메뉴 건너뛰기




Volumn 38, Issue , 2013, Pages 51-75

Smartphone sensor data as digital evidence

Author keywords

Android; Digital forensics; Information gathering; Investigation models; Sensor; Sensor data; Smartphones

Indexed keywords

DATA ACQUISITION; DIGITAL FORENSICS; ELECTRONIC CRIME COUNTERMEASURES; SENSORS; SIGNAL ENCODING; SMARTPHONES;

EID: 84885189845     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2013.03.007     Document Type: Article
Times cited : (52)

References (101)
  • 1
    • 84885172209 scopus 로고    scopus 로고
    • Got an iPhone or 3G iPad?
    • accessed November
    • Allan A, Warden P. Got an iPhone or 3G iPad? Apple is recording your moves. http://radar.oreilly.com/2011/04/apple-locationtracking.html [accessed November 2012].
    • (2012) Apple Is Recording Your Moves
    • Allan, A.1    Warden, P.2
  • 3
    • 85030497980 scopus 로고    scopus 로고
    • Das IT-Grundrecht: Funktion, Schutzgehalt, Auswirkungeb auf staatliche Ermittlungen
    • In: Uerpmann-Wittzack, editor. Berlin
    • Bäcker M. Das IT-Grundrecht: Funktion, Schutzgehalt, Auswirkungeb auf staatliche Ermittlungen. In: Uerpmann-Wittzack, editor. Das neue Computergrundrecht, Recht der Informationsgesellschaft 2009;Bd 15. p. 53-60. Berlin.
    • (2009) Das Neue Computergrundrecht, Recht der Informationsgesellschaft , vol.15 , pp. 53-60
    • Bäcker, M.1
  • 4
    • 79961063454 scopus 로고    scopus 로고
    • IPhone 3GS forensics: Logical analysis using apple iTunes backup utility
    • Bader M, Baggili I. iPhone 3GS forensics: logical analysis using apple iTunes backup utility. Small Scale Digital Device Forensics Journal 2010;4(1).
    • (2010) Small Scale Digital Device Forensics Journal , vol.4 , Issue.1
    • Bader, M.1    Baggili, I.2
  • 5
    • 35048842427 scopus 로고    scopus 로고
    • Activity recognition from user-annotated acceleration data
    • In: Ferscha A, Mattern F, editors. Springer; LNCS-3001
    • Bao L, Intille S. Activity recognition from user-annotated acceleration data. In: Ferscha A, Mattern F, editors. Pervasive computing. Springer; 2004. p. 1-17. LNCS-3001.
    • (2004) Pervasive Computing , pp. 1-17
    • Bao, L.1    Intille, S.2
  • 6
    • 19844379355 scopus 로고    scopus 로고
    • A hierarchical, objectives-based framework for the digital investigations process
    • Beebe N, Clark J. A hierarchical, objectives-based framework for the digital investigations process. Digital Investigation 2005;2(2):147-67.
    • (2005) Digital Investigation , vol.2 , Issue.2 , pp. 147-167
    • Beebe, N.1    Clark, J.2
  • 7
    • 84862208081 scopus 로고    scopus 로고
    • The challenges facing computer forensics investigators in obtaining information from mobile devices for use in criminal investigations
    • Bennett D. The challenges facing computer forensics investigators in obtaining information from mobile devices for use in criminal investigations. Information Security Journal: A Global Perspective 2012;21(3):159-68.
    • (2012) Information Security Journal: A Global Perspective , vol.21 , Issue.3 , pp. 159-168
    • Bennett, D.1
  • 13
    • 77952104315 scopus 로고    scopus 로고
    • Introduction to windows mobile forensics
    • Casey E, Bann M, Doyle J. Introduction to windows mobile forensics. Digital Investigation 2010;6(34):136-46.
    • (2010) Digital Investigation , vol.6 , Issue.34 , pp. 136-146
    • Casey, E.1    Bann, M.2    Doyle, J.3
  • 14
    • 78650219914 scopus 로고    scopus 로고
    • Online gesture recognition for user interface on accelerometer built-in mobile phones
    • In: Wong K, et al., editors. Springer; LNCS-6444
    • Choe B, Min J, Cho S. Online gesture recognition for user interface on accelerometer built-in mobile phones. In: Wong K, et al., editors. Neural information processing. Models and applications. Springer; 2010. p. 650-7. LNCS-6444.
