Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition

Abstract : Smartphones constantly interweave into everyday life, as they accompany individuals in different contexts. Smartphones include a combination of heterogeneous data sources, which can prove essential when combating crime. In this paper we examine potential evidence that may be collected from smartphones. We also examine the available connection channels for evidence transfer during a forensic investigation. We propose a Proactive Smartphone Investigation Scheme that focuses on ad hoc acquisition of smartphone evidence. We also, take into consideration the legal implications of the proposed scheme, as it is essential that the scheme includes prevention mechanisms, so as to protect individuals from misuse by investigators or malicious entities.
Document type :
Conference papers
Dimitris Gritzalis; Steven Furnell; Marianthi Theoharidou. 27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. Springer, IFIP Advances in Information and Communication Technology, AICT-376, pp.249-260, 2012, Information Security and Privacy Research. 〈10.1007/978-3-642-30436-1_21〉
Liste complète des métadonnées

Cited literature [20 references]  Display  Hide  Download

https://hal.inria.fr/hal-01518249
Contributor : Hal Ifip <>
Submitted on : Thursday, May 4, 2017 - 1:45:43 PM
Last modification on : Thursday, May 4, 2017 - 2:53:52 PM
Document(s) archivé(s) le : Saturday, August 5, 2017 - 1:27:03 PM

File

978-3-642-30436-1_21_Chapter.p...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Alexios Mylonas, Vasilis Meletiadis, Bill Tsoumas, Lilian Mitrou, Dimitris Gritzalis. Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition. Dimitris Gritzalis; Steven Furnell; Marianthi Theoharidou. 27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crete, Greece. Springer, IFIP Advances in Information and Communication Technology, AICT-376, pp.249-260, 2012, Information Security and Privacy Research. 〈10.1007/978-3-642-30436-1_21〉. 〈hal-01518249〉

Share

Metrics

Record views

37

Document downloads

85