2015 10th International Conference on Availability, Reliability and Security 2015
DOI: 10.1109/ares.2015.39
|View full text |Cite
|
Sign up to set email alerts
|

Watch What You Wear: Preliminary Forensic Analysis of Smart Watches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
15
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 42 publications
(16 citation statements)
references
References 15 publications
0
15
0
1
Order By: Relevance
“…IoT forensics has been widely studied in recent literature [2,[10][11][12][13][14][15]. There has also been recent literature and studies that have focused on recovering forensic artifacts of interests from virtual assistant enabled devices and their companion devices.…”
Section: Related Workmentioning
confidence: 99%
“…IoT forensics has been widely studied in recent literature [2,[10][11][12][13][14][15]. There has also been recent literature and studies that have focused on recovering forensic artifacts of interests from virtual assistant enabled devices and their companion devices.…”
Section: Related Workmentioning
confidence: 99%
“…Smartwatches are small, expensive and popular. As a result, they have been deemed a feasible target for theft (Baggili et al, 2015). Through using a screen lock, personal data is better-protected.…”
Section: Protective Features and Concern Scenariosmentioning
confidence: 99%
“…In respect to smart TVs, in [ 29 ] the Amazon Fire TV stick is studied and guidelines on how to acquire a forensic image of the device when performing a chip-off are given, and a list is given of the artifacts that can be found on it, although the analysis is not very extensive. Other relevant devices are smart watches, which contain a considerable amount of sensitive information, as is shown in [ 30 ], in which two models are examined and a forensic analysis is performed on them, explaining the acquisition process and the tools that are used. The information obtained from them is not very relevant for an investigation, but the process followed is very interesting and significant in helping explain how to manage this kind of device.…”
Section: Related Workmentioning
confidence: 99%