Mobile Phone Forensics

作者: Iosif I. Androulidakis

DOI: 10.1007/978-1-4614-1650-0_6

关键词:

摘要: More than often, in our days, cases go to trial and crimes are solved with the help of evidence taken from mobile phones their use. Typical examples such phone’s location (based on serving base station and/or GPS data), contacts correlation incoming outgoing calls), communication content messages emails send/received/stored), so on. In this chapter, we will analyze subject digital both theoretical technical side.

参考文章(17)
Keith E. Mayes, Konstantinos Markantonakis, Smart Cards, Tokens, Security and Applications Springer Publishing Company, Incorporated. ,(2010) , 10.1007/978-0-387-72198-9
Marcel Breeuwsma, Martien de Jongh, Mark Roeloffs, Ronald van der Knijff, Coert Klaver, Forensic Data Recovery from Flash Memory ,(2007)
Svein Willassen, Forensic Analysis of Mobile Phone Internal Memory international conference on digital forensics. pp. 191- 204 ,(2005) , 10.1007/0-387-31163-7_16
Colin M. Maunder, Rodham Tulloss, The Test Access Port and Boundary Scan Architecture ,(1990)
Vanessa Gratzer, David Naccache, Cryptography, Law Enforcement, and Mobile Communications ieee symposium on security and privacy. ,vol. 4, pp. 67- 70 ,(2006) , 10.1109/MSP.2006.148
Wayne A. Jansen, Aurelien Delaitre, Reference Material for Assessing Forensic SIM Tools international carnahan conference on security technology. pp. 227- 234 ,(2007) , 10.1109/CCST.2007.4373494
Antonio Savoldi, Paolo Gubian, Fabio Casadei, Forensics and SIM cards: an Overview International Journal of Digital Evidence. ,vol. 5, ,(2006)
Wayne Jansen, Aurelien Delaitre, Ludovic Moenner, Overcoming Impediments to Cell Phone Forensics hawaii international conference on system sciences. pp. 483- 483 ,(2008) , 10.1109/HICSS.2008.341