Key Technologies for Mobile Phone Forensics and Application

被引:1
|
作者
Su, Qingchao [1 ]
Xi, Bin [1 ]
机构
[1] Xiamen Univ, Dept Automat, Xiamen, Peoples R China
来源
2017 2ND INTERNATIONAL CONFERENCE ON MULTIMEDIA AND IMAGE PROCESSING (ICMIP) | 2017年
关键词
mobile phone forensics; SQLite; decryption; data-recovery;
D O I
10.1109/ICMIP.2017.15
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Mobile phone is an important source of evidence for judicial staff, but the research of mobile phone forensics system is quite deficient compared with computer forensics. Toward this end, this paper proposed an integrated framework of the mobile phone forensics system, which is based on the characteristic and difficulties of mobile phone forensics. To begin with, the inner structure and forensic process of the system are introduced, which are crucial fundamental techniques for follow-up work. To be specific, it applied three-step strategy, namely, moreover, this paper studies the method of data collection and analyzes the functions of the mobile phone forensics system. At the same time, in order to deal with the database scenario, it proposed a decryption method and a data-recovery method based on SQLite, which is the key part of this paper. Finally, the practicability of this system is shown by graphic demonstration.
引用
收藏
页码:335 / 340
页数:6
相关论文
共 50 条
  • [21] Mobile Phone Application Development for the Classroom
    Lewis, Preston
    Oostra, Daniel
    Crecelius, Sarah
    Chambers, Lin H.
    CONNECTING PEOPLE TO SCIENCE: A NATIONAL CONFERENCE ON SCIENCE EDUCATION AND PUBLIC OUTREACH, 2012, 457 : 287 - +
  • [22] Mobile phone application for mathematics learning
    Supandi
    Ariyanto, L.
    Kusumaningsih, W.
    Aini, A. N.
    INTERNATIONAL CONFERENCE ON MATHEMATICS, SCIENCE AND EDUCATION 2017 (ICMSE2017), 2018, 983
  • [23] On Lightweight Mobile Phone Application Certification
    Enck, William
    Ongtang, Machigar
    McDaniel, Patrick
    CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 235 - 245
  • [24] On the Application of Microfluidic-Based Technologies in Forensics: A Review
    Bazyar, Hanieh
    SENSORS, 2023, 23 (13)
  • [25] APPLICATION OF 3G KEY TECHNOLOGIES IN MOBILE E-BUSINESS
    Jian Jie
    Wu Zhaowen
    ICMH 2008: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON MATERIAL HANDLING, 2008, : 210 - 215
  • [26] Key Strength with Encryption and Dynamic Location of Mobile Phone
    Hamad, Hatem
    ELKourd, Souhir
    2012 6TH INTERNATIONAL CONFERENCE ON SCIENCES OF ELECTRONICS, TECHNOLOGIES OF INFORMATION AND TELECOMMUNICATIONS (SETIT), 2012, : 468 - 473
  • [27] ROBOTS PROVIDE THE KEY TO MOBILE PHONE INTERFERENCE PROTECTION
    LINES, C
    INDUSTRIAL ROBOT, 1994, 21 (05): : 41 - 42
  • [28] Research and implementation of key technologies of digital forensics based on cloud computing
    Fang, Wei, 1600, Universidad Central de Venezuela (55):
  • [29] A high performance camcorder phone design - A new mobile phone application
    Lee, HS
    2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 3549 - 3551
  • [30] Consumption of technology and technologies of consumption: Mobile phone, fashion and novelty
    Petrovcic, Andraz
    JAVNOST-THE PUBLIC, 2007, 14 : S89 - +