Digital Forensics Analysis of Ubuntu Touch on PinePhone
نویسندگان
چکیده
New smartphones made by small companies enter the technology market everyday. These new devices introduce challenges for mobile forensic investigators as these end up becoming pertinent evidence during an investigation. One such device is PinePhone from Pine Microsystems (Pine64). are sometimes also shipped with OSes that developed open source communities and otherwise never seen investigators. Ubuntu Touch one of currently being deployment on PinePhone. There little research behind both OS what methodology investigator should follow to reliably accurately extract data. This results in potentially flawed methodologies used before any testing can occur contributes backlog need be processed. Therefore, this paper, first analysis performed using Autopsy, tool, establish a framework examine analyze running OS. The findings include artifacts could impact user privacy data security, organization structure file storage, app OS, etc. Moreover, locations within stores call logs, SMS messages, images, videos reported. Interesting artifacts, which useful understanding activity attribution. will provide roadmap digital efficiently effectively conduct their investigations where they have and/or source.
منابع مشابه
Cloud Storage Forensics: Amazon Cloud Drive on Ubuntu
Cloud storage services are increasingly used by consumers, business, and government. These services are fairly easy to obtain. Amazon Cloud Drive is a cloud-based storage that allows users to transfer files to and from multiple computers. This paper was undertaken to determine the data remnants on an Ubuntu computer. We focus on exploring the cloud activities of Amazon Cloud Drive and try to ob...
متن کاملIdiographic Digital Profiling: Behavioral Analysis Based On Digital Forensics
Idiographic digital profiling (IDP) is the application of behavioral analysis to the field of digital forensics. Previous work in this field takes a nomothetic approach to behavioral analysis by attempting to understand the aggregate behaviors of cybercriminals. This work is the first to take an idiographic approach by examining a particular subject's digital footprints for immediate use in an ...
متن کاملAn analysis of Ext4 for digital forensics
This paper presents a low-level study and analysis of Ext4 file system data structures. It includes descriptions of extents, extent trees, directory indexing HTrees, and flex block groups. Currently, data about the file system is scattered with most sources focusing on one particular feature. This paper provides a more comprehensive analysis with the forensics community in mind and states some ...
متن کاملDigital Forensics Analysis of Spectral Estimation Methods
Abstract Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. In today’s world, it is widely used in order to secure the information. Since digital forensics aims to detect, recover and examine the digital evidence and steganography is a method for hiding digital evidence, detecting the...
متن کاملDigital Forensics to Intelligent Forensics
In this paper we posit that current investigative techniques—particularly as deployed by law enforcement, are becoming unsuitable for most types of crime investigation. The growth in cybercrime and the complexities of the types of the cybercrime coupled with the limitations in time and resources, both computational and human, in addressing cybercrime put an increasing strain on the ability of d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Electronics
سال: 2021
ISSN: ['2079-9292']
DOI: https://doi.org/10.3390/electronics10030343