Abstract
Mobile devices are very common in everyone’s day-to- day life. Nowadays such devices come with many features of desktop or laptop. Hence people can use these devices for diverse applications. As the acceptability and usability of such devices are very high, there are chances that these devices can be used for illegal activities. The percentage of mobile phones or smart phones involved in cyber crimes is in hike. So it becomes necessary to digitally analyze such devices requiring cyber forensics tools. This paper discusses different types of digital evidence present in Microsoft’s Windows Mobile smart phones and an agent based approach for logically acquiring such devices. Also it describes a tool developed for forensically acquiring and analyzing Windows Mobile devices and WinCE PDAs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Jansen, W., Ayers, R.: Guidelines on cell phone forensics, National Institute of Standards and Technology, Special Publication 800-101 (2007)
Ayers, R., Jansen, W., Cilleros, N., Daniellou, R.: Cell phone forensic tools: An overview and analysis. Technical Report NISTIR 7250, National Institute of Standards and Technology (2005)
Carrier, B.: Defining Digital Forensic Examination and Analysis Tools, Digital Forensics Research Workshop II (August 2002)
Mellars, B.: Forensic Examination of Mobile Phones. Digital Investigation. The International Journal of Digital Forensics & Incident Response 1(4), 266–272 (2004)
Ayers, R., Dankar, A., Mislan, R.: Hashing Techniques for Mobile Device Forensics. Small Scale Digital Device Forensics Journal, 1–6 (2009)
van der Knijff, R.: Embedded Systems Analysis. In: Casey, E. (ed.) Handbook of Computer Crime Investigation, ch. 11. Academic Press (2002)
Kruse II, W.G., Heiser, J.G.: Computer Forensics – Incident Response Essentials. Pearson Education (September 26, 2001)
Logsdon, B.: Compaq iPAQ Parrot Talks: How to flash your ROM by the backdoor. Pocket PC Passion (February 2001)
Architectural Overview of Windows Mobile, Windows Mobile 5.0 and 6-powered Devices, White Paper, Published by Microsoft (May 2007)
Danker, S., Ayers, R., Mislan, R.P.: Hashing Techniques for Mobile Device Forensics. SSD Journal 3(1) (June 2009)
Fiorillo, S.: Theory and practice of flash memory mobile forensics. In: Proceedings of the 7th Australian Digital Forensics Conference ( December 2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Satheesh Kumar, S., Thomas, B., Thomas, K.L. (2012). An Agent Based Tool for Windows Mobile Forensics. In: Gladyshev, P., Rogers, M.K. (eds) Digital Forensics and Cyber Crime. ICDF2C 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 88. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35515-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-35515-8_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35514-1
Online ISBN: 978-3-642-35515-8
eBook Packages: Computer ScienceComputer Science (R0)