|
PFAAIAD2022: Practical Forensic Analysis of Artifacts on iOS and Android Devices - 2022 |
This book is intended for forensic examiners with little or basic experience in mobile forensics or open source solutions for mobile forensics. The book will also be useful to researchers who have previous experience in information security, researchers, and anyone seeking a deeper understanding of mobile internals. This book will provide you with the knowledge and core skills necessary they trying to recover accidentally deleted data (photos, contacts, SMS, and more).
You are invited to submit any intrastate chapter that is related below topics:
Chapter 1
|
Introduction to Mobile Forensic analysis
|
|
- The Important for Mobile Forensic analysis
- Understanding mobile forensics
- Challenges in mobile forensics
- Tools used for mobile forensics
- The mobile phone evidence extraction process
- Examination and analysis
- Rules of evidence
- Practical Mobile Forensic
- Summary
|
Chapter 2
|
Introduction to IOS Forensics
|
|
- IOS Boot Process
- IOS Architecture
- IOS Security
- Understanding the Jailbreaking
- Data Acquisition from iOS Devices
- Data Acquisition from iOS Backups
- iOS Data Analysis and Recovery
- Mobile Forensics Investigation Challenges on iOS
- iOS Forensic Tools
- Summary
|
Chapter 3
|
Introduction to Android Forensics
|
|
- Understanding Android
- Application framework
- Android runtime
- Linux Kernel
- Android Forensic Setup and Pre-Data Extraction Techniques
- Android Data Extraction Techniques
- Android Data Analysis and Recovery
- Android App rooting process and techniques
- Summary
|
Chapter 4
|
Forensic investigations of popular applications on Android and iOS platforms
|
|
- Introduction
- Case & Investigator Details
- Investigations of Facebook Messenger and WhatsApp applications
- Details of the device seized for examination
- Results and Analysis
- Summary
|
Chapter 5
|
Forensic Analysis of Telegram Messenger on iOS and Android Smartphones Case Study
|
|
- Introduction
- Literature Review
- Methodology and Experiment Setup
- Evidences Acquisition
- Evidences Processing and Analysis
- Results
- Summary
|
Chapter 6
|
Detecting Private Data Leaks over Mobile Applications using Mobile Forensic Techniques
|
|
- Introduction
- Legal Issues Regarding the Local Electronic Crimes Law & Mobile Forensics
- Details of the reporting agency and tools used in the examination
- Description of steps taken during examination
- Chain of custody documentation
- Details of findings or issues identified
- Evidence recovered during the examination, ranging from chat messages
- Images captured during the examination
- Examination and analysis information
- Summary
|
Chapter 7
|
Impact of iPhone Jailbreaking on User Data Integrity in Mobile Forensics
|
|
Introduction
Mobile Forensics
User Data Integrity in Mobile Forensics
Jailbreaking affecting on iOS
Data acquisition
Logical acquisition
Filesystem acquisition
Experiment Details and Tools
Results
Data Extraction
Extracted data before jailbreak
Extracted data after jailbreak
Summary
|
Chapter 8
|
The impact of cryptocurrency mining on Mobile devices
|
|
- Introduction
- cryptocurrency mining
- Measurement and work mechanism
- Tools, programs and applications that were used in cryptocurrency mining
- Experiment and analogy by iPhone 6s
- Experiment and analogy by LG g5
- Results and Analysis
- Summary
|
Chapter 9
|
Mobile Forensic Investigation for WhatsApp
|
|
- INTRODUCTION
- WhatsApp Architecture
- WhatsApp Experiment
- Tools used in the seizure process:
- Analysis Stage
- Examination on a backup taken by iTunes
- Examination on a backup taken from the connected device
- Forensic Tools comparison
- Summary
|
Chapter 10
|
Cloud Computing mobile app's Forensics: Dropbox case study
|
|
- Introduction
- Cloud Computing Forensics
- Cloud forensic challenges
- Dropbox cloud storage
- Implementation Details
- Seating Tools and Environment
- magnet axiom forensics program
- MobileEdit express forensics tool
- FinalMobile forensics tool
- Results and Analysis
- Programs and tools
- Experiments
- Summary
|
Chapter 11
|
Malware Forensics for Volatile and nonVolatile Memory in Mobile Devices
|
|
- Introduction
- Mobile Malware Forensic
- Smartphone Volatile Memory
- Mobile Devices Case Details
- Development and Experiment
- logical acquisition using Axiom process
- physical acquisition output in finalmobile forensics
- Investigating from the non-volatile memory
- Evaluate Forensic tools usage in this case
- Summary
|
Chapter 12
|
Mobile Forensic for KeyLogger artifact
|
|
- Introduction
- Mobile KeyLogger
- Methodology and case study setup
- Mobile Malware and Spyware
- Evidence recovered during the examination
- Evidence recovered using Magnet ACQUIRE
- Examination and analysis KeyLogger result
- Summary
|
Chapter 13
|
Digital Evidence Identification Methods for Mobile Devices with Facebook Messenger
|
|
- Introduction
- Mobile messenger apps
- Mobile operating system architecture
- Experiment Tools
- Evidence and scene security
- Evidence isolation
- Data Acquisition
- FBM Data analysis using Magnet AXIOM Examine
- FBM Data analysis using Belkasoft
- FBM Data analysis using DB Browser for SQLite
- Recover deleted evidence from SQLite Property Lists
- Reporting
- Summary
|
|
|