Forensics and SIM Cards: An Overview
نویسندگان
چکیده
Nowadays there are many tools for the extraction of data objects [SWGDE] from SIM cards; unfortunately, most of them are proprietary, or their use is restricted to law enforcement and this is contrary to the Daubert test for acceptability from the scientific community. In this paper, we present an open source tool for data objects extraction from SIM and USIM cards which is capable of extracting all observable memory and all the non-standard files that are found in every SIM card. First, a description of the tool from a digital forensics perspective will be provided. Then, the technological background of the tool will be sketched. After that, the core algorithms will be described and explained. Then, motivations for the choice of an XML format for output will be given and the format described. In conclusion, the possible lines of evolution will be presented.
منابع مشابه
Digital Forensic Analysis of SIM Cards
Smart cards are fundamental technology in modern life. It is embedded in numerous devices such as GPS devices, ATM cards, Mobile SIM cards and many others. Mobile devices became the evolution of technology. It becomes smaller, faster and supports large storage capabilities. Digital forensics of mobile devices that maybe found in crime scene is becoming inevitable. The purpose of this research i...
متن کاملEmbedded Forensics: An Ongoing Research about SIM/USIM Cards
The purpose of this section is to give an overview on smart cards used in the telecommunications field by detailing the main building blocks, their functions and how they are related to each other. Generally speaking, smart cards belong to the group of identification cards using a ID--1 format formally defined in ISO Standard 7810, Identification Cards -Physical Characteristics. This standard s...
متن کاملSIM Based WLAN Authentication for Open Platforms
2. Overview of GSM SIM Based Authentication This paper discusses approaches to authenticating users with open platforms, such as notebook PCs, for WLAN access using SIM cards. Using SIM cards to authenticate WLAN access is desirable by wireless operators as this approach minimizes additional infrastructure investments since the existing authentication processes and equipment are re-used. This p...
متن کاملImproved Response to Disasters and Outbreaks by Tracking Population Movements with Mobile Phone Network Data: A Post-Earthquake Geospatial Study in Haiti
BACKGROUND Population movements following disasters can cause important increases in morbidity and mortality. Without knowledge of the locations of affected people, relief assistance is compromised. No rapid and accurate method exists to track population movements after disasters. We used position data of subscriber identity module (SIM) cards from the largest mobile phone company in Haiti (Dig...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IJDE
دوره 5 شماره
صفحات -
تاریخ انتشار 2006