2012
DOI: 10.1007/978-3-642-35264-5_9
|View full text |Cite
|
Sign up to set email alerts
|

Symbian Smartphone Forensics: Linear Bitwise Data Acquisition and Fragmentation Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…They also presented reverse-engineering analysis work on the active and deleted SMS recovery from the onphone memory of Symbian OS. In addition, Thing and Chua was proposed a forensics evidentiary acquisition tool for Symbian OS [31]. Their acquisition tool was built to support a low-level bit-by-bit acquisition of the phone's internal flash memory, including the unallocated space.…”
Section: Symbian Osmentioning
confidence: 99%
“…They also presented reverse-engineering analysis work on the active and deleted SMS recovery from the onphone memory of Symbian OS. In addition, Thing and Chua was proposed a forensics evidentiary acquisition tool for Symbian OS [31]. Their acquisition tool was built to support a low-level bit-by-bit acquisition of the phone's internal flash memory, including the unallocated space.…”
Section: Symbian Osmentioning
confidence: 99%
“…The test subject phone was a Nokia N97 running the S60 5th edition. The Thing and Chua, 2012). The Acquisition Program triggered the Memory Extraction Module, which stored the bitwise copy of the memory image at a removable storage media.…”
Section: Symbian Forensicsmentioning
confidence: 99%
“…In the same year (2012), Thing and Chua [12] proposed a low-level linear bitwise data acquisition technique for the Symbian OS version 9.4 phones to support evidentiary file carving. A study and analysis of how files are stored and fragmented on the Symbian smartphone flash memory was also carried out.…”
Section: History Of Symbian Smartphone Forensicsmentioning
confidence: 99%
“…logical data acquisition) from the Subscriber Identity Module (SIM), memory cards and the internal flash memory [2][3][4][5][6][7][8]. There exists research work focusing on the low-level physical accquisition of raw data from the mobile phones' non-volatile memories [9][10][11][12], to support indepth forensics investigations and evidence analysis, but did not take the volatile memories into consideration.…”
Section: Introductionmentioning
confidence: 99%