2011 44th Hawaii International Conference on System Sciences 2011
DOI: 10.1109/hicss.2011.440
|View full text |Cite
|
Sign up to set email alerts
|

Third Party Application Forensics on Apple Mobile Devices

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(31 citation statements)
references
References 1 publication
0
31
0
Order By: Relevance
“…No deleted files were recovered. Files and meta-data related to the applications are stored under /private/var/mobile/Applications in the User Partition [27]. Each application creates a directory under this path.…”
Section: Ios Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…No deleted files were recovered. Files and meta-data related to the applications are stored under /private/var/mobile/Applications in the User Partition [27]. Each application creates a directory under this path.…”
Section: Ios Applicationsmentioning
confidence: 99%
“…A recent study recovered more than 11,000 data artifacts from just 49, predominately low-end, devices [25]. As with a traditional mobile phone, the smartphone not only stores call logs, text messages and personal contacts, but it also has the ability to store web-browsing artifacts, email messages, instant messenger lots, GPS coordinates, as well as third-party application related data [26][27][28].…”
Section: Related Workmentioning
confidence: 99%
“…Similar research was published by Lee and Park by capturing the SNS data using different forensic tools [41]. On the other hand, Levinson explore an investigation for third party applications in iOS platform [42]. According to Levinson, most mobile forensic work emphasis on typical mobile telephony data such as contact information, SMS, and voicemail messages.…”
Section: Apple Iosmentioning
confidence: 94%
“…Most of the third-party applications on the Apple Mobile platform contain a significant amount of forensic-rich data [17]. The user"s information during the interaction with applications is stored in plain text format and can be recovered from the user data partition of the device.…”
Section: Related Workmentioning
confidence: 99%