Digital Forensics Analysis of Ubuntu Touch on PinePhone

نویسندگان

چکیده

New smartphones made by small companies enter the technology market everyday. These new devices introduce challenges for mobile forensic investigators as these end up becoming pertinent evidence during an investigation. One such device is PinePhone from Pine Microsystems (Pine64). are sometimes also shipped with OSes that developed open source communities and otherwise never seen investigators. Ubuntu Touch one of currently being deployment on PinePhone. There little research behind both OS what methodology investigator should follow to reliably accurately extract data. This results in potentially flawed methodologies used before any testing can occur contributes backlog need be processed. Therefore, this paper, first analysis performed using Autopsy, tool, establish a framework examine analyze running OS. The findings include artifacts could impact user privacy data security, organization structure file storage, app OS, etc. Moreover, locations within stores call logs, SMS messages, images, videos reported. Interesting artifacts, which useful understanding activity attribution. will provide roadmap digital efficiently effectively conduct their investigations where they have and/or source.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cloud Storage Forensics: Amazon Cloud Drive on Ubuntu

Cloud storage services are increasingly used by consumers, business, and government. These services are fairly easy to obtain. Amazon Cloud Drive is a cloud-based storage that allows users to transfer files to and from multiple computers. This paper was undertaken to determine the data remnants on an Ubuntu computer. We focus on exploring the cloud activities of Amazon Cloud Drive and try to ob...

متن کامل

Idiographic Digital Profiling: Behavioral Analysis Based On Digital Forensics

Idiographic digital profiling (IDP) is the application of behavioral analysis to the field of digital forensics. Previous work in this field takes a nomothetic approach to behavioral analysis by attempting to understand the aggregate behaviors of cybercriminals. This work is the first to take an idiographic approach by examining a particular subject's digital footprints for immediate use in an ...

متن کامل

An analysis of Ext4 for digital forensics

This paper presents a low-level study and analysis of Ext4 file system data structures. It includes descriptions of extents, extent trees, directory indexing HTrees, and flex block groups. Currently, data about the file system is scattered with most sources focusing on one particular feature. This paper provides a more comprehensive analysis with the forensics community in mind and states some ...

متن کامل

Digital Forensics Analysis of Spectral Estimation Methods

Abstract Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. In today’s world, it is widely used in order to secure the information. Since digital forensics aims to detect, recover and examine the digital evidence and steganography is a method for hiding digital evidence, detecting the...

متن کامل

Digital Forensics to Intelligent Forensics

In this paper we posit that current investigative techniques—particularly as deployed by law enforcement, are becoming unsuitable for most types of crime investigation. The growth in cybercrime and the complexities of the types of the cybercrime coupled with the limitations in time and resources, both computational and human, in addressing cybercrime put an increasing strain on the ability of d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics

سال: 2021

ISSN: ['2079-9292']

DOI: https://doi.org/10.3390/electronics10030343