메뉴 건너뛰기




Volumn 29, Issue 14, 2017, Pages

Forensic data acquisition from cloud-of-things devices: windows Smartphones as a case study

Author keywords

cloud of things forensics; data acquisition; digital evidence; mobile forensic tool; windows device forensics

Indexed keywords

COPYRIGHTS; DATA ACQUISITION; METALS; SECURITY OF DATA; TELEPHONE SETS;

EID: 85020892568     PISSN: 15320626     EISSN: 15320634     Source Type: Journal    
DOI: 10.1002/cpe.3855     Document Type: Conference Paper
Times cited : (44)

References (41)
  • 1
    • 84905817532 scopus 로고    scopus 로고
    • Interconnected cloud computing environments: challenges, taxonomy, and survey
    • Toosi AN, Calheiros RN, Buyya R. Interconnected cloud computing environments: challenges, taxonomy, and survey. ACM Computing Surveys 2014; 47(1):7:1–7:47.
    • (2014) ACM Computing Surveys , vol.47 , Issue.1 , pp. 7:1-7:47
    • Toosi, A.N.1    Calheiros, R.N.2    Buyya, R.3
  • 4
    • 85020938375 scopus 로고    scopus 로고
    • [16 July 2015]
    • Windows Phone Architecture Overview. https://sysdev.microsoft.com/en-us/Hardware/oem/docs/Getting_Started/Windows_Phone_architecture_overview [16 July 2015].
    • Windows Phone Architecture Overview
  • 5
    • 85020913313 scopus 로고    scopus 로고
    • Slide presented at MobCom Workshop. MobCom Workshop;, Feb 6; Ledeberg, Belgium., [9 August 2014]
    • Hernie D. Windows Phone 8 security deep dive. Slide presented at: MobCom Workshop. MobCom Workshop; 2013 Feb 6; Ledeberg, Belgium. https://www.msec.be/mobcom/ws2013/presentations/david_hernie.pdf [9 August 2014].
    • (2013) Windows Phone 8 security deep dive
    • Hernie, D.1
  • 7
    • 85020938362 scopus 로고    scopus 로고
    • [16 July 2015]
    • User Data Folder Layout. https://sysdev.microsoft.com/en-us/Hardware/oem/docs/Phone_Bring-Up/User_data_folder_layout [16 July 2015].
    • User Data Folder Layout
  • 8
    • 85020911371 scopus 로고    scopus 로고
    • [31 March 2014]
    • Windows Phone 8 Security Guide. http://www.microsoft.com/en-us/download/details.aspx?id=36173 [31 March 2014].
    • Windows Phone 8 Security Guide
  • 9
    • 77955342184 scopus 로고    scopus 로고
    • Live memory forensics of mobile phones
    • Thing VL, Ng K-Y, Chang E-C. Live memory forensics of mobile phones. Digital Investigation 2010; 7:S74–S82. doi:10.1016/j.diin.2010.05.010.
    • (2010) Digital Investigation , vol.7 , pp. S74-S82
    • Thing, V.L.1    Ng, K.-Y.2    Chang, E.-C.3
  • 11
    • 85020880262 scopus 로고    scopus 로고
    • [16 July 2015]
    • Folder Layout. https://sysdev.microsoft.com/en-us/Hardware/oem/docs/Phone_Bring-Up/Folder_layout [16 July 2015].
    • Folder Layout
  • 12
    • 85020855136 scopus 로고    scopus 로고
    • [16 July 2015]
    • Main OS Folder Layout. https://sysdev.microsoft.com/en-us/Hardware/oem/docs/Phone_Bring-Up/Main_OS_folder_layout [16 July 2015].
    • Main OS Folder Layout
  • 13
    • 85020892821 scopus 로고    scopus 로고
    • [16 July 2015]
    • Removable User Data Folder Layout. https://sysdev.microsoft.com/en-us/Hardware/oem/docs/Phone_Bring-Up/Removable_user_data_folder_layout [16 July 2015].
    • Removable User Data Folder Layout
  • 14
    • 85020896592 scopus 로고    scopus 로고
    • [16 July 2015]
