Forensic analysis techniques for fragmented flash memory pages in smartphones
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, Jungheum | - |
dc.contributor.author | Chung, Hyunji | - |
dc.contributor.author | Lee, Sangjin | - |
dc.date.accessioned | 2021-09-06T13:56:17Z | - |
dc.date.available | 2021-09-06T13:56:17Z | - |
dc.date.created | 2021-06-14 | - |
dc.date.issued | 2012-11 | - |
dc.identifier.issn | 1742-2876 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/107105 | - |
dc.description.abstract | A mobile phone contains important personal information, and therefore, it should be considered in digital forensic investigations. Recently, the number of smartphone owners has increased drastically. Unlike feature phones, smartphones have high-performance operating systems (e.g., Android, iOS), and users can install and utilize various mobile applications on smartphones. Smartphone forensics has been actively studied because of the importance of smartphone user data acquisition and analysis for digital forensic purposes. In general, there are two logical approaches to smartphone forensics. The first approach is to extract user data using the backup and debugging function of smartphones. The second approach is to get root permission through the rooting or the bootloader method with custom kernel, and acquire an image of the flash memory. In addition, the other way is to acquire an image on a more physical way by using e.g., JTAG or chipoff process. In some cases, it may be possible to reconstruct and analyze the file system. However, existing methods for file system analysis are not suitable for recovering and analyzing data deleted from smartphones depending on the manner in which the flash memory image has to be acquired. This paper proposes new analysis techniques for fragmented flash memory pages in smartphones. In particular, this paper demonstrates analysis techniques on the image that the reconstruction of file system is impossible because the spare area of flash memory pages does not exist or that it is created from the unallocated area of the undamaged file system. (c) 2012 Elsevier Ltd. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCI LTD | - |
dc.subject | FILES | - |
dc.title | Forensic analysis techniques for fragmented flash memory pages in smartphones | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Sangjin | - |
dc.identifier.doi | 10.1016/j.diin.2012.09.003 | - |
dc.identifier.scopusid | 2-s2.0-84870255379 | - |
dc.identifier.wosid | 000311484600005 | - |
dc.identifier.bibliographicCitation | DIGITAL INVESTIGATION, v.9, no.2, pp.109 - 118 | - |
dc.relation.isPartOf | DIGITAL INVESTIGATION | - |
dc.citation.title | DIGITAL INVESTIGATION | - |
dc.citation.volume | 9 | - |
dc.citation.number | 2 | - |
dc.citation.startPage | 109 | - |
dc.citation.endPage | 118 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Interdisciplinary Applications | - |
dc.subject.keywordPlus | FILES | - |
dc.subject.keywordAuthor | Digital forensics | - |
dc.subject.keywordAuthor | Smartphone forensics | - |
dc.subject.keywordAuthor | Flash memory | - |
dc.subject.keywordAuthor | Unallocated area | - |
dc.subject.keywordAuthor | Fragmented data | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.