    • (2010) Neural Information Processing. Models and Applications , pp. 650-657
    • Choe, B.1    Min, J.2    Cho, S.3
  • 18
    • 84885178134 scopus 로고    scopus 로고
    • Green paper on detection technologies in the work of law enforcement, customs and other security authorities
    • Commission of the European Communities
    • Commission of the European Communities. Green paper on detection technologies in the work of law enforcement, customs and other security authorities. Technical report COM(2006) 474 final 2006.
    • (2006) Technical Report COM(2006) 474 Final
  • 23
    • 48749091043 scopus 로고    scopus 로고
    • An overall assessment of mobile internal acquisition tool
    • Distefano A, Me G. An overall assessment of mobile internal acquisition tool. Digital Investigation 2008;5(Suppl.):121-7.
    • (2008) Digital Investigation , vol.5 , Issue.SUPPL. , pp. 121-127
    • Distefano, A.1    Me, G.2
  • 28
    • 84885174387 scopus 로고    scopus 로고
    • Google. [accessed November]
    • Google. Android security overview. http://source.android.com/tech/ security/index.html [accessed November 2012].
    • (2012) Android Security Overview
  • 30
    • 80051672577 scopus 로고    scopus 로고
    • A comparison of forensic evidence recovery techniques for a windows mobile smart phone
    • Grispos G, Storer T, Glisson WB. A comparison of forensic evidence recovery techniques for a windows mobile smart phone. Digital Investigation 2011;8(1):23-36.
    • (2011) Digital Investigation , vol.8 , Issue.1 , pp. 23-36
    • Grispos, G.1    Storer, T.2    Glisson, W.B.3
  • 32
    • 77954766268 scopus 로고    scopus 로고
    • Freiheit und Sicherheit im Angesicht terroristischer Anschläge
    • Hoffmann-Riem W. Freiheit und Sicherheit im Angesicht terroristischer Anschläge. Zeitschrift für Rechtspolitik 2002;35:497.
    • (2002) Zeitschrift für Rechtspolitik , vol.35 , pp. 497
    • Hoffmann-Riem, W.1
  • 33
    • 84885172816 scopus 로고    scopus 로고
    • Android forensic techniques
    • In: Boston: Syngress
    • Hoog A. Android forensic techniques. In: Android forensics. Boston: Syngress; 2011. p. 195-284.
    • (2011) Android Forensics , pp. 195-284
    • Hoog, A.1
  • 35
    • 84885890014 scopus 로고    scopus 로고
    • IForensics: Forensic analysis of instant messaging on smart phones
    • In: Goel S, et al., editors. Springer; LNICST-31
    • Husain MI, Sridhar R. iForensics: forensic analysis of instant messaging on smart phones. In: Goel S, et al., editors. Digital forensics and cyber crime. Springer; 2010. p. 9-18. LNICST-31.
    • (2010) Digital Forensics and Cyber Crime , pp. 9-18
    • Husain, M.I.1    Sridhar, R.2
  • 36
    • 33746255206 scopus 로고    scopus 로고
    • Digital forensics investigation framework that incorporate legal issues
    • Ieong R, Forza A. Digital forensics investigation framework that incorporate legal issues. Digital Investigation 2006;3(Suppl.):29-36.
    • (2006) Digital Investigation , vol.3 , Issue.SUPPL. , pp. 29-36
    • Ieong, R.1    Forza, A.2
  • 39
    • 79960138845 scopus 로고    scopus 로고
    • Sensitive privacy data acquisition in the iPhone for digital forensic analysis
    • In: Park J, et al., editors. Springer; CCIS-186
    • Jung J, Jeong C, Byun K, Lee S. Sensitive privacy data acquisition in the iPhone for digital forensic analysis. In: Park J, et al., editors. Secure and trust computing, data management and applications. Springer; 2011. p. 172-86. CCIS-186.
    • (2011) Secure and Trust Computing, Data Management and Applications , pp. 172-186
    • Jung, J.1    Jeong, C.2    Byun, K.3    Lee, S.4
  • 44
    • 30644459230 scopus 로고    scopus 로고
    • Searches and seizures in a digital world
    • Kerr OS. Searches and seizures in a digital world. Harvard Law Review 2005;119:531-86.
    • (2005) Harvard Law Review , vol.119 , pp. 531-586
    • Kerr, O.S.1
  • 45
    • 77956366233 scopus 로고    scopus 로고
    • A triaxial accelerometer-based physical-activity recognition via augmented-signal features and a hierarchical recognizer
    • Khan A, Lee YK, Lee S, Kim TS. A triaxial accelerometer-based physical-activity recognition via augmented-signal features and a hierarchical recognizer. IEEE Transactions on Information Technology in Biomedicine 2010;14(5):1166-72.
