2022
DOI: 10.1051/itmconf/20224602006
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Forensics Data Acquisition

Asmae El Majdoub,
Chaimae Saadi,
Habiba Chaoui

Abstract: Mobile technology is among the fastest developing technologies that have changed the way we live our lives. And, with the increase of the need to protect our personal information, smartphone companies have developed multiple types of security protection measures on their devices which makes the forensic data acquisition for law enforcement purposes so much harder. As we all know, one of the biggest tasks in mobile forensics investigation is the step of data acquisition, it is the step of extracting all the val… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…2) Logical extraction: When applying this method, the investigator will be able to generate a copy of the file system that can be used later to extract data using some tools designed for this purpose. This copy will enable the investigator to view the same data that can be generated using manual extraction [38]. However, this method does not affect the integrity of the files of the mobile device and the investigator can only work on the copy of the files and the original device will be kept safely in an evidence container.…”
Section: C) Data Extractionmentioning
confidence: 99%
“…2) Logical extraction: When applying this method, the investigator will be able to generate a copy of the file system that can be used later to extract data using some tools designed for this purpose. This copy will enable the investigator to view the same data that can be generated using manual extraction [38]. However, this method does not affect the integrity of the files of the mobile device and the investigator can only work on the copy of the files and the original device will be kept safely in an evidence container.…”
Section: C) Data Extractionmentioning
confidence: 99%