A Forensically Sound Adversary Model for Mobile Devices

被引:60
作者
Do, Quang [1 ]
Martini, Ben [1 ]
Choo, Kim-Kwang Raymond [1 ]
机构
[1] Univ S Australia, Informat Assurance Res Grp, Adelaide, SA 5001, Australia
来源
PLOS ONE | 2015年 / 10卷 / 09期
关键词
GENERAL COLLECTION METHODOLOGY;
D O I
10.1371/journal.pone.0138449
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and rapidly changing nature of mobile device technologies. An integral principle and significant constraint upon forensic practitioners is that of forensic soundness. Our adversary model specifically considers and integrates the constraints of forensic soundness on the adversary, in our case, a forensic practitioner. One construction of the adversary model is an evidence collection and analysis methodology for Android devices. Using the methodology with six popular cloud apps, we were successful in extracting various information of forensic interest in both the external and internal storage of the mobile device.
引用
收藏
页数:15
相关论文
共 25 条
[1]  
[Anonymous], 2015, CLOUD SECURITY ECOSY
[2]  
[Anonymous], P 13 INT C TRUST SEC, DOI DOI 10.1109/TRUSTCOM.2014.124
[3]  
Bellare M., 1993, P ANN INT CRYPT C SA, P232, DOI [DOI 10.1007/3-540-48329-2_21, 10.1007/3-540-48329-2_21]
[4]  
Bugiel S., 2013, 22 SEC S SEC 13, P131
[5]   What does "forensically sound" really mean? [J].
Casey, Eoghan .
DIGITAL INVESTIGATION, 2007, 4 (02) :49-50
[6]   A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns [J].
Creech, Gideon ;
Hu, Jiankun .
IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (04) :807-819
[7]   Exfiltrating data from Android devices [J].
Do, Quang ;
Martini, Ben ;
Choo, Kim-Kwang Raymond .
COMPUTERS & SECURITY, 2015, 48 :74-91
[8]   ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J].
DOLEV, D ;
YAO, AC .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) :198-208
[9]   An empirical comparison of data recovered from mobile forensic toolkits [J].
Glisson, William Bradley ;
Storer, Tim ;
Buchanan-Wollaston, Joe .
DIGITAL INVESTIGATION, 2013, 10 (01) :44-55
[10]  
Heiber T, 2005, SPRINGER INT SER ENG, V780, P35