Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can provide against digital forensics is of particular interest. A common method to access arbitrary data in main memory is the cold boot attack. The cold boot attack exploits the remanence effect that causes data in DRAM modules not to lose the content immediately in case of a power cut-off. This makes it possible to restart a device and extract the data in main memory. In this paper, we present a novel framework for cold boot-based data acquisition with a minimal bare metal application on a mobile device. In contrast to other cold boot approaches, our forensics tool overwrites only a minimal amount of data in main me...
In today's modern world, the growing use of smartphones with the Internet access supported increasin...
In this paper, we investigate and evaluate through experimental analysis the possibility of recoveri...
Since criminals are committing offenses using smartphones in many cases, smartphone forensic techniq...
Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of...
Abstract. At the end of 2011, Google released version 4.0 of its An-droid operating system for smart...
Ever since the introduction of new functionalities like social networking and instant messaging, the...
In this paper, an automated technique is proposed to perform forensic analysis for new generation of...
From an expert's standpoint, an Android phone is a large data repositorythat can be stored either lo...
This paper proposes a new forensic analysis methodology that combines processes, techniques, and too...
Volatile memory like SDRAM, forms an integral part of any computer system. It stores variety of data...
Android is the most used operating system in the world, because of this the probability of an androi...
Modern smartphones integrate ubiquitous access to voice, data, and email communication and allow use...
Article originally published in International Journal of Knowledge EngineeringThe familiarity and pr...
Like computers, mobile devices are both used to commit and are the subject of crimes. Digital forens...
In modern criminal investigations, mobile devices are seized at every type of crime scene, and the d...
In today's modern world, the growing use of smartphones with the Internet access supported increasin...
In this paper, we investigate and evaluate through experimental analysis the possibility of recoveri...
Since criminals are committing offenses using smartphones in many cases, smartphone forensic techniq...
Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of...
Abstract. At the end of 2011, Google released version 4.0 of its An-droid operating system for smart...
Ever since the introduction of new functionalities like social networking and instant messaging, the...
In this paper, an automated technique is proposed to perform forensic analysis for new generation of...
From an expert's standpoint, an Android phone is a large data repositorythat can be stored either lo...
This paper proposes a new forensic analysis methodology that combines processes, techniques, and too...
Volatile memory like SDRAM, forms an integral part of any computer system. It stores variety of data...
Android is the most used operating system in the world, because of this the probability of an androi...
Modern smartphones integrate ubiquitous access to voice, data, and email communication and allow use...
Article originally published in International Journal of Knowledge EngineeringThe familiarity and pr...
Like computers, mobile devices are both used to commit and are the subject of crimes. Digital forens...
In modern criminal investigations, mobile devices are seized at every type of crime scene, and the d...
In today's modern world, the growing use of smartphones with the Internet access supported increasin...
In this paper, we investigate and evaluate through experimental analysis the possibility of recoveri...
Since criminals are committing offenses using smartphones in many cases, smartphone forensic techniq...