - Mobile forensics solutions: software and hardware.” [Online]. Available: https://www.oxygen-forensic.com/en/. [Accessed: 3-Aug-2018].

  • [S42] “EnCase Forensic Software-Top Digital Forensics & Investigations Solution.” https://www.guidancesoftware.com. [Accessed: 3-Aug-218].

  • [S43] “UFED Ultimate/PA-.”, https://www.cellebrite.com/es/products/ufed-ultimate-es/. [Accessed: 23-Aug-2018].

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Camacho, J., Campos, K., Cedillo, P., Coronel, B., Bermeo, A. (2019). Forensics Analysis on Mobile Devices:A Systematic Mapping Study. In: Botto-Tobar, M., Barba-Maggi, L., González-Huerta, J., Villacrés-Cevallos, P., S. Gómez, O., Uvidia-Fassler, M. (eds) Information and Communication Technologies of Ecuador (TIC.EC). TICEC 2018. Advances in Intelligent Systems and Computing, vol 884. Springer, Cham. https://doi.org/10.1007/978-3-030-02828-2_5

Download citation

Publish with us

Policies and ethics