    • Boot and UEFI. https://sysdev.microsoft.com/en-us/Hardware/oem/docs/Phone_Bring-Up/Boot_and_UEFI [16 July 2015].
    • Boot and UEFI
  • 15
    • 85020879949 scopus 로고    scopus 로고
    • [16 July 2015]
    • Secure Boot and Device Encryption Overview. https://sysdev.microsoft.com/en-us/Hardware/oem/docs/Phone_Bring-Up/Secure_boot_and_device_encryption_overview [16 July 2015].
    • Secure Boot and Device Encryption Overview
  • 16
    • 85020911182 scopus 로고    scopus 로고
    • [9 August 2014]
    • Windows Phone 8.1 Security Overview. http://www.microsoft.com/en-us/download/details.aspx?id=42509 [9 August 2014].
    • Windows Phone 8.1 Security Overview
  • 20
    • 77952241813 scopus 로고    scopus 로고
    • Windows mobile advanced forensics
    • Klaver C. Windows mobile advanced forensics. Digital Investigation 2010; 6(3):147–167. doi:10.1016/j.diin.2010.02.001.
    • (2010) Digital Investigation , vol.6 , Issue.3 , pp. 147-167
    • Klaver, C.1
  • 21
    • 33644922345 scopus 로고    scopus 로고
    • Forensic imaging of embedded systems using JTAG (boundary-scan)
    • Breeuwsma I. Forensic imaging of embedded systems using JTAG (boundary-scan). Digital Investigation 2006; 3(1):32–42. doi:10.1016/j.diin.2006.01.003.
    • (2006) Digital Investigation , vol.3 , Issue.1 , pp. 32-42
    • Breeuwsma, I.1
  • 23
    • 78449255925 scopus 로고    scopus 로고
    • Windows mobile advanced forensics: an alternative to existing tools
    • Rehault F. Windows mobile advanced forensics: an alternative to existing tools. Digital Investigation 2010; 7(1):38–47. doi:10.1016/j.diin.2010.08.003.
    • (2010) Digital Investigation , vol.7 , Issue.1 , pp. 38-47
    • Rehault, F.1
  • 24
    • 77952104315 scopus 로고    scopus 로고
    • Introduction to windows mobile forensics
    • Casey E, Bann M, Doyle J. Introduction to windows mobile forensics. Digital Investigation 2010; 6(3):136–146. doi:10.1016/j.diin.2010.01.004.
    • (2010) Digital Investigation , vol.6 , Issue.3 , pp. 136-146
    • Casey, E.1    Bann, M.2    Doyle, J.3
  • 25
    • 80051672577 scopus 로고    scopus 로고
    • A comparison of forensic evidence recovery techniques for a windows mobile smart phone
    • Grispos G, Storer T, Glisson WB. A comparison of forensic evidence recovery techniques for a windows mobile smart phone. Digital Investigation 2011; 8(1):23–36. doi:10.1016/j.diin.2011.05.016.
    • (2011) Digital Investigation , vol.8 , Issue.1 , pp. 23-36
    • Grispos, G.1    Storer, T.2    Glisson, W.B.3
  • 26
  • 27
    • 85020899352 scopus 로고    scopus 로고
    • Windows phone 7/8 (WP7)—digital forensic investigation procedure and evidence recovery techniques
    • October
    • Ehud DR. Windows phone 7/8 (WP7)—digital forensic investigation procedure and evidence recovery techniques. eForensics Magazine, October 2013; 2(23):36–40.
    • (2013) eForensics Magazine , vol.2 , Issue.23 , pp. 36-40
    • Ehud, D.R.1
  • 29
    • 84873948875 scopus 로고    scopus 로고
    • Windows phone 7 from a digital forensics' perspective
    • In, New York, Springer
    • Schaefer T, Höfken H, Schuba M. Windows phone 7 from a digital forensics' perspective. In Digital Forensics and Cyber Crime. New York: Springer, 2012; 62–76.
    • (2012) Digital Forensics and Cyber Crime , pp. 62-76
