Skip to main content

Smartphone Forensics

  • Chapter
  • First Online:
Fundamentals of Network Forensics

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

Smartphone is not only used for communication nowadays but also used for doing computational operations as well as storing information of a user. Due to enhancement, cyber criminals are using smartphones to install malicious software and hack the information of a user or do malicious activities. Smartphone forensics is one of the new topics of network forensics. In this chapter, smartphone forensic process model along all process is discussed. A standard process model consists of preservation, acquisition, examination, and analysis, and reporting of retrieved data is also discussed. Various frameworks for smartphone forensics are also discussed. Smartphone forensic tools are also discussed. In the last section the research challenges related to smartphone forensic are also discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Wayne J, Richard PA (2007) SP 800-101. Guidelines on cell phone forensics. National Institute of Standards & Technology, Gaithersburg, MD, United States

    Google Scholar 

  2. McKemmish R (2008) When is digital evidence forensically sound?. In: Advances in digital forensics IV, vol 285. Springer US, pp 3–15

    Google Scholar 

  3. Casey E (2011) Digital evidence and computer crime, 3rd edn. Academic Press

    Google Scholar 

  4. Bennett D (2012) The challenges facing computer forensics investigators in obtaining information from smartphone devices for use in criminal investigations. Inf Secur J Glob Perspect 21(3):159–168

    Article  Google Scholar 

  5. Al-Zarouni M (2006) Mobile handset forensic evidence: a challenge for law enforcement. In: 4th Australian digital forensics conference, Edith Cowan University, Perth Western Australia

    Google Scholar 

  6. Lessard J, Kessler G (2010) Android forensics: simplifying cell phone examinations. Small Scale Digital Device Forensics (SSDDF’2010), p 12

    Google Scholar 

  7. ACPO (2007) Good practice guide for computer-based electronic evidence

    Google Scholar 

  8. Yu X, Jiang LH, Shu H, Yin Q, Liu T-M (2009) A process model for forensic analysis of Symbian smart phones. Commun Comput Inf Sci 59:86–93

    Google Scholar 

  9. Savoldi A, Gubian P (2009) Issues in Symbian S60 platform forensics. J Commun Comput 6(3):16

    Google Scholar 

  10. Breeuwsma IMF (2006) Forensic imaging of embedded systems using JTAG (boundary-scan). Digit Investig 3(1):32–42

    Article  Google Scholar 

  11. Breeuwsma M, Jongh MD, Klaver C, Knijff RVD, Roeloffs M (2007) Forensic data recovery from flash memory. Small Scale Digit Device Forensics J 1(1):1–17

    Google Scholar 

  12. Mokhonoana PM, Olivier MS (2007) Acquisition of a Symbian smart phone’s content with an on-phone forensic tool. In: Southern Africa Telecommunication Networks and applications conference (SATNAC 2007), Sugar Beach Resort, Mauritius

    Google Scholar 

  13. Ramabhadran A (2009) Forensic investigation process model for windows mobile devices. Available: http://www.forensicfocus.com/downloads/windows-mobile-forensic-process-model.pdf, 31 Mar 2016

  14. Valjarevic A, Venter HS (2012) Harmonised digital forensic investigation process model. In: IEEE information security for South Africa (ISSA’12), Johannesburg, Gauteng, pp 1–10

    Google Scholar 

  15. Omeleze S, Venter HS (2013) Testing the harmonised digital forensic investigation process model-using an Android smartphone phone. In: IEEE information security for South Africa, (ISSA’13), Johannesburg, pp 1–8

    Google Scholar 

  16. Ayers R, Brothers S, Jansen W (2014) Guidelines on mobile device forensics. [Online]. Available: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-101r1.pdf, 31 Mar 2016

  17. Grispos G, Storer T, Glisson WB (2011) A comparison of forensic evidence recovery techniques for a windows mobile smart phone. Digit Investig 8(1):23–36

    Article  Google Scholar 

  18. Quick D, Alzaabi M (2011) Forensic analysis of the android file system YAFFS2. In: 9th Australian digital forensics conference, Edith Cowan University, Perth Western Australia

    Google Scholar 

  19. Thing VLL, Chua TW (2012) Symbian smartphone forensics: linear bitwise data acquisition and fragmentation analysis. In: Computer applications for security, control and system engineering, vol 339. Springer, Berlin/Heidelberg, pp 62–69

    Google Scholar 

  20. Alghafli KA, Jones A, Martin TA (2012) Forensics data acquisition methods for mobile phones. In: IEEE 7th international conference for internet technology and secured transactions (ICITST-2012). London, pp 265–269

    Google Scholar 

  21. Sasidharan SK, Thomas KL (2011) BlackBerry forensics: an agent based approach for database acquisition. In: Advances in computing and communications, vol 190. Springer, Berlin/Heidelberg, pp 552–561

    Google Scholar 

  22. Park J, Chung H, Lee S (2012) Forensic analysis techniques for fragmented flash memory pages in smartphones. Digit Investig 9(2):109–118

    Article  Google Scholar 

  23. Ahmed R, Dharaskar DRV, Thakare DVM (2013) Efficient generalized forensics framework for extraction and documentation of evidence from mobile devices. Int J Enhanc Res Manage Comput Appl, (IJERMCA’13), 2(1):7

    Google Scholar 

  24. Cellebrite (1999) Cellebrite UFED touch ultimate. Available: http://www.cellebrite.com/smartphone-forensics/products/standalone/ufed-touch-ultimate, 2014

  25. Fedorov O (2009) Oxygen forensic suite. Available: http://www.oxygen-forensic.com/en/download/documentation, 2014

  26. P Corporation (2004) Device seizure. Available: https://www.paraben.com/downloads/ds7-guide.pdf, 2015

  27. A Data ( n.d.) Mobile Phone Examiner Plus (MPE+)

    Google Scholar 

  28. Hoog A (2014) Now secure forensic suite. Available: https://www.nowsecure.com/forensics/, 2015

  29. F Data (n.d.) Final mobile forensics. Available: http://www.finaldata.com/Forum2/?s=PRD&c=18&n=51, 31 Mar 2016

  30. M Systemation (2014) XRY complete. Available: https://www.msab.com/xry/xry-complete, 31 Mar 2016

  31. K Forensics (2014) Lantern. Available: https://katanaforensics.com/products/, 31 Mar 2016

  32. S Inc (1992) Secure view. Available: http://secureview.us/kits-and-more.html, 31 Mar 2016

  33. Logicube (n.d.) CellDek. Available: http://www.logicube.com/knowledge/celldek-tek#sd, 31 Mar 2016

  34. C Labs (2010) Mobiledit forensic. [Online]. Available: http://www.smartphonedit.com/forensic-guide, 31 Mar 2016

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer-Verlag London

About this chapter

Cite this chapter

Joshi, R.C., Pilli, E.S. (2016). Smartphone Forensics. In: Fundamentals of Network Forensics. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-7299-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-7299-4_9

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-7297-0

  • Online ISBN: 978-1-4471-7299-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics