Abstract

Mobile applications are today ubiquitous, and everybody uses them on a daily basis. This applies also to security-critical mobile applications. In today’s architectures, these mobile applications are usually used from the same source as mobile applications on smart phones. There are plenty of information inside those devices like call data records, SMS messages, web history and so on. This makes mobile digital forensics inevitable for them. To assess the strength of mobile digital forensics tools, there are many approaches based on acquiring lots of mobile artifacts. But there is almost no study that measures the ability for a digital forensic tool that gives insight about supported image types and file systems. In this study, we developed a framework that investigates the possible image and file system types that a forensic tool should have support and then we made a case study using two different open source forensic tools.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call