    • (2010) IEEE Transactions on Information Technology in Biomedicine , vol.14 , Issue.5 , pp. 1166-1172
    • Khan, A.1    Lee, Y.K.2    Lee, S.3    Kim, T.S.4
  • 46
    • 77952241813 scopus 로고    scopus 로고
    • Windows mobile advanced forensics
    • Klaver C. Windows mobile advanced forensics. Digital Investigation 2010;6(34):147-67.
    • (2010) Digital Investigation , vol.6 , Issue.34 , pp. 147-167
    • Klaver, C.1
  • 49
  • 50
    • 23444459747 scopus 로고    scopus 로고
    • Secure electronic voting: The current landscape
    • In: Gritzalis D, editor. Springer: Advances in Information Security
    • Lambrinoudakis C, Gritzalis D, Tsoumas V, Karyda M, Ikonomopoulos S. Secure electronic voting: the current landscape. In: Gritzalis D, editor. Secure electronic voting. Springer: Advances in Information Security; 2003. p. 101-22.
    • (2003) Secure Electronic Voting , pp. 101-122
    • Lambrinoudakis, C.1    Gritzalis, D.2    Tsoumas, V.3    Karyda, M.4    Ikonomopoulos, S.5
  • 52
    • 84885178475 scopus 로고    scopus 로고
    • Android forensics: Simplifying cell phone examinations
    • Purdue University
    • Lessard J, Kessler G. Android forensics: simplifying cell phone examinations. Purdue University; 2010. Technical report.
    • (2010) Technical Report
    • Lessard, J.1    Kessler, G.2
  • 53
    • 33745906533 scopus 로고    scopus 로고
    • A practical approach to recognizing physical activities
    • In: Fishkin K, et al., editors. Springer; LNCS-3968
    • Lester J, Choudhury T, Borriello G. A practical approach to recognizing physical activities. In: Fishkin K, et al., editors. Pervasive computing. Springer; 2006. p. 1-16. LNCS-3968.
    • (2006) Pervasive Computing , pp. 1-16
    • Lester, J.1    Choudhury, T.2    Borriello, G.3
  • 54
    • 70449645004 scopus 로고    scopus 로고
    • Uwave: Accelerometer-based personalized gesture recognition and its applications
    • Liu J, Zhong L, Wickramasuriya J, Vasudevan V. Uwave: accelerometer-based personalized gesture recognition and its applications. Pervasiveand Mobile Computing 2009;5(6):657-75.
    • (2009) Pervasiveand Mobile Computing , vol.5 , Issue.6 , pp. 657-675
    • Liu, J.1    Zhong, L.2    Wickramasuriya, J.3    Vasudevan, V.4
  • 59
    • 48749093257 scopus 로고    scopus 로고
    • Acquisition of a Symbian smart phones content with an on-phone forensic tool
    • Mokhonoana P, Olivier M. Acquisition of a Symbian smart phones content with an on-phone forensic tool 2007. Technical report.
    • (2007) Technical Report
    • Mokhonoana, P.1    Olivier, M.2
  • 62
    • 72449162905 scopus 로고    scopus 로고
    • Electronic crime scene investigation: A guide for first responders
    • National Institute of Justice
    • Mukasey M, Sedgwick J, Hagy D. Electronic crime scene investigation: a guide for first responders. Technical report NCJ 219941. National Institute of Justice; 2008.
    • (2008) Technical Report NCJ 219941
    • Mukasey, M.1    Sedgwick, J.2    Hagy, D.3
  • 63
    • 84864628454 scopus 로고    scopus 로고
    • Forensic analysis of social networking applications on mobile devices
    • Mutawa N, Baggili I, Marrington A. Forensic analysis of social networking applications on mobile devices. Digital Investigation 2012;9(Suppl.):S24-33.
    • (2012) Digital Investigation , vol.9 , Issue.SUPPL.
    • Mutawa, N.1    Baggili, I.2    Marrington, A.3
  • 64
    • 84863964653 scopus 로고    scopus 로고
    • Master's thesis, Royal Holloway, University of London
    • Mylonas A. Smartphone spying tools. Master's thesis, Royal Holloway, University of London; 2008.
