Abstract
In this chapter, we forensically examine a Samsung Galaxy S7 running Android Version 8.0.0 and an iPhone 7 running iOS version 12.1, and report on the findings of the forensic examination.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Santos, N.: Mobile Forensics: Android. Retrieved 6 Oct 2018, from https://fenix.tecnico.ulisboa.pt/downloadFile/1970943312266679/csf-12.pdf (2015)
Sojitra, M.: Android Application Framework. Retrieved 6 Oct 2018, From https://www.linkedin.com/pulse/Android-application-framework-mayur-sojitra (2016)
Lessard, J., Kessler, G.C.: Android Forensics: Simplifying Cell Phone Examinations. Retrieved 6 Oct 2018, from https://www.garykessler.net/library/SSDDFJ_V4_1_Lessard_Kessler.pdf (2010)
Apple: Mac Technology Overview. Retrieved 9 Oct 2018, from https://developer.apple.com/library/archive/documentation/MacOSX/Conceptual/OSX_Technology_Overview/CocoaApplicationLayer/CocoaApplicationLayer.html#//apple_ref/doc/uid/TP40001067-CH274-SW1 (2015)
Jacobs, B.: Exploring the iOS SDK. Retrieved from https://code.tutsplus.com/tutorials/exploring-the-ios-sdk–mobile-13959 (2012)
Jacobs, B.: Retrieved from https://cocoacasts.com/what-is-the-difference-between-core-data-and-sqlite/ (2016)
Proffitt, T.: Forensic Analysis on iOS Devices. Retrieved from https://www.sans.org/reading-room/whitepapers/forensics/forensic-analysis-ios-devices-34092 (2012)
Hazra, S., Mateti, P.: Challenges in Android Forensics. Retrieved 20 Nov 2018, from https://www.researchgate.net/publication/320952681_Challenges_in_Android_Forensics (2017)
Mylonas, A., Meletiadis, V., Tsoumas, B., Mitrou, L., Gritzalis, D.: Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition. Retrieved 22 Nov 2018, from https://link.springer.com/content/pdf/10.1007/978-3-642-30436-1_21.pdf (2012)
Lucideus Research: Android Forensic Acquisition Techniques|Lucideus Forensics. Retrieved 23 Nov 2018, from https://lucideustech.blogspot.com/2018/01/android-forensic-acquisition-techniques.html (2018)
Murphy, C.: A New Solution for Previously Encrypted iOS Backups. Retrieved from https://www.gillware.com/forensics/blog/digital-forensics-case-study/new-solution-encrypted-backups/ (2018)
Katalov, V.: The art of iOS and iCloud forensics. Retrieved from https://blog.elcomsoft.com/2017/11/the-art-of-ios-and-icloud-forensics/ (2017)
Satish, B.: (n.d.) Forensic Analysis of iPhone Backups. Retrieved from https://www.exploit-db.com/docs/english/19767-forensic-analysis-of-ios5-iphone-backups.pdf
Infante, R.: Reverse Engineering the iOS Backup. Retrieved from https://www.richinfante.com/2017/3/16/reverse-engineering-the-ios-backup (2017)
Android Doctor: Samsung Galaxy S7/S7 Edge Root Android 8.0 100% Working. Retrieved 25 Nov 2018, from https://www.youtube.com/watch?v=JwLja68KmKM (2018)
IOS Architecture.: Retrieved from https://aruniphoneapplication.blogspot.com/2017/01/ios-architecture.html (2017)
Intellipaat: (n.d.). IOS Architecture—iOS Tutorial. Retrieved 9 Oct 2018, from https://intellipaat.com/tutorial/tutorial-ios-tutorial/ios-architecture/
McElhearn, K.: Access your iPhone App’s data and files. Retrieved from https://imazing.com/guides/how-to-access-your-iphone-apps-files-and-data (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Troutman, C., Mancha, V. (2020). Mobile Forensics. In: Zhang, X., Choo, KK. (eds) Digital Forensic Education. Studies in Big Data, vol 61. Springer, Cham. https://doi.org/10.1007/978-3-030-23547-5_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-23547-5_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-23546-8
Online ISBN: 978-3-030-23547-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)