2013 27th International Conference on Advanced Information Networking and Applications Workshops 2013
DOI: 10.1109/waina.2013.40
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the Forensic Traces Left by AirPrint in Apple iOS Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…The results of these tests, which can be seen in more detail in [2], show that under iOS 4 and with no data encryption in place the temporary files generated by AirPrint are indeed written to disk and are potentially recoverable even after rebooting the device or turning it off.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The results of these tests, which can be seen in more detail in [2], show that under iOS 4 and with no data encryption in place the temporary files generated by AirPrint are indeed written to disk and are potentially recoverable even after rebooting the device or turning it off.…”
Section: Resultsmentioning
confidence: 99%
“…This paper focuses on the AirPrint feature of iOS devices (iPhone, iPad, and iPod Touch), which allows them to print wirelessly to compatible printers [1]. In a previous paper [2] we observed that printing a document through AirPrint leaves a trace in the filesystem of the iOS device in the form of a temporary file containing the printed content and with a specific metadata that allows for the identification of this precise kind of files in the filesystem. This paper extends our previous research to analyze if these temporary files can be recovered even in modern iOS versions which use hardwarebased data encryption.…”
Section: Introductionmentioning
confidence: 99%