Skip to main content

An Agent Based Tool for Windows Mobile Forensics

  • Conference paper
Digital Forensics and Cyber Crime (ICDF2C 2011)

Abstract

Mobile devices are very common in everyone’s day-to- day life. Nowadays such devices come with many features of desktop or laptop. Hence people can use these devices for diverse applications. As the acceptability and usability of such devices are very high, there are chances that these devices can be used for illegal activities. The percentage of mobile phones or smart phones involved in cyber crimes is in hike. So it becomes necessary to digitally analyze such devices requiring cyber forensics tools. This paper discusses different types of digital evidence present in Microsoft’s Windows Mobile smart phones and an agent based approach for logically acquiring such devices. Also it describes a tool developed for forensically acquiring and analyzing Windows Mobile devices and WinCE PDAs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jansen, W., Ayers, R.: Guidelines on cell phone forensics, National Institute of Standards and Technology, Special Publication 800-101 (2007)

    Google Scholar 

  2. Ayers, R., Jansen, W., Cilleros, N., Daniellou, R.: Cell phone forensic tools: An overview and analysis. Technical Report NISTIR 7250, National Institute of Standards and Technology (2005)

    Google Scholar 

  3. Carrier, B.: Defining Digital Forensic Examination and Analysis Tools, Digital Forensics Research Workshop II (August 2002)

    Google Scholar 

  4. Mellars, B.: Forensic Examination of Mobile Phones. Digital Investigation. The International Journal of Digital Forensics & Incident Response 1(4), 266–272 (2004)

    Google Scholar 

  5. Ayers, R., Dankar, A., Mislan, R.: Hashing Techniques for Mobile Device Forensics. Small Scale Digital Device Forensics Journal, 1–6 (2009)

    Google Scholar 

  6. van der Knijff, R.: Embedded Systems Analysis. In: Casey, E. (ed.) Handbook of Computer Crime Investigation, ch. 11. Academic Press (2002)

    Google Scholar 

  7. Kruse II, W.G., Heiser, J.G.: Computer Forensics – Incident Response Essentials. Pearson Education (September 26, 2001)

    Google Scholar 

  8. Logsdon, B.: Compaq iPAQ Parrot Talks: How to flash your ROM by the backdoor. Pocket PC Passion (February 2001)

    Google Scholar 

  9. Architectural Overview of Windows Mobile, Windows Mobile 5.0 and 6-powered Devices, White Paper, Published by Microsoft (May 2007)

    Google Scholar 

  10. Danker, S., Ayers, R., Mislan, R.P.: Hashing Techniques for Mobile Device Forensics. SSD Journal 3(1) (June 2009)

    Google Scholar 

  11. Fiorillo, S.: Theory and practice of flash memory mobile forensics. In: Proceedings of the 7th Australian Digital Forensics Conference ( December 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Satheesh Kumar, S., Thomas, B., Thomas, K.L. (2012). An Agent Based Tool for Windows Mobile Forensics. In: Gladyshev, P., Rogers, M.K. (eds) Digital Forensics and Cyber Crime. ICDF2C 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 88. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35515-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35515-8_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35514-1

  • Online ISBN: 978-3-642-35515-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics