Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(351.46KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
On the Availability of Anti-Forensic Tools for Smartphones
Ioana Sporea, Benjamin Aziz, Zac McIntyre
Pages - 58 - 64     |    Revised - 15-11-2012     |    Published - 31-12-2012
Volume - 6   Issue - 4    |    Publication Date - December 2012  Table of Contents
MORE INFORMATION
KEYWORDS
Mobile Computing, Anti-forensics, Cryptography, Steganography
ABSTRACT
The existence of anti-forensic tools in the context of computing systems is one of the main challenges for forensics investigators in achieving reliable evidence recovery and consequently uncovering crime facts. This is in particular more challenging in emerging smartphone technologies, since data is of highly mobile and volatile nature. In the current paper, we present a brief study of several anti-forensic applications available for smartphones. The applications are ready to use, most of them free, and require no expert technical knowledge. Moreover, these have been proved to be very effective when tested with two commercial forensic tools.
CITED BY (3)  
1 Kariuki, P. (2015). Generic process model for android smartphones live memory forensics (doctoral dissertation).
2 Neralla, S., Bhaskari, D. L., & Avadhani, P. S. (2013). Combating against anti-forensics aligned with e-mail forensics. International Journal of Computer Applications, 79(15).
3 Munpilju. (2013). Utilization of forensic tools - Antigua for Android smartphones. Korea Electronics and Telecommunications Institute of Science, 8 (6), 855-861.
1 Google Scholar
2 CiteSeerX
3 refSeek
4 Scribd
5 slideshare
6 PdfSR
1 .] Canalys Press Release. [Online] http://www.canalys.com/newsroom/smart-phones-overtakeclient-pcs-2011(Accessed 30 August 2012)
2 .] Gartner press release (2011) - Gartner Says Sales of Mobile Devices Grew 5.6 Percent in Third Quarter of 2011; Smartphone Sales Increased 42 Percent [Online]http://www.gartner.com/it/page.jsp?id=1848514 (Accessed 17 September 2012)
3 .] Carrier, B. (2002), ‘Defining digital forensic examination and analysis tools’, International Journal of Digital Evidence, Vol 1, pp 1-10.
4 .] Garfinkel, S. L. (2010), ‘Digital forensic research: The next 10 years’, in Proceedings of the Tenth Annual DFRWS Conference, pp S64–S73
5 .] Forensic Focus - Challenges of Smart Phone Forensics [Online]http://www.forensicfocus.com/challenges-of-smart-phone-forensics (Accessed 30 August 2012)
6 .] Ahmed, R. and Dharaskar R. V. (2009), ‘Mobile Forensics: the roadblocks ahead, proposed solution using Protocol Filtering and SIM programming’, International Journal of Computer Science and Applications, Vol. 2(2) pp. 109-116
7 .] Casey, E. And Turnbull, B. (2011) ‘Digital evidence on mobile devices’, in Casey, E. (Eds.)Digital Evidence and Computer Crime, Academic Press
8 .] Harris, R. (2006), ‘Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem’, The International Journal of Digital Forensics & Incident Response, Vol 3, pp 44-49
9 .] Distefano, A., Me, G., & Pace, F. (2010, August). Android anti-forensics through a local paradigm. Digital Investigation, 7(Suppl.), pp 83-94
10 Azadegan, S., Yu, W., Liu, H., Sistani, M., Acharya, S. (2012), ‘Novel Anti-forensics Approaches for Smart Phones’, in Proceedings of 45th Hawaii International Conference on System Science (HICSS), pp 5424 – 5431
11 Liu, H., Azadegan, S., Yu, W., Acharya, S. and Sistani, A., (2012), ‘Are We Relying Too Much on Forensics Tools?’, in Lee, R. (Eds.) Software Engineering Research,Management and Applications 2011, pp 145-156
12 .] Paraben (2012) - Paraben’s Device Seizure 5.0 Release Notes [Online]http://www.paraben.com/downloads/ds50.pdf (Accessed 17 September 2012)
13 .] Oxygen (2012) - Oxygen Forensic Suite [Online] http://www.oxygen-forensic.com/en/(Accessed 17 September 2012)
14 .] File Shredder (2012) -https://play.google.com/store/apps/details?id=net.fizzl.fileshredder&hl=en (Accessed 28 September 2012)
15 .] ProtectStar iShreder Pro (2012) - http://itunes.apple.com/us/app/protectstar-ishredder-pro/id441224022?mt=8 (Accessed 28 September 2012)
16 .] NISP - ‘DoD 5220.22-M National Industrial Security Program Operating Manual’ [Online]http://transition.usaid.gov/policy/ads/500/d522022m.pdf (Accessed 14 September 2012)
17 .] LUKS Manager (2012) - https://play.google.com/store/apps/details? id=com.nemesis2.luksmanager (Accessed 28 September 2012)
18 .] StegDroid (2012) - https://play.google.com/store/apps/details?id=uk.ac.cam.tfmw2.stegdroid &hl=en (Accessed 28 September 2012)
19 .] MobiStego (2012) - https://play.google.com/store/apps/details?id=it.mobistego&hl=en(Access 28 September 2012).
Mr. Ioana Sporea
- United Kingdom
Dr. Benjamin Aziz
University of Portsmouth - United Kingdom
benjamin.aziz@port.ac.uk
Mr. Zac McIntyre
- United Kingdom