Corpus ID: 55172341

Jailbroken iPhone Forensics for the Investigations and Controversy to Digital Evidence

  title={Jailbroken iPhone Forensics for the Investigations and Controversy to Digital Evidence},
  author={Ya-Ting Chang and Ke-Chun Teng and Yu-Cheng Tso and Shiuh-Jeng Wang},
The smartphone has gradually become an indispensable assistant in our daily life. Apple's iPhone is one of the most popular smartphones. However, once the iPhone has become a criminal tool for assisting the offender, the electromagnetic record in the iPhone will become the key digital evidence to reconstruct the scene of the crime. There is a high probability that offenders perform the Jailbreak procedure in order to gain more powerful functions on iPhones. When the Jailbreak work has processed… Expand
Forensic Analysis of the Nintendo 3DS NAND
This paper details methods that enable the investigator to extract system activity, deleted images, Internet history items, relevant friends list information, the console's serial number and plaintext WiFi access point passwords with the use of publicly available, open-source security circumvention techniques. Expand
Hardening iOS Devices Against Remote Forensic Investigation
Abstract Smartphones and mobile devices nowadays accompany each of us in our pockets, holding vast amounts of personal data. The iPhone and iPad are between the most important players in this newExpand
Forensic Analysis of Third Party Location Applications in Android and iOS
  • Jason Bays, Umit Karabiyik
  • Computer Science
  • IEEE INFOCOM 2019 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
  • 2019
This paper aims to discover forensic artifacts from two popular third-party location sharing applications on iOS and Android devices to discover if any locally stored data could be used to assist investigations reliant on knowing the past location of a suspect. Expand
Classification for iOS Mobile Malware Inspired by Phylogenetic: Proof of Concept
There are raising cases of mobile malwares exploiting iOS users across the world such as FinSpy and Exodus that were able to steal credential information from the victims and affect loss of victims’Expand


iPhone 3GS Forensics: Logical analysis using Apple iTunes Backup Utility
The iPhone mobile is used worldwide due to its enhanced computing capabilities, increased storage capacity as well as its attractive touch interface. These characteristics made the iPhone a popularExpand
An investigation into iPod Touch generation 2
This paper investigated Apple iPod Touch generation 2 from a digital forensic perspective and described the investigation techniques and findings. Expand
Novel Anti-forensics Approaches for Smart Phones
The evaluation results of the proposed anti-forensic approaches on a typical Android cell phone device demonstrate the severe limitations of current forensic tools and conclude the critical need for modifications and/or redesigns of these contemporary forensic tools to maintain accuracy and legitimacy of forensic data acquisition and analysis. Expand
Mobile Forensics Data Integrity Assessment by Event Monitoring
Mobile phones, due to the wide range of services they offer, increasingly represent a major tool, with crucial importance, in people daily life. Therefore, they could act as fundamental witnesses, orExpand
Universal, Fast Method for iPad Forensics Imaging via USB Adapter
A novel approach is presented that takes advantage of an undocumented feature so it is possible to use a cheap iPadaccessory, the Camera Connection Kit, to image the disk to an external hard drive attached via USB connection, greatly reducing the required time. Expand
Third Party Application Forensics on Apple Mobile Devices
There have been third party applications on mobile devices before today, but none that provided the number of applications available in the iTunes app store. Expand
Jailbreaking iPhone Legal, U.S. Government Says
  • ABC News, 2010 (available online at ).
  • 2010
iPhone forensics, sans iPhone, 2010 (available online at
  • 2010