Forensics and SIM Cards: An Overview

نویسندگان

  • Fabio Casadei
  • Antonio Savoldi
  • Paolo Gubian
چکیده

Nowadays there are many tools for the extraction of data objects [SWGDE] from SIM cards; unfortunately, most of them are proprietary, or their use is restricted to law enforcement and this is contrary to the Daubert test for acceptability from the scientific community. In this paper, we present an open source tool for data objects extraction from SIM and USIM cards which is capable of extracting all observable memory and all the non-standard files that are found in every SIM card. First, a description of the tool from a digital forensics perspective will be provided. Then, the technological background of the tool will be sketched. After that, the core algorithms will be described and explained. Then, motivations for the choice of an XML format for output will be given and the format described. In conclusion, the possible lines of evolution will be presented.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Digital Forensic Analysis of SIM Cards

Smart cards are fundamental technology in modern life. It is embedded in numerous devices such as GPS devices, ATM cards, Mobile SIM cards and many others. Mobile devices became the evolution of technology. It becomes smaller, faster and supports large storage capabilities. Digital forensics of mobile devices that maybe found in crime scene is becoming inevitable. The purpose of this research i...

متن کامل

Embedded Forensics: An Ongoing Research about SIM/USIM Cards

The purpose of this section is to give an overview on smart cards used in the telecommunications field by detailing the main building blocks, their functions and how they are related to each other. Generally speaking, smart cards belong to the group of identification cards using a ID--1 format formally defined in ISO Standard 7810, Identification Cards -Physical Characteristics. This standard s...

متن کامل

SIM Based WLAN Authentication for Open Platforms

2. Overview of GSM SIM Based Authentication This paper discusses approaches to authenticating users with open platforms, such as notebook PCs, for WLAN access using SIM cards. Using SIM cards to authenticate WLAN access is desirable by wireless operators as this approach minimizes additional infrastructure investments since the existing authentication processes and equipment are re-used. This p...

متن کامل

Improved Response to Disasters and Outbreaks by Tracking Population Movements with Mobile Phone Network Data: A Post-Earthquake Geospatial Study in Haiti

BACKGROUND Population movements following disasters can cause important increases in morbidity and mortality. Without knowledge of the locations of affected people, relief assistance is compromised. No rapid and accurate method exists to track population movements after disasters. We used position data of subscriber identity module (SIM) cards from the largest mobile phone company in Haiti (Dig...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IJDE

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2006