As mobile devices grow in popularity and ubiquity in everyday life, they are often involved in digital crimes and digital investigation as well. The world of mobile device forensics is a complicated one. Unlike the PC world’s limited number of major operating system vendors, there are countless manufacturers of mobile devices. To complicate things further, each mobile device manufacturer may have his own proprietary technology and formats. Add to this the blistering pace at which new mobile devices such as cellular phones and personal digital assistants (PDAs) are released, and you have a challenging environment to work in. This research paper will document in detail the methodology used to examine mobile electronic devices for the data critical to security investigations. The methodology encompasses the tools, techniques and procedures needed to gather data from a variety of common devices.
[1]
Lauren Darcey,et al.
Android Wireless Application Development
,
2009
.
[2]
Eoghan Casey,et al.
Handbook of Digital Forensics and Investigation
,
2009
.
[3]
Jim Bates.
Fundamentals of computer forensics
,
1998,
Inf. Secur. Tech. Rep..
[4]
Simson L. Garfinkel,et al.
Digital forensics research: The next 10 years
,
2010,
Digit. Investig..
[5]
Lee Garber,et al.
Computer Forensics: High-Tech Law Enforcement
,
2001,
Computer.
[6]
Sangjin Lee,et al.
Forensic analysis techniques for fragmented flash memory pages in smartphones
,
2012,
Digit. Investig..