Forensic Protocol Filtering of Phone Managers

نویسندگان

  • Wayne Jansen
  • Aurélien Delaitre
چکیده

Phone managers are non-forensic tools sometimes used by forensic investigators to recover data from a cell phone when no suitable forensic tool is available for the device. While precautions can be taken to preserve the integrity of data on a cell phone, inherent risks exist. Applying a forensic filter to phone manager exchanges with a device is suggested as a safer alternative that could be pursued as a solution to reduce risk.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

Channel Compensation for Forensic Speaker Identification Using Inverse Processing

Typically, speaker identification examination requires two audio recordings: a voice sample and a questionable recording. The questionable one is in most of the cases the intercepted or recorded phone call. As mobile phones became the most popular way of communication, the largest number of questionable recordings comes from GSM channels. They use special algorithms and devices to transmit the ...

متن کامل

Multi-directional and multi-scale perturbation approaches for blind forensic median filtering detection

The forensic detection of median filtering has recently attracted the attention of the research community, mainly because of the median filtering potential uses for tampering and concealing image tampering traces in digital images. In this paper, we propose multi-scale and multi-perturbation solutions that build a highly discriminative feature space, which highlights the artifacts of median fil...

متن کامل

Tracing Vnc and Rdp Protocol Artefacts on Windows Mobile and Windows Smartphone for Forensic Purpose

Remote access is the means of acquiring access to a computer or network remotely or from distance. It is typically achieved through the internet which connects people, corporate offices and telecommuters to the internal network of organizations or individuals. In recent years there has been a greater adoption of remote desktop applications that help administrators to configure and repair comput...

متن کامل

A Study of Packet Analysis regarding a DoS Attack in WiBro Environments

This paper analyzes the DoS attack traffic on the WiBro network, generates logs and tracebacks the attacker. With attaining the integrity against the packets resulted from the malicious DoS attack, the paper provides the framework to generating forensic data. In the WiBro network environment, the attacker and the victim are the WiBro mobile terminal. The packet analyzers(Cain & Abel, Wireshark ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008