CFP last date
20 December 2024
Reseach Article

Survey on Mobile Forensics

by Ritika Lohiya, Priya John, Pooja Shah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 16
Year of Publication: 2015
Authors: Ritika Lohiya, Priya John, Pooja Shah
10.5120/20827-3476

Ritika Lohiya, Priya John, Pooja Shah . Survey on Mobile Forensics. International Journal of Computer Applications. 118, 16 ( May 2015), 6-11. DOI=10.5120/20827-3476

@article{ 10.5120/20827-3476,
author = { Ritika Lohiya, Priya John, Pooja Shah },
title = { Survey on Mobile Forensics },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 16 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number16/20827-3476/ },
doi = { 10.5120/20827-3476 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:01:51.384273+05:30
%A Ritika Lohiya
%A Priya John
%A Pooja Shah
%T Survey on Mobile Forensics
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 16
%P 6-11
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the continued growth of smart phone market, the probability of their use in criminal activities has continued to increase. Mobile phone nowadays comes with a wide variety of software application, new technologies and operating systems. Therefore it becomes complicated for a forensic investigator to examine the evidence from a mobile phone. A proper knowledge of forensic tools and their features is required to collect relevant information. This paper discusses about the mobile device characteristics, the steps for mobile forensic investigation and different tools for mobile forensics. The last section of the paper presents the experimental results of the tools Mobiledit Lite and Autopsy 3. 1. 2.

References
  1. Bowman, M. , Debray, S. K. , and Peterson, L. L. 1993. Reasoning about naming systems. .
  2. Ding, W. and Marchionini, G. 1997 A Study on Video Browsing Strategies. Technical Report. University of Maryland at College Park.
  3. Fröhlich, B. and Plate, J. 2000. The cubic mouse: a new device for three-dimensional input. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
  4. Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  5. Sannella, M. J. 1994 Constraint Satisfaction and Debugging for Interactive User Interfaces. Doctoral Thesis. UMI Order Number: UMI Order No. GAX95-09398. , University of Washington.
  6. Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
  7. Brown, L. D. , Hua, H. , and Gao, C. 2003. A widget framework for augmented interaction in SCAPE.
  8. Y. T. Yu, M. F. Lau, "A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions", Journal of Systems and Software, 2005, in press.
  9. Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender
  10. Yates, I. I. "Practical investigations of digital forensics tools for mobile devices. " 2010 Information Security Curriculum Development Conference. ACM, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Forensics Forensic Tools Forensic Investigation.