Mobile Anti-forensics

Authors

  • Светлана Антешевић Autor

DOI:

https://doi.org/10.24867/16BE07Antesevic

Keywords:

digital forensics, anti-forensics, Android, iOS, techniques, tools

Abstract

This paper addresses the anti-forensics of mobile devices. Techniques related to anti-forensics of mobile devices are considered and analyzed, and tools that implement these techniques are presented and described in detail. Emphasis is placed on the processing of techniques and tools related to the iOS and Android operating systems due to their dominance in the market.

References

[1] André Årnes, Digital Forensics, First. John Wiley & Sons Ltd, 2018. [Online]. Available: https://lccn.loc.gov/2017004725
[2] Стеван Гостојић, “06 Форензика мобилних уређаја.” 2021.
[3] “Mobile Operating System Market Share Worldwide,” StatCounter Global Stats. https://gs.statcounter.com/os-market-share/mobile/worldwide (accessed Sep. 16, 2021).
[4] “Platform Architecture,” Android Developers. https://developer.android.com/guide/platform (accessed Sep. 08, 2021).
[5] “Mobile security,” Wikipedia. Aug. 18, 2021. Accessed: Sep. 08, 2021. [Online]. Available: https://en.wikipedia.org/w/index.php?title=Mobile_security&oldid=1039460744
[6] Read Practical Mobile Forensics Online by Satish Bommisetty, Rohit Tamma, and Heather Mahalik | Books. Accessed: Sep. 08, 2021. [Online]. Available: https://www.scribd.com/book/272076743/Practical-Mobile-Forensics
[7] “Digital Forensics Explained,” Routledge & CRC Press. https://www.routledge.com/Digital-Forensics-Explained/Gogolin/p/book/9780367503437 (accessed Sep. 08, 2021).
[8] Стеван Гостојић, “09 Антифорензика.” 2021.
[9] C. DOrazio, A. Ariffin, and K.-K. R. Choo, “iOS Anti-forensics: How Can We Securely Conceal, Delete and Insert Data?,” in 2014 47th Hawaii International Conference on System Sciences, Jan. 2014, pp. 4838–4847. doi: 10.1109/HICSS.2014.594.

Published

2022-01-26

Issue

Section

Electrotechnical and Computer Engineering