Key Technologies for Mobile Phone Forensics and Application

被引:1
作者
Su, Qingchao [1 ]
Xi, Bin [1 ]
机构
[1] Xiamen Univ, Dept Automat, Xiamen, Peoples R China
来源
2017 2ND INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP) | 2017年
关键词
mobile phone forensics; SQLite; decryption; data-recovery;
D O I
10.1109/ICMIP.2017.15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile phone is an important source of evidence for judicial staff, but the research of mobile phone forensics system is quite deficient compared with computer forensics. Toward this end, this paper proposed an integrated framework of the mobile phone forensics system, which is based on the characteristic and difficulties of mobile phone forensics. To begin with, the inner structure and forensic process of the system are introduced, which are crucial fundamental techniques for follow-up work. To be specific, it applied three-step strategy, namely, moreover, this paper studies the method of data collection and analyzes the functions of the mobile phone forensics system. At the same time, in order to deal with the database scenario, it proposed a decryption method and a data-recovery method based on SQLite, which is the key part of this paper. Finally, the practicability of this system is shown by graphic demonstration.
引用
收藏
页码:335 / 340
页数:6
相关论文
共 16 条
[1]  
Bai Jinguo, 2016, RECOVERY METHOD DELE, P506
[2]  
[方冬蓉 Fang Dongrong], 2014, [计算机工程, Computer Engineering], V40, P275
[3]  
Jeon Sangjun, 2012, RECOVERY METHOD DELE, P707
[4]  
Jun Chen, 2014, 2014 IMSS INT C FUT
[5]  
Li Qian, 2014, 2014 IEEE 5 INT C
[6]  
Liu YJ, 2011, IEEE SYS MAN CYBERN, P2011, DOI 10.1109/ICSMC.2011.6083967
[7]  
Pereira Murilo Tito, 2009, DIGITAL INVESTIGATIO, V5
[8]  
Wang Xinlei, 2014, HE DESIGN IMPLEMENTA
[9]  
Wang Yuyang, 2015, ACQUISITION ANAL BRO
[10]  
Wu Liangbo, 2010, COMPUTER ENG DESIGN, V31