Skip to main content

A Study on the Forensic Data Extraction Method for SMS, Photo and Mobile Image of Google Android and Windows Mobile Smart Phone

  • Conference paper
Convergence and Hybrid Information Technology (ICHIT 2012)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 310))

Included in the following conference series:

Abstract

Lately the use of Mobile Phone has been saturated and the use of Smart Phone including iPhone had rapidly increased. At present there are 3 kinds of Forensic Data Extraction methods which are SYN, JTAG and Revolving. However, different Forensic Data Extraction method should be used depending on the difference in Mobile Phone and Smart Phone technology and how to use them. This thesis aims at studying on Forensic Data Extraction method in the case of Smart Phone. For the analysis of Google Android and Windows Mobile Smart Phone which are mainly used for Smart Phone, Spec. and O.S. analysis as well as Data analysis are conducted, and evidence data are created by extracting Forensic data of Google Android and Windows Mobile Smart Phone. The research on the technology experimented through this research will contribute to the development of Mobile Smart Phone Forensic technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kim, D.-M., Lee, C.-W.: Technology Trends of Smartphone User Interface. KIISE 28(5), 15–26 (2010)

    Google Scholar 

  2. Jahankhani, H., Azam, A.: Review of Forensic Tools for Smartphones. In: EC2ND 2006, Section II, pp. 69–84 (2007)

    Google Scholar 

  3. Choi, E.Y., Kim, M.J., Jung, H.C.: A study for enhancing smartphone security. KSII, 781–785 (2010)

    Google Scholar 

  4. Di Cerbo, F., Girardello, A., Michahelles, F., Voronkova, S.: Detection of Malicious Applications on Android OS. In: Sako, H., Franke, K.Y., Saitoh, S. (eds.) IWCF 2010. LNCS, vol. 6540, pp. 138–149. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  5. Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P.: Semantically Rich Application-Centric Security in Android. In: Annual Computer Security Applications Conference, ACSAC 2009, pp. 340–349 (December 2009), http://ieeexplore.ieee.org

  6. Rehault, F.: Windows mobile advanced forensics: An alternative to existing tools. Digital investigation 7(1/2), 38–47 (2010)

    Article  Google Scholar 

  7. Yi, J.-H., Park, D.-W.: Smart Phone Copyright Violation and Forensic Apply Method. KIICE 14(11), 2491–2496 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chun, WS., Park, DW. (2012). A Study on the Forensic Data Extraction Method for SMS, Photo and Mobile Image of Google Android and Windows Mobile Smart Phone. In: Lee, G., Howard, D., Ślęzak, D., Hong, Y.S. (eds) Convergence and Hybrid Information Technology. ICHIT 2012. Communications in Computer and Information Science, vol 310. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32692-9_82

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32692-9_82

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32691-2

  • Online ISBN: 978-3-642-32692-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics