Kindle Forensics: Acquisition & Analysis

نویسنده

  • Peter Hannay
چکیده

The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, an application framework, eBook delivery and other services over this connection. The historic data left by user interaction with this device may be of forensic interest. Analysis of the Amazon Kindle device has resulted in a method to reliably extract and interpret data from these devices in a forensically complete manner.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Verification of Recovered Digital Evidence on the Amazon Kindle

The Amazon Kindle is a popular e-book reader. This popularity will lead criminals to use the Kindle as an accessory to their crime. Very few Kindle publications in the digital forensics domain exist at the time of this writing. Various blogs on the Internet currently provide some of the foundation for Kindle forensics. For this research each fifth generation Kindle was populated with various ty...

متن کامل

Memory Forensics: Review of Acquisition and Analysis Techniques

This document presents an overview of the most common memory forensics techniques used in the acquisition and analysis of a system’s volatile memory. Memory forensics rose from obscurity in 2005 in response to a challenge issued by the Digital Forensics Research Workshop (DFRWS). Since then, investigators and researchers alike have begun to recognise the important role that memory forensics can...

متن کامل

Forensics Analysis On Smart Phones Using Mobile Forensics Tools

The role of mobile devices (cell phones and smart phones) becomes an integral part of everyone’s life, which also leads to criminal activities like hacking, Smishing, SMS spoofing etc. Digital evidence in mobile phone has attempted to delete the data by criminal. Information from mobile phones is useful for investigators to learn about user information. In this paper, a novel method is performi...

متن کامل

A flexible framework for mobile device forensics based on cold boot attacks

Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can provide against digital forensics is of particular interest. A common method to access arbitrary data in main memory is the cold boot attack. The cold boot attack exploits the remanence effect that causes data in DRAM modules not to lose the content immediately in case...

متن کامل

Live Memory Acquisition for Windows Operating Systems:

Cover Page and Abstract Tools and Techniques for Analysis The live acquisition of volatile memory (RAM) is an area in digital forensics that has not garnered much attention until most recently. The importance of the contents of physical memory has always taken a back seat to what is considered more important – the contents of physical media. However, a great deal of information can be acquired ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JDFSL

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2011