skip to main content
10.1145/2808006.2808022acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

Cell Phone Forensics

Published:29 September 2015Publication History

ABSTRACT

Cell Phone Forensics is a relatively new field when compared to computer forensics. The need to recover data from mobile devices often overwhelms the processing capabilities of most law enforcement agencies. This paper outlines a three course sequence in mobile digital forensics that has been developed in partnership with law enforcement and forensic tool manufacturers. During the three course sequence, students learn forensic tools, procedures, and how get information from chips removed from cell phone boards. This dynamic partnership has been beneficial to all parties and potential employers are seeking graduates with these new forensic skills.

References

  1. Marshall University. Retrieved April 30, 2015 from http://www.marshall.edu/isat/dfia/digital-forensics.aspGoogle ScholarGoogle Scholar
  2. Srinvasan, S., Computer Forensics Curriculum in Security Education. In InfoSecCD '09, Kennesaw Georgia USA, September 25--26, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Mislan, R., Creating Laboratories for Undergraduate Courses/Building Government-Industry Partnerships. In SIGITE 2010. Midland, Michigan USA, October 7--9, 2010, 111--115. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Jansen, W., Delaitre, A., Moenner, L., Overcoming Impediments to Cell Phone Forensics. In Proceedings of the 41st Hawaii International Conference on System Sciences 2008,Wailoloa Big Island Hawaii USA, January 7--10, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Kim, K., Hong, D., Chung, K., Forensics for Korean Cell Phone. In e-Forensics '08, Adelaide Australia, January 21--23, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Tuttle, J., Walls, R., Miller, E., Levine, B., Reverse Engineering for Mobile Systems, Forensics with Ares. In Insider Threats '10, Chicago Illinois, USA, October 8 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. NIST Special Publication 800-101 Revision 1, Guidelines on Mobile Device Forensics, May 2014.Google ScholarGoogle Scholar
  8. Hill, L., An Inexpensive Method to Shield Wireless Devices During Hardware Forensic Investigation in a Laboratory Setting. In SIGITE '07, Destin Florida, USA, October 18--20, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Toshiba. Retrieved May 11, 2015 from http://www.flash25.toshiba.com/downloads/toshiba-timeline.pdfGoogle ScholarGoogle Scholar
  10. Toshiba. Retrieved May 11, 2015 from http://www.toshiba.com/taec/Catalog/Line.do?familyid=7&subfamilyid=900116&lineid=2095185Google ScholarGoogle Scholar
  11. Suncorporation. Retrived May 11, 2015 from http://www.sundenshi.co.jp/eng/company/group/index.shtml#o01Google ScholarGoogle Scholar
  12. Cellebrite. Retrieved May 11, 2015 from http://www.cellebrite.com/About-CellebriteGoogle ScholarGoogle Scholar
  13. Rocha, A., Scheirer, W., Boult, T., Goldenstein, S., Vision of the Unseen: Current Trends and Challenges in Digital Image and Video Forensics. ACM Comput. Surv. 43, 4, Article 26 (October 2011), 42 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Yates, M., Chi, H., A Framework for Designing Benchmarks of Investigating Digital Forensics Tools for Mobile Device. In 49th ACM Southeast Conference, Kennesaw Georgia, USA, March 24--26, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Turnbull, B., The Adaptability of Electronic Evidence Acquisition Guides for New Technologies. In e-Forensics '08, Adelaide Australia, January 21--23, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Yates, M., Practical Investigations of Digital Forensic Tools for Mobile Devices. In InfoSecCD '10, Kennesaw Georgia, USA, October 1--2, 2010, 156--162. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Egelman, S., Jain, S., Portnoff, R., Liao, K., Consolvo, S., Wagner, D., Are You Ready to Lock? In CCS '14, Scottsdale Arizona USA, November 3--7, 2014, 750--761. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Marturana, F., Me, G., Berte, R., Tacconi, S., A Quantitative Approach to Triaging in Mobile Forensics. In International Joint Conference of IEEE TrustCom '11, Changsha China, November 16--18, 2011, 582--588. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Gutmann, P., Naccache, D., Palmer, C., Crytography, Law Enforcement, and Mobile Communications. In Security and Privacy, Volume:4, Issue:6, November 2006, 67--70. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Cell Phone Forensics

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SIGITE '15: Proceedings of the 16th Annual Conference on Information Technology Education
        September 2015
        192 pages
        ISBN:9781450338356
        DOI:10.1145/2808006

        Copyright © 2015 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 29 September 2015

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        SIGITE '15 Paper Acceptance Rate24of58submissions,41%Overall Acceptance Rate176of429submissions,41%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader