首页    期刊浏览 2024年07月06日 星期六
登录注册

文章基本信息

  • 标题:Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial Tool
  • 本地全文:下载
  • 作者:Muhammad Faheem ; N.-A. Le-Khac ; Tahar Kechadi
  • 期刊名称:Journal of Information Security
  • 印刷版ISSN:2153-1234
  • 电子版ISSN:2153-1242
  • 出版年度:2014
  • 卷号:05
  • 期号:03
  • 页码:83-90
  • DOI:10.4236/jis.2014.53009
  • 语种:English
  • 出版社:Scientific Research Publishing
  • 摘要:Smartphone is a very useful and compact device that fits in person’s pocket, but at the same time it can be used as a tool for criminal activities. In this day and age, people increasingly rely on smart phones rather than desktop computers or laptops to exchange messages, share videos and audio messages. A smartphone is almost equivalent in its application to a PC, hence there are security risks associated with its use such as carrying out a digital crime or becoming a victim of one. Criminals can use smartphones for a number of activities. Namely, committing a fraud over e-mail, harassment via text messages, drug trafficking, child pornography, communications related to narcotics, etc. It is a great challenge for forensic experts to extract data from a smartphone for forensic purposes that can be used as evidence in the court of law. In this case study, I show how to obtain the root access of Samsung S3 phone, how to create DD image and then how to examine DD image via commercial tool like UFED physical analyzer trial version which doesn’t support Android devices? I will extract the messages for Viber on trial version of UFED Physical analyzer.
  • 关键词:Viber; Root; Android Forensic
国家哲学社会科学文献中心版权所有