    • Schaefer, T.1    Höfken, H.2    Schuba, M.3
  • 32
    • 84963541600 scopus 로고    scopus 로고
    • Chapter 14—Conceptual evidence collection and analysis methodology for Android devices
    • In, Waltham, MA, Syngress
    • Martini B, Do Q, Choo K-KR. Chapter 14—Conceptual evidence collection and analysis methodology for Android devices. In Cloud Security Ecosystem. Waltham, MA: Syngress, 2015; 285–307.
    • (2015) Cloud Security Ecosystem , pp. 285-307
    • Martini, B.1    Do, Q.2    Choo, K.-K.R.3
  • 33
    • 84934762632 scopus 로고    scopus 로고
    • NIST Special Publication, 800-101., [18 August 2015]
    • Guidelines on Mobile Device Forensics. NIST Special Publication 2014:800-101. nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-101r1.pdf [18 August 2015].
    • (2014) Guidelines on Mobile Device Forensics
  • 35
    • 84970003207 scopus 로고    scopus 로고
    • Trustworthy processing of healthcare Big data in hybrid clouds
    • Nepal S, Ranjan R, Choo K-KR. Trustworthy processing of healthcare Big data in hybrid clouds. IEEE Cloud Computing 2015; 2(2):78–84. doi:10.1109/MCC.2015.36.
    • (2015) IEEE Cloud Computing , vol.2 , Issue.2 , pp. 78-84
    • Nepal, S.1    Ranjan, R.2    Choo, K.-K.R.3
  • 36
    • 77957695303 scopus 로고    scopus 로고
    • Organised crime groups in cyberspace: a typology
    • Choo K-KR. Organised crime groups in cyberspace: a typology. Trends in Organized Crime 2008; 11(3):270–295. doi:10.1007/s12117-008-9038-9.
    • (2008) Trends in Organized Crime , vol.11 , Issue.3 , pp. 270-295
    • Choo, K.-K.R.1
  • 37
    • 80955142795 scopus 로고    scopus 로고
    • The cyber threat landscape: challenges and future research directions
    • Choo K-KR. The cyber threat landscape: challenges and future research directions. Computers & Security 2011; 30(8):719–731. doi:10.1016/j.cose.2011.08.004.
    • (2011) Computers & Security , vol.30 , Issue.8 , pp. 719-731
    • Choo, K.-K.R.1
  • 38
    • 84947587045 scopus 로고    scopus 로고
    • A forensically sound adversary model for mobile devices
    • Do Q, Martini B, Choo K-KR. A forensically sound adversary model for mobile devices. PLoS ONE 2015; 10(9):e0138449. doi:10.1371/journal.pone.0138449.
    • (2015) PLoS ONE , vol.10 , Issue.9
    • Do, Q.1    Martini, B.2    Choo, K.-K.R.3
  • 39
    • 84978640065 scopus 로고    scopus 로고
    • Windows instant messaging app forensics: Facebook and Skype as case studies
    • Yang TY, Dehghantanha A, Choo K-K R, Muda Z. Windows instant messaging app forensics: Facebook and Skype as case studies. PLoS ONE 2016; 11(3):e0150300. doi:10.1371/journal.pone.0150300.
    • (2016) PLoS ONE , vol.11 , Issue.3
    • Yang, T.Y.1    Dehghantanha, A.2    Choo, R.3    Muda, Z.4
  • 40
    • 84958034911 scopus 로고    scopus 로고
    • Android mobile VoIP apps: a survey and examination of their security and privacy
    • Azfar A, Choo K-K R, Liu L. Android mobile VoIP apps: a survey and examination of their security and privacy. Electronic Commerce Research 2016; 16(1):73–111. doi:10.1007/s10660-015-9208-1.
    • (2016) Electronic Commerce Research , vol.16 , Issue.1 , pp. 73-111
    • Azfar, A.1    Choo, R.2    Liu, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.