    • (2008) Smartphone Spying Tools
    • Mylonas, A.1
  • 67
    • 84882242289 scopus 로고    scopus 로고
    • On the feasibility of malware attacks in smartphone platforms
    • In: Obaidad M, et al., editors. CCIS: Springer
    • Mylonas A, Dritsas S, Tsoumas B, Gritzalis D. On the feasibility of malware attacks in smartphone platforms. In: Obaidad M, et al., editors. Security and cryptography. CCIS: Springer; 2012a. p. 217-32.
    • (2012) Security and Cryptography , pp. 217-232
    • Mylonas, A.1    Dritsas, S.2    Tsoumas, B.3    Gritzalis, D.4
  • 68
    • 84891843335 scopus 로고    scopus 로고
    • Delegate the smartphone user? Security awareness in smartphone platforms
    • Mylonas A, Kastania A, Gritzalis D. Delegate the smartphone user? Security awareness in smartphone platforms. Computers & Security 2013;34:47-66.
    • (2013) Computers & Security , vol.34 , pp. 47-66
    • Mylonas, A.1    Kastania, A.2    Gritzalis, D.3
  • 71
    • 84870255379 scopus 로고    scopus 로고
    • Forensic analysis techniques for fragmented flash memory pages in smartphones
    • Park J, Chung H, Lee S. Forensic analysis techniques for fragmented flash memory pages in smartphones. Digital Investigation 2012.
    • (2012) Digital Investigation
    • Park, J.1    Chung, H.2    Lee, S.3
  • 72
    • 77952103184 scopus 로고    scopus 로고
    • Full user data acquisition from Symbian smart phones
    • Pooters I. Full user data acquisition from Symbian smart phones. Digital Investigation 2010;6(34):125-35.
    • (2010) Digital Investigation , vol.6 , Issue.34 , pp. 125-135
    • Pooters, I.1
  • 73
    • 77954889333 scopus 로고    scopus 로고
    • Forensic investigation process model for windows mobile devices
    • Security Group - Tata Elxsi
    • Ramabhadran A. Forensic investigation process model for windows mobile devices. Technical report. Security Group - Tata Elxsi; 2009.
    • (2009) Technical Report
    • Ramabhadran, A.1
  • 75
    • 78449255925 scopus 로고    scopus 로고
    • Windows mobile advanced forensics: An alternative to existing tools
    • Rehault F. Windows mobile advanced forensics: an alternative to existing tools. Digital Investigation 2010;7(1-2):38-47.
    • (2010) Digital Investigation , vol.7 , Issue.1-2 , pp. 38-47
    • Rehault, F.1
  • 79
    • 85030496146 scopus 로고    scopus 로고
    • Ubiquitous smartphones, zero privacy
    • Rose C. Ubiquitous smartphones, zero privacy. Review of Business Information Systems 2012;16(4):187-92.
    • (2012) Review of Business Information Systems , vol.16 , Issue.4 , pp. 187-192
    • Rose, C.1
  • 80
    • 85030490194 scopus 로고    scopus 로고
    • The judicial response to mass police surveillance
    • Rushin S. The judicial response to mass police surveillance. Journal of Law, Technology & Policy 2011;2011(2):282-328.
    • (2011) Journal of Law, Technology & Policy , vol.2011 , Issue.2 , pp. 282-328
    • Rushin, S.1
  • 81
    • 84916607248 scopus 로고    scopus 로고
    • Fourth amendment search and the power of the hash
    • Salgado RP. Fourth amendment search and the power of the hash. Harvard Law Review 2005;119:38-46.
    • (2005) Harvard Law Review , vol.119 , pp. 38-46
    • Salgado, R.P.1
  • 83
    • 84857917909 scopus 로고    scopus 로고
    • Acquisition and analysis of volatile memory from Android devices
    • Sylve J, Case A, Marziale L, Richard G. Acquisition and analysis of volatile memory from Android devices. Digital Investigation 2012;8(34):175-84.
    • (2012) Digital Investigation , vol.8 , Issue.34 , pp. 175-184
    • Sylve, J.1    Case, A.2    Marziale, L.3    Richard, G.4
  • 88
    • 84868333843 scopus 로고    scopus 로고
    • Symbian smartphone forensics and security: Recovery of privacy-protected deleted data
    • In: Chim T, Yuen T, editors. Springer; LNCS-7618
    • Thing V, Tan D. Symbian smartphone forensics and security: recovery of privacy-protected deleted data. In: Chim T, Yuen T, editors. Information and communications security. Springer; 2012. p. 240-51. LNCS-7618.
