2019
DOI: 10.1016/j.diin.2019.06.003
|View full text |Cite
|
Sign up to set email alerts
|

Digital forensic artifacts of the Your Phone application in Windows 10

Abstract: Your Phone is a Microsoft system that comprises two applications: a smartphone app for Android 7+ smartphones and a desktop application for Windows 10/18.03+. It allows users to access their most recent smartphonestored photos/screenshots and send/receive short message service (SMS) and multimedia messaging service (MMS) within their Your Phone-linked Windows 10 personal computers. In this paper, we analyze the digital forensic artifacts created at Windows 10 personal computers whose users have the Your Phone … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…There are many challenges in the field of mobile forensics, one of which is limited resources, in the sense that the rapid development of mobile technology and the increase in the number of smartphone devices are not matched by the development of mobile forensic technology and the development of mobile forensic technology [29,30]. Existing forensic tools to overcome these challenges need to do a comparative analysis of instant messaging features and forensic tools [31,32].…”
Section: Literature Reviewmentioning
confidence: 99%
“…There are many challenges in the field of mobile forensics, one of which is limited resources, in the sense that the rapid development of mobile technology and the increase in the number of smartphone devices are not matched by the development of mobile forensic technology and the development of mobile forensic technology [29,30]. Existing forensic tools to overcome these challenges need to do a comparative analysis of instant messaging features and forensic tools [31,32].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The CSEM content found on an iPhone, for example, is potentially on any computer that the phone was connected to and backed up to an iCloud account. Additionally, features like device backups and automated restore points may mean the same content is further propagated to removable media or other locations within the same media (Boucher and Le-Khac, 2018; Chung et al, 2017; Domingues et al, 2019). By treating each device as part of an ecosystem and identifying vectors for potential CSEM propagation within a user’s systems, further external distribution can be identified, and the investigators can ensure all relevant copies of content are seized to prevent the facilitation of future recidivating behaviour.…”
Section: Digital Forensicsmentioning
confidence: 99%
“…Significantly, as no single tool can parse all the data from the mobile phone, it is vital that the examiner have sound knowledge of file systems structures to recover all the data that tools cannot process. According to Domingues et al, 22 this phase is followed by verification process to determine the accuracy of the acquired data by comparing the extracted data to the data on the mobile phone to identify any possible discrepancies. It also uses a variety of tools to compare the results to identify any differences using hash values to identify if data on the images has changed since acquisition.…”
Section: Introductionmentioning
confidence: 99%