Browse > Article
http://dx.doi.org/10.13089/JKIISC.2013.23.6.1057

A Method of Internal Information Acquisition of Smartphones  

Lee, Yunho (Center for Information Security Technologies, Korea University)
Lee, Sangjin (Center for Information Security Technologies, Korea University)
Abstract
The market share of smartphones has been increasing more and more at the recent mobile market and smart devices and applications that are based on a variety of operating systems has been released. Given this reality, the importance of smart devices analysis is coming to the fore and the most important thing is to minimize data corruption when extracting data from the device in order to analyze user behavior. In this paper, we compare and analyze the area-specific changes that are the file system of collected image after obtaining root privileges on the Android OS and iOS based devices, and then propose the most efficient method to obtain root privileges.
Keywords
Digital Forensics; Smartphone Forensics; Android Forensics; iOS Forensics; Data Acquisition;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Chen and C. Yang, "Design and Implementation of Live SD Acquisition Tool in Android Smart Phone," Fifth International Conference on Genetic and Evolutionary Computing, pp.157-162,Sep. 2011
2 Matthew J. Decker, "Dispelling Common Myths of "Live Digital Forensics," Digital Forensics Certification Board, White Papers, Sep. 2011.
3 Jungheum Park, "Forensic analysis techniques for fragmented flash memory pages in smartphones," Digital Investigation 9, pp. 109-118, 2012   DOI   ScienceOn
4 Andrew Hoog, "Android Forensics," Mobile Forensics World 2009, May. 2009
5 Andrew Hoog, "Android Forensics: Investigation, Analysis and Mobile Security for Google Android," Elsevier, June, 2011
6 Jeff Lessard, "Android Forensics : Simplifying Cell Phone Examinations," Small Scale Digital Device Forensics Journal, Vol. 4, No. 1, pp.1-12, Sep. 2010
7 Timothy Vidas, "Toward a general collection methodology for Android devices," Digital Investigation 8, Supplement, pp.14-24, 2011   DOI   ScienceOn
8 Mona Bader, "iPhone 3GS Forensics: Logical analysis using Apple iTunes Backup Utility," Small Scale Digital Device Forensic Journal Vol. 4, No.1, Sep. 2010
9 Jonathan Zdziarski, "iPhone Forensics," O'Reilly Media, Sebastopol, Sep. 2008
10 K. Kim, D. Hong, and J. Ryu, "Forensic Data Acquisition from Cell Phones using JTAG Interface," in Proc. Security and Management, pp.410-414, 2008
11 Junghoon Oh, "A Study for Android Smartphone Forensic Analysis," Master's Thesis of Graduate School of Information Security, Korea University, 2011
12 Android Developers Community, "http://forum.xda-developers.com"
13 Fastboot, http://en.wikipedia.org/wiki/Android_software_development#Fastboot
14 redsn0w, "http://blog.iphone-dev.org/tagged/redsn0w"
15 Absinthe, "http://absinthejailbreak.com/about-absinthe-jailbreak/"
16 evasi0n, "http://www.evasi0n.com/"
17 Cydia, "http://en.wikipedia.org/wiki/Cydia"