• Title/Summary/Keyword: iPhone Forensic

Search Result 13, Processing Time 0.02 seconds

A Digital Forensic Analysis for Mac OS X Main Artifacts (디지털 포렌식 관점에서의 Mac OS X 사용 흔적 분석)

  • Choi, Ji-Sung;Jeon, Sang-Jun;Park, Jung-Heum;Lee, Sang-jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.846-849
    • /
    • 2011
  • 최근 iPhone, iPad의 높은 사용율과 더불어 Apple 의 Mac 계열 제품에 대한 관심도 높아지고 있다. 이는 Apple의 운영체제인 Mac OS X의 사용율 증가와 함께 디지털 포렌식 수사 환경에서의 Mac OS X의 중요성이 높아짐을 의미한다. 디지털 포렌식 관점에서 Mac OS X에는 사용자의 사용 정보를 남기는 주요 Artifacts들이 있다. 외부 저장 장치 연결 정보, 어플리케이션 설치 정보, 사용자 인증 정보, 어플리케이션 설정 정보 등이 대표적인 Artifacts들이며, 이러한 정보들은 특정 위치의 로그 파일에 남게 된다. 본 논문은 Mac OS X의 대표적 Artifacts 들을 대상으로 사용 흔적 정보가 남는 파일을 분석하여 디지털 포렌식 수사 시 활용할 수 있도록 한다.

Forensic Analysis of HEIF Files on Android and Apple Devices (스마트폰에서 촬영된 HEIF 파일 특징 분석에 관한 연구)

  • Kwon, Youngjin;Bang, Sumin;Han, Jaehyeok;Lee, Sangjin
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.10
    • /
    • pp.421-428
    • /
    • 2021
  • The High Efficiency Image File Format (HEIF) is an MPEG-developed image format that utilizes the video codec H.265 to store still screens in a single image format. The iPhone has been using HEIF since 2017, and Android devices such as the Galaxy S10 have also supported the format since 2019. The format can provide images with good compression rates, but it has a complex internal structure and lacks significant compatibility between devices and software, making it not popular to replace commonly used JPEG (or JPG) files. However, despite the fact that many devices are already using HEIF, digital forensics research regarding it is lacking. This means that we can be exposed to the risk of missing potential evidence due to insufficient understanding of the information contained inside the file during digital forensics investigations. Therefore, in this paper, we analyze the HEIF formatted photo file taken on the iPhone and the motion photo file taken on the Galaxy to find out the information and features contained inside the file. We also investigate whether or not the software we tested support HEIF and present the requirement of forensic tools to analyze HEIF.

Design and Implementation of Analysis Techniques for Fragmented Pages in the Flash Memory Image of Smartphones (스마트폰 플래시 메모리 이미지 내의 단편화된 페이지 분석 기법 및 구현)

  • Park, Jung-Heum;Chung, Hyun-Ji;Lee, Sang-Jin;Son, Young-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.827-839
    • /
    • 2012
  • A cell phone is very close to the user and therefore should be considered in digital forensic investigation. Recently, the proportion of smartphone owners is increasing dramatically. Unlike the feature phone, users can utilize various mobile application in smartphone because it has high-performance operating system (e.g., Android, iOS). As acquisition and analysis of user data in smartphone are more important in digital forensic purposes, smartphone forensics has been studied actively. There are two way to do smartphone forensics. The first way is to extract user's data using the backup and debugging function of smartphones. The second way is to get root permission, and acquire the image of flash memory. And then, it is possible to reconstruct the filesystem, such as YAFFS, EXT, RFS, HFS+ and analyze it. However, this methods are not suitable to recovery and analyze deleted data from smartphones. This paper introduces analysis techniques for fragmented flash memory pages in smartphones. Especially, this paper demonstrates analysis techniques on the image that reconstruction of filesystem is impossible because the spare area of flash memory pages does not exist and the pages in unallocated area of filesystem.