    • (2012) Information and Communications Security , pp. 240-251
    • Thing, V.1    Tan, D.2
  • 89
    • 84885182761 scopus 로고    scopus 로고
    • The right in confidentiality and integrity of information technology systems according to the German Federal Constitutional Court: Old wine in new bottles?
    • In: Bottis M, editor. Athens
    • Togias S. The right in confidentiality and integrity of information technology systems according to the German Federal Constitutional Court: old wine in new bottles? In: Bottis M, editor. An information law for the 21st century 2010. p. 530-40. Athens.
    • (2010) An Information Law for the 21st Century , pp. 530-540
    • Togias, S.1
  • 90
    • 79961091178 scopus 로고    scopus 로고
    • Toward a general collection methodology for Android devices
    • Vidas T, Zhang C, Christin N. Toward a general collection methodology for Android devices. Digital Investigation 2011;8(Suppl. 1):S14-24.
    • (2011) Digital Investigation , vol.8 , Issue.SUPPL. 1
    • Vidas, T.1    Zhang, C.2    Christin, N.3
  • 92
    • 84867385708 scopus 로고    scopus 로고
    • Using computer forensics when investigating system attacks
    • Sun Client Solutions Security Expertise Center
    • Weise J, Powell B. Using computer forensics when investigating system attacks. Technical report 819-2262-10. Sun Client Solutions Security Expertise Center; 2005.
    • (2005) Technical Report 819-2262-10
    • Weise, J.1    Powell, B.2
  • 93
    • 84863943450 scopus 로고    scopus 로고
    • The new fundamental right to IT security - First evaluation and comparative view at the U.S
    • Wiebe A. The new fundamental right to IT security - first evaluation and comparative view at the U.S. Datenschutz und Datensicherheit 2008;32(11):713-6.
    • (2008) Datenschutz und Datensicherheit , vol.32 , Issue.11 , pp. 713-716
    • Wiebe, A.1
  • 94
    • 67849089096 scopus 로고    scopus 로고
    • Agents, Trojans and tags: The next generation of investigators
    • Wiebke A. Agents, Trojans and tags: the next generation of investigators. International Review of Law, Computers & Technology 2009;23(1-2):99-108.
    • (2009) International Review of Law, Computers & Technology , vol.23 , Issue.1-2 , pp. 99-108
    • Wiebke, A.1
  • 95
    • 33745186968 scopus 로고    scopus 로고
    • Good practice guide for computerbased electronic evidence
    • UK Association of Chief Police Officers
    • Wilkinson S, Haagman D. Good practice guide for computerbased electronic evidence. Technical report v. 4. UK Association of Chief Police Officers; 2007.
    • (2007) Technical Report V. 4
    • Wilkinson, S.1    Haagman, D.2
  • 97
    • 78049361506 scopus 로고    scopus 로고
    • A process model for forensic analysis of Symbian smart phones
    • In: Springer; CCIS-59
    • Yu X, Jiang LH, Shu H, Yin Q, Liu TM. A process model for forensic analysis of Symbian smart phones. In: Advances in software engineering. Springer; 2009. p. 86-93. CCIS-59.
    • (2009) Advances in Software Engineering , pp. 86-93
    • Yu, X.1    Jiang, L.H.2    Shu, H.3    Yin, Q.4    Liu, T.M.5
  • 98
    • 0001134191 scopus 로고
    • A framework for information systems architecture
    • Zachman J. A framework for information systems architecture. IBM Systems Journal 1987;26(3):276-92.
    • (1987) IBM Systems Journal , vol.26 , Issue.3 , pp. 276-292
    • Zachman, J.1
  • 99
    • 84886370864 scopus 로고    scopus 로고
    • IPhone forensics: Recovering evidence, personal data, and corporate assets
    • Zdziarski J. iPhone forensics: recovering evidence, personal data, and corporate assets. O'Reilly Media; 2008.
    • (2008) O'Reilly Media
    • Zdziarski, J.1
  • 101
    • 85037359376 scopus 로고    scopus 로고
    • Taming information-stealing smartphone applications (on Android)
    • In: McCune J, et al., editors. Springer; LNCS-6740
    • Zhou Y, Zhang X, Jiang X, Freeh V. Taming information-stealing smartphone applications (on Android). In: McCune J, et al., editors. Trust and trustworthy computing. Springer; 2011. p. 93-107. LNCS-6740.
    • (2011) Trust and Trustworthy Computing , pp. 93-107
    • Zhou, Y.1    Zhang, X.2    Jiang, X.3    Freeh, V.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.