Skip to main content

Experimental Digital Forensics of Subscriber Identification Module (SIM) Card

  • Chapter
  • First Online:
Computer and Network Security Essentials

Abstract

SIM cards as part of smart cards are considered one of the elements found in every mobile phone either smartphone or not. They are used to communicate through the telephone network. SIM cards can be used to track the mobile or to extract user’s data like SMS or phonebook. Moreover, criminal cases involving mobile phone activities are increasing. Therefore, mobile security and analysis is important during the investigation.

We will emphasize on all the elements related to SIM cards. These elements are the differences between its communication protocols, SIM card application development environment, and SIM card file structure including the file meta-data. We will also describe in detail how to communicate with SIM card and extract information which can help with criminal investigation. In this research, we also investigate the SMS forensics and how we can use this information to track user’s activities during a certain period of time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Service providers have been eradicated.

References

  1. AbdelAzim, M. (2016). Simanalyzer tool. https://github.com/Tabaz/SIMAnalyzer. Accessed 30 Jan 2017.

    Google Scholar 

  2. Casadei, F., Savoldi, A., & Gubian, P. (2006). Forensics and SIM cards: An overview. International Journal of Digital Evidence, 5(1), 1–21.

    Google Scholar 

  3. ETSI, T., 100 901 V7.5.0. (2001). Digital cellular telecommunications systems (Phase 2+), technical realization of the short message service (SMS) point-to-point (PP), European Telecommunications Standards Institute, Technical Specification.

    Google Scholar 

  4. ETSI, T., 100 916 V7.8.0. (2003). Digital cellular telecommunications system; AT command set for GSM Mobile Equipment (ME), European Telecommunications Standards Institute.

    Google Scholar 

  5. ETSI, T., 143 019 V5.6.0. (2003). Digital cellular telecommunications system (Phase 2+); Subscriber Identity Module Application Programming Interface (SIM API) for Java Card; ETSI Standards, European Telecommunications Standards Institute, Technical Specification.

    Google Scholar 

  6. ETSI, T., 131 102 V4.15.0. (2005). Universal Mobile Telecommunications System (UMTS); Characteristics of the USIM application, European Telecommunications Standards Institute.

    Google Scholar 

  7. ETSI, T., 100 977 v8.14.0. (2007). Digital cellular telecommunications system (Phase 2+); Specification of the Subscriber Identity Module-Mobile Equipment (SIM-ME) Interface. ETSI Standards, European Telecommunications Standards Institute, Technical Specification.

    Google Scholar 

  8. Guo, H., Smart cards and their operating systems.

    Google Scholar 

  9. Ibrahim, N., Al Naqbi, N., Iqbal, F., & AlFandi, O. (2016). SIM Card Forensics: Digital Evidence.

    Google Scholar 

  10. I. Oracle. Java card technology. http://www.oracle.com/technetwork/java/embedded/javacard/overview/getstarted-1970079.html. Accessed 30 Jan 2017.

  11. I. Sun Microsystems. (1998). Java Card Applet Developer’s Guide. Palo Alto: Sun Microsystems Inc. Revision 1.10, 17 July 1998.

    Google Scholar 

  12. Jansen, W., & Ayers, R. (2006, January). Forensic software tools for cell phone subscriber identity modules. In Proceedings of the Conference on Digital Forensics, Security and Law (p. 93). Association of Digital Forensics, Security and Law.

    Google Scholar 

  13. Jansen, W.A., & Delaitre, A. (2007, October). Reference material for assessing forensic SIM tools. Security Technology, 2007 41st Annual IEEE International Carnahan Conference on Security Technology (pp. 227–234). IEEE.

    Google Scholar 

  14. Osmocom. Osmocom simtrace, http://bb.osmocom.org/trac/wiki/SIMtrace. Accessed 30 Jan 2017.

  15. Rankl, W., & Effing, W. (2004). Smart card handbook. New York: Wiley.

    Google Scholar 

  16. Thakur, R., Chourasia, K., & Singh, B. (2012). Cellular phone forensics. International Journal of Scientific and Research Publications, 2(8), 233–326.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed T. Abdelazim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Cite this chapter

Abdelazim, M.T., Abdelbaki, N., Shosha, A.F. (2018). Experimental Digital Forensics of Subscriber Identification Module (SIM) Card. In: Daimi, K. (eds) Computer and Network Security Essentials. Springer, Cham. https://doi.org/10.1007/978-3-319-58424-9_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-58424-9_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-58423-2

  • Online ISBN: 978-3-319-58424-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics