Current and Future Trends in Mobile Device Forensics: A Survey

被引:38
作者
Barmpatsalou, Konstantia [1 ]
Cruz, Tiago [1 ]
Monteiro, Edmundo [1 ]
Simoes, Paulo [1 ]
机构
[1] Univ Coimbra, Dept Informat CISUC DEI, Ctr Informat & Syst, Polo 2 Pinhal Marrocos, P-3030290 Coimbra, Portugal
基金
欧盟地平线“2020”;
关键词
Mobile forensics; digital forensics; mobile cloud forensics; evidence acquisition; forensic ontologies; evidence parsing; digital investigations; CHALLENGES; COLLECTION; FRAMEWORK; ONTOLOGY;
D O I
10.1145/3177847
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Contemporary mobile devices are the result of an evolution process, during which computational and networking capabilities have been continuously pushed to keep pace with the constantly growing workload requirements. This has allowed devices such as smartphones, tablets, and personal digital assistants to perform increasingly complex tasks, up to the point of efficiently replacing traditional options such as desktop computers and notebooks. However, due to their portability and size, these devices are more prone to theft, to become compromised, or to be exploited for attacks and other malicious activity. The need for investigation of the aforementioned incidents resulted in the creation of the Mobile Forensics (MF) discipline. MF, a subdomain of digital forensics, is specialized in extracting and processing evidence from mobile devices in such a way that attacking entities and actions are identified and traced. Beyond its primary research interest on evidence acquisition from mobile devices, MF has recently expanded its scope to encompass the organized and advanced evidence representation and analysis of future malicious entity behavior. Nonetheless, data acquisition still remains its main focus. While the field is under continuous research activity, new concepts such as the involvement of cloud computing in the MF ecosystem and the evolution of enterprise mobile solutions-particularly mobile device management and bring your own device-bring new opportunities and issues to the discipline. The current article presents the research conducted within the MF ecosystem during the last 7 years, identifies the gaps, and highlights the differences from past research directions, and addresses challenges and open issues in the field.
引用
收藏
页数:31
相关论文
共 122 条
  • [1] Al Barghouthy N, 2013, INT CONF COMP SCI, P33, DOI 10.1109/CSIT.2013.6588754
  • [2] Al Barghuthi Nedaa B., 2013, Journal of Communications, V8, P708
  • [3] Forensic analysis of WhatsApp Messenger on Android smartphones
    Anglano, Cosimo
    [J]. DIGITAL INVESTIGATION, 2014, 11 (03) : 201 - 213
  • [4] [Anonymous], 2015, CLOUD SECURITY ECOSY, DOI DOI 10.1016/B9780-12801595-7.00015X
  • [5] [Anonymous], COMPUTING RES REPOSI
  • [6] [Anonymous], 2016, STATE CLOUD REPORT
  • [7] [Anonymous], 2013, Int. J. Comput. Appl, DOI [DOI 10.5120/13504-1253, 10.5120/13504-1253]
  • [8] [Anonymous], 2016, NOWSECURE POWER EFFI
  • [9] [Anonymous], 2014, 2014 INT S NETW COMP, DOI DOI 10.1109/SNCC.2014.6866510
  • [10] [Anonymous], 2015, MOBILE FORENSICS LOO