Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition
Autor: | Lilian Mitrou, Bill Tsoumas, Dimitris Gritzalis, Alexios Mylonas, Vasilis Meletiadis |
---|---|
Přispěvatelé: | Information Security and Critical Infrastructure Protection Research Laboratory, Athens University of Economics and Business (AUEB), Department of Information & Communication Systems Engineering [Grece], University of the Aegean, Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou |
Jazyk: | angličtina |
Rok vydání: | 2012 |
Předmět: |
Scheme (programming language)
Digital Evidence business.industry Computer science Internet privacy 020206 networking & telecommunications 020207 software engineering 02 engineering and technology 16. Peace & justice Computer security computer.software_genre Smartphones Digital evidence ComputerSystemsOrganization_MISCELLANEOUS 0202 electrical engineering electronic engineering information engineering [INFO]Computer Science [cs] Everyday life business computer computer.programming_language Forensics |
Zdroj: | IFIP Advances in Information and Communication Technology 27th Information Security and Privacy Conference (SEC) 27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. pp.249-260, ⟨10.1007/978-3-642-30436-1_21⟩ IFIP Advances in Information and Communication Technology ISBN: 9783642304354 SEC |
DOI: | 10.1007/978-3-642-30436-1_21⟩ |
Popis: | Part 6: Privacy Attitudes and Properties; International audience; Smartphones constantly interweave into everyday life, as they accompany individuals in different contexts. Smartphones include a combination of heterogeneous data sources, which can prove essential when combating crime. In this paper we examine potential evidence that may be collected from smartphones. We also examine the available connection channels for evidence transfer during a forensic investigation. We propose a Proactive Smartphone Investigation Scheme that focuses on ad hoc acquisition of smartphone evidence. We also, take into consideration the legal implications of the proposed scheme, as it is essential that the scheme includes prevention mechanisms, so as to protect individuals from misuse by investigators or malicious entities. |
Databáze: | OpenAIRE |
Externí odkaz: |