首页    期刊浏览 2024年09月20日 星期五
登录注册

文章基本信息

  • 标题:An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examination
  • 其他标题:An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examination
  • 本地全文:下载
  • 作者:V. Balajichandrasekhar M. ; T. Srinivasa Rao ; G. Srinivas
  • 期刊名称:International Journal of Electrical and Computer Engineering
  • 电子版ISSN:2088-8708
  • 出版年度:2018
  • 卷号:8
  • 期号:4
  • 页码:2239-2246
  • DOI:10.11591/ijece.v8i4.pp2239-2246
  • 语种:English
  • 出版社:Institute of Advanced Engineering and Science (IAES)
  • 摘要:At the end of 2015, there were 4.7 billion noteworthy mobile subscribers globally, equivalent to 63% of the world’s population. Mobile phones had all the essential components or characteristics neatly fitted into a small space and designed to achieve high speeds, massive storage, and increased functionalities. Smart phones used to carry out imparting or exchanging of information such as calling, texting, Internet browsing, e-mail, photos, videos, and etc. Criminals can use smart phones for a number of activities. Namely, committing a fraud over e-mail, harassment via text messages, drug trafficking, child pornography, etc. In this research paper, We demonstrate, if a mobile phone is identified in a criminal activity and if it is locked by any one of the locking mechanisms such as pattern lock, PIN lock and password lock, then how to unlock the mobile device without data loss for forensic examination. It is a great challenge for forensic experts to extract data from a mobile phone for forensic purpose that can be used as evidence in the court of law. The experimental results show that our approach can break all kinds of pattern locks.
  • 其他摘要:At the end of 2015, there were 4.7 billion noteworthy mobile subscribers globally, equivalent to 63% of the world’s population. Mobile phones had all the essential components or characteristics neatly fitted into a small space and designed to achieve high speeds, massive storage, and increased functionalities. Smart phones used to carry out imparting or exchanging of information such as calling, texting, Internet browsing, e-mail, photos, videos, and etc. Criminals can use smart phones for a number of activities. Namely, committing a fraud over e-mail, harassment via text messages, drug trafficking, child pornography, etc. In this research paper, We demonstrate, if a mobile phone is identified in a criminal activity and if it is locked by any one of the locking mechanisms such as pattern lock, PIN lock and password lock, then how to unlock the mobile device without data loss for forensic examination. It is a great challenge for forensic experts to extract data from a mobile phone for forensic purpose that can be used as evidence in the court of law. The experimental results show that our approach can break all kinds of pattern locks.
  • 关键词:Computer Science and Engineering;Mobile Forensics;Mobile Phones; Mobile Forensics; Mobile Device Analysis; Analysis Tools; Smart Phone
国家哲学社会科学文献中心版权所有