Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
On the Availability of Anti-Forensic Tools for Smartphones
Ioana Sporea, Benjamin Aziz, Zac McIntyre
Pages - 58 - 64 | Revised - 15-11-2012 | Published - 31-12-2012
Published in International Journal of Security (IJS)
MORE INFORMATION
KEYWORDS
Mobile Computing, Anti-forensics, Cryptography, Steganography
ABSTRACT
The existence of anti-forensic tools in the context of computing systems is one of the main challenges for forensics investigators in achieving reliable evidence recovery and consequently uncovering crime facts. This is in particular more challenging in emerging smartphone technologies, since data is of highly mobile and volatile nature. In the current paper, we present a brief study of several anti-forensic applications available for smartphones. The applications are ready to use, most of them free, and require no expert technical knowledge. Moreover, these have been proved to be very effective when tested with two commercial forensic tools.
1 | Kariuki, P. (2015). Generic process model for android smartphones live memory forensics (doctoral dissertation). |
2 | Neralla, S., Bhaskari, D. L., & Avadhani, P. S. (2013). Combating against anti-forensics aligned with e-mail forensics. International Journal of Computer Applications, 79(15). |
3 | Munpilju. (2013). Utilization of forensic tools - Antigua for Android smartphones. Korea Electronics and Telecommunications Institute of Science, 8 (6), 855-861. |
.] Ahmed, R. and Dharaskar R. V. (2009), ‘Mobile Forensics: the roadblocks ahead, proposed solution using Protocol Filtering and SIM programming’, International Journal of Computer Science and Applications, Vol. 2(2) pp. 109-116 | |
.] Canalys Press Release. [Online] http://www.canalys.com/newsroom/smart-phones-overtakeclient-pcs-2011(Accessed 30 August 2012) | |
.] Carrier, B. (2002), ‘Defining digital forensic examination and analysis tools’, International Journal of Digital Evidence, Vol 1, pp 1-10. | |
.] Casey, E. And Turnbull, B. (2011) ‘Digital evidence on mobile devices’, in Casey, E. (Eds.)Digital Evidence and Computer Crime, Academic Press | |
.] Distefano, A., Me, G., & Pace, F. (2010, August). Android anti-forensics through a local paradigm. Digital Investigation, 7(Suppl.), pp 83-94 | |
.] File Shredder (2012) -https://play.google.com/store/apps/details?id=net.fizzl.fileshredder&hl=en (Accessed 28 September 2012) | |
.] Forensic Focus - Challenges of Smart Phone Forensics [Online]http://www.forensicfocus.com/challenges-of-smart-phone-forensics (Accessed 30 August 2012) | |
.] Garfinkel, S. L. (2010), ‘Digital forensic research: The next 10 years’, in Proceedings of the Tenth Annual DFRWS Conference, pp S64–S73 | |
.] Gartner press release (2011) - Gartner Says Sales of Mobile Devices Grew 5.6 Percent in Third Quarter of 2011; Smartphone Sales Increased 42 Percent [Online]http://www.gartner.com/it/page.jsp?id=1848514 (Accessed 17 September 2012) | |
.] Harris, R. (2006), ‘Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem’, The International Journal of Digital Forensics & Incident Response, Vol 3, pp 44-49 | |
.] LUKS Manager (2012) - https://play.google.com/store/apps/details? id=com.nemesis2.luksmanager (Accessed 28 September 2012) | |
.] MobiStego (2012) - https://play.google.com/store/apps/details?id=it.mobistego&hl=en(Access 28 September 2012). | |
.] NISP - ‘DoD 5220.22-M National Industrial Security Program Operating Manual’ [Online]http://transition.usaid.gov/policy/ads/500/d522022m.pdf (Accessed 14 September 2012) | |
.] Oxygen (2012) - Oxygen Forensic Suite [Online] http://www.oxygen-forensic.com/en/(Accessed 17 September 2012) | |
.] Paraben (2012) - Paraben’s Device Seizure 5.0 Release Notes [Online]http://www.paraben.com/downloads/ds50.pdf (Accessed 17 September 2012) | |
.] ProtectStar iShreder Pro (2012) - http://itunes.apple.com/us/app/protectstar-ishredder-pro/id441224022?mt=8 (Accessed 28 September 2012) | |
.] StegDroid (2012) - https://play.google.com/store/apps/details?id=uk.ac.cam.tfmw2.stegdroid &hl=en (Accessed 28 September 2012) | |
Azadegan, S., Yu, W., Liu, H., Sistani, M., Acharya, S. (2012), ‘Novel Anti-forensics Approaches for Smart Phones’, in Proceedings of 45th Hawaii International Conference on System Science (HICSS), pp 5424 – 5431 | |
Liu, H., Azadegan, S., Yu, W., Acharya, S. and Sistani, A., (2012), ‘Are We Relying Too Much on Forensics Tools?’, in Lee, R. (Eds.) Software Engineering Research,Management and Applications 2011, pp 145-156 | |
Mr. Ioana Sporea
- United Kingdom
Dr. Benjamin Aziz
University of Portsmouth - United Kingdom
benjamin.aziz@port.ac.uk
Mr. Zac McIntyre
- United Kingdom
|
|
|
|
View all special issues >> | |
|
|