2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec) 2014
DOI: 10.1109/cybersec.2014.6913967
|View full text |Cite
|
Sign up to set email alerts
|

Mobile forensic data acquisition in Firefox OS

Abstract: Mozilla Corporation has recently released a Linuxbased open source operating system, namely Firefox OS. The arrival of this Firefox OS has created new challenges, concentrations and opportunities for digital investigators.Currently, Firefox OS is still not fully supported by most of the existing mobile forensic tools. Even when the phone is detected as Android, only pictures from removable card was able to be captured. Furthermore, the internal data acquisition is still not working. Therefore, there are very h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 25 publications
(22 reference statements)
0
4
0
Order By: Relevance
“…Users trust their mobile devices by using them for a wide variety of purposes with the help of the available applicationsfrom communicating with family and friends to shopping and maintaining their finances online [23], [24]. This makes mobile devices a very good yet poorly protected source of valuable information [25]. Naturally, the more users trust their mobile devices, the more attractive these devices become to attackers with malicious intents [19], [21], [26].…”
Section: Review Of Related Workmentioning
confidence: 99%
“…Users trust their mobile devices by using them for a wide variety of purposes with the help of the available applicationsfrom communicating with family and friends to shopping and maintaining their finances online [23], [24]. This makes mobile devices a very good yet poorly protected source of valuable information [25]. Naturally, the more users trust their mobile devices, the more attractive these devices become to attackers with malicious intents [19], [21], [26].…”
Section: Review Of Related Workmentioning
confidence: 99%
“…Smartphones are a common source of evidence in both criminal investigations and civil litigations [20,21,22,23,24,25]. However, the constant evolution and nature (e.g., closed source operating system and diverse range of proprietary hardware) of mobile devices and mobile apps complicates forensic investigations [26].…”
Section: Introductionmentioning
confidence: 99%
“…Many investigation tools were developed to assist acquisition, collation, and analysis of data in ways that maintain the chain of evidence (Massie, 2014). Mobile forensic investigators are required to integrate technology and law in investigation of many traditional crimes such as drug dealing, copyright infringement, etc, which are facilitated by mobile and cloud technologies (Mohsen Damshenas, Ali Dehghantanha, Ramlan Mahmoud, 2013;Yusoff, Mahmod, & Abdullah, 2014). Audio files, images, videos, messages, notes and emails are just a few possible remnants that can be extracted during mobile investigations from social networking, instant messaging and cloud and mobile platforms (Aminnezhad & Dehghantanha, 2013;Daryabar et al, 2016;Seyedhossein Mohtasebi & Dehghantanha, 2011;SH Mohtasebi, 2011;Yang, Dehghantanha, Choo, & Muda, 2016).…”
Section: Introductionmentioning
confidence: 99%