Forensic Analysis of Mobile Phone Internal Memory

@inproceedings{Willassen2005ForensicAO,
  title={Forensic Analysis of Mobile Phone Internal Memory},
  author={Svein Yngvar Willassen},
  booktitle={IFIP Int. Conf. Digital Forensics},
  year={2005}
}
Modern mobile phones store data in SIM cards, internal memory and external flash memory. [...] Key Method The methods are applied on several popular models to recover information, including deleted text messages.Expand
Volatile memory acquisition using backup for forensic investigation
TLDR
This paper proposes a new approach for acquiring the volatile data inside a mobile phone in a forensically sound manner that minimizes the chance of evidence modification or lost.
A Review Paper on Forensic Retrieval of Deleted Information from SIM Card in a Mobile Phone
It is a forensic software framework for extraction and decoding of data stored in electronic devices. It is designed for data acquisition from SIM card and Mobile phones through Data cables,
A comparison of forensic evidence recovery techniques for a windows mobile smart phone
TLDR
It is demonstrated that no one technique recovers all information of potential forensic interest from a Windows Mobile device; and that in some cases the information recovered is conflicting.
Forensics data acquisition methods for mobile phones
TLDR
A survey on the current data acquisition methods of digital forensics for mobile phones is conducted and a comparative analysis between the currentData acquisition methods is provided.
Dump and analysis of Android volatile memory on Wechat
TLDR
An in-depth analysis of Android memory structures to extract the encrypted chats and deleted messages on a popular social network application called Wechat shows that all chats can be extracted in the form of plaintext, including some deleted messages.
Symbian Smartphone Forensics: Linear Bitwise Data Acquisition and Fragmentation Analysis
TLDR
The acquisition tool is designed and built to support a low-level bit-by-bit acquisition of the phone’s internal flash memory, including the unallocated space, to provide a better understanding for the purpose of further in-depth mobile phone forensics evidence reconstruction and security analysis.
Forensic Tools for Mobile Phone Subscriber Identity Modules
TLDR
A snapshot of the state of the art of forensic software tools for SIMs and an explanation of the types of digital evidence they can recover are given.
SIM Card Forensics: Digital Evidence
TLDR
The experimental results on a real-life dataset support the effectiveness of the SIM card forensics approach presented in this paper and compare various forensic tools in terms of retrieving specific data.
AM SIM Card Forensics : Digital Evidence
With the rapid evolution of the smartphone industry, mobile device forensics has become essential in cybercrime investigation. Currently, evidence forensically-retrieved from a mobile device is in
Investigating Information recovered from Re-sold Mobile Devices
The data storage capacity mobile digital devices is continually increasing, with a corresponding potential for such devices to retain sensitive personal and corporate information. Simultaneously, the
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 24 REFERENCES
Forensics and the GSM Mobile Telephone System
TLDR
The aim of this paper is to give forensic investigators an introduction to the current state of GSM forensics, and highlight some of the issues that will have to be solved in the future.
Handbook of Computer Crime Investigation: Forensic Tools and Technology
About the Authors Acknowledgements 1. Introduction 2. The Other Side of Civil Discovery TOOLS 3. The EnCase Process 4. Incident Response Tools 5. NFR Security 6. Tool Testing and Analytical
Mobile Messaging Technologies and Services: SMS, EMS and MMS
From the Publisher: Mobile messaging is practically the first data communication service in the wireless domain. It is a major advance on the conventional practice of providing only voice
Intel Corporation, Intel Wireless Communications and Computing Package User's Guide version 1
  • Intel Corporation, Intel Wireless Communications and Computing Package User's Guide version 1
  • 2004
040 -Technical Realization of Short Message Service (SMS), version 5
  • 040 -Technical Realization of Short Message Service (SMS), version 5
  • 2003
Embedded Systems Analysis, Handbook of Computer Crime Investigation
  • Embedded Systems Analysis, Handbook of Computer Crime Investigation
  • 2002
IEEE IEEE Standard Test Access Port and Boundary-Scan Architecture IEEE- ANSI
  • IEEE IEEE Standard Test Access Port and Boundary-Scan Architecture IEEE- ANSI
  • 2001
Solders and Soldering, 4 th ed
  • Solders and Soldering, 4 th ed
  • 2001
...
1
2
3
...