2012
DOI: 10.1007/978-3-642-34129-8_21
|View full text |Cite
|
Sign up to set email alerts
|

Symbian Smartphone Forensics and Security: Recovery of Privacy-Protected Deleted Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
6
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…Thing and Tan was proposed a method to acquire privacy-protected data from smartphones running the latest Symbian OS v9.4 and smartphones running the prior Symbian OS v9.3 [30]. They also presented reverse-engineering analysis work on the active and deleted SMS recovery from the onphone memory of Symbian OS.…”
Section: Symbian Osmentioning
confidence: 99%
“…Thing and Tan was proposed a method to acquire privacy-protected data from smartphones running the latest Symbian OS v9.4 and smartphones running the prior Symbian OS v9.3 [30]. They also presented reverse-engineering analysis work on the active and deleted SMS recovery from the onphone memory of Symbian OS.…”
Section: Symbian Osmentioning
confidence: 99%
“…Thing and Tan (Thing and Tan, 2012) went further through the Symbian forensics field. They mainly focused on retrieval of privacy protected data on smartphones running the Symbian OS.…”
Section: Symbian Forensicsmentioning
confidence: 99%
“…They figured out that each file entry inside the folder referred to an allocated SMS. Moreover, they implemented an algorithm in order to perceive properly the actual packet and message length (Thing and Tan, 2012). Acquiring deleted SMS from the index file was a slightly different procedure.…”
Section: Symbian Forensicsmentioning
confidence: 99%
“…logical data acquisition) from the Subscriber Identity Module (SIM), memory cards and the internal flash memory [2][3][4][5][6][7][8]. There exists research work focusing on the low-level physical accquisition of raw data from the mobile phones' non-volatile memories [9][10][11][12], to support indepth forensics investigations and evidence analysis, but did not take the volatile memories into consideration.…”
Section: Introductionmentioning
confidence: 99%