scispace - formally typeset
Search or ask a question
Topic

Digital forensics

About: Digital forensics is a research topic. Over the lifetime, 4270 publications have been published within this topic receiving 49676 citations. The topic is also known as: digital forensic science & Digital forensics.


Papers
More filters
Proceedings ArticleDOI
01 Jan 2018
TL;DR: This paper explores the logical and physical acquisition techniques that are being used by forensic examiners and hence provides a comparative study of which technique provides a better approach in acquiring the digital evidence on mobile phones.
Abstract: The use of mobile phones has seen a remarkable increase since the past decade. However with an increase in use, mobile phones have now become a potential source for criminal activities. There is a need to examine these mobile devices in order to acquire evidence and gain meaningful insights from them. Mobile forensics is the branch of digital forensics which aims at investigating the digital evidence recovered from a cell phone that can provide a wealth of information in a forensically sound manner. The market is flooded with open source and proprietary mobile phone operating systems as a result of which the techniques and tools that are currently available fail to gain complete insight from the devices, and finding the appropriate tool is a challenge. This paper explores the logical and physical acquisition techniques that are being used by forensic examiners and hence provide a comparative study of which technique provides a better approach in acquiring the digital evidence on mobile phones. Additionally we perform an experimental study on Samsung Galaxy Grand Duos GT-I9082 android smartphone and try acquiring the evidence based on the best performing technique from the above comparison.

25 citations

Journal ArticleDOI
TL;DR: This special issue provides an overview of current research following this mission, with six high-quality contributions cover various approaches in the field, ranging from the visual recognition of faces and tattoos to the discovery of near duplicates and content tampering.
Abstract: With the proliferation of multimedia data, it has become necessary to secure this content from illegal use, efficiently detect and reconstruct illegal activities from it, and use it as a source of intelligence. Serious challenges arise from the sheer data volume, however. The multimedia research community has developed many exciting solutions for dealing with video footage, images, audio, and other multimedia content over recent years, including knowledge extraction, automatic categorization, and indexing. Although this work forms an excellent foundation for protecting and analyzing multimedia content, challenges remain in the complexity of the targeted material, the lack of structure and metadata, and other application-specific constraints. This special issue provides an overview of current research following this mission. The articles originally appeared at the ACM Multimedia 2010 Workshop on Multimedia in Forensics, Security, and Intelligence (MiFor). The six high-quality contributions cover various approaches in the field, ranging from the visual recognition of faces and tattoos to the discovery of near duplicates and content tampering.

25 citations

Posted Content
Abstract: Smartphones have become popular in recent days due to the accessibility of a wide range of applications. These sophisticated applications demand more computing resources in a resource constraint smartphone. Cloud computing is the motivating factor for the progress of these applications. The emerging mobile cloud computing introduces a new architecture to offload smartphone and utilize cloud computing technology to solve resource requirements. The popularity of mobile cloud computing is an opportunity for misuse and unlawful activities. Therefore, it is a challenging platform for digital forensic investigations due to the non-availability of methodologies, tools and techniques. The aim of this work is to analyze the forensic tools and methodologies for crime investigation in a mobile cloud platform as it poses challenges in proving the evidence. The advancement of forensic tools and methodologies are much slower than the current technology development in mobile cloud computing. Thus, forces the available tools, and techniques become increasingly obsolete. Therefore, it opens up the door for the new forensic tools and techniques to cope up with recent developments. Hence, this work presents a detailed survey of forensic methodology and corresponding issues in a mobile device, cloud environment, and mobile cloud applications. It mainly focuses on digital forensic issues related to mobile cloud applications and also analyze the scope, challenges and opportunities. Finally, this work reviewed the forensic procedures of two cloud storage services used for mobile cloud applications such as Dropbox and SkyDrive.

25 citations

Book ChapterDOI
31 Jan 2011
TL;DR: In this article, the authors examined the state of the science and the level of consensus in the digital forensics community regarding digital evidence examination and found that elements of science and consensus are lacking in some areas and are present in others.
Abstract: This paper examines the state of the science and the level of consensus in the digital forensics community regarding digital evidence examination. The results of this study indicate that elements of science and consensus are lacking in some areas and are present in others. However, the study is small and of limited scientific value. Much more work is required to evaluate the state of the science of digital evidence examination.

24 citations

Journal ArticleDOI
TL;DR: This work proposes a practical framework for digital forensics on flash drives, a unique way of generating, storing and analyzing data, retrieved from digital devices which pose as evidence in forensic analysis.
Abstract: With the rapid advancements in information and communication technology in the world, crimes committed are becoming technically intensive. When crimes committed use digital devices, forensic examiners have to adopt practical frameworks and methods to recover data for analysis which can pose as evidence. Data Generation, Data Warehousing and Data Mining, are the three essential features involved in the investigation process. This paper proposes a unique way of generating, storing and analyzing data, retrieved from digital devices which pose as evidence in forensic analysis. A statistical approach is used in validating the reliability of the pre-processed data. This work proposes a practical framework for digital forensics on flash drives.

24 citations


Network Information
Related Topics (5)
Authentication
74.7K papers, 867.1K citations
84% related
Encryption
98.3K papers, 1.4M citations
81% related
Cryptography
37.3K papers, 854.5K citations
81% related
Server
79.5K papers, 1.4M citations
77% related
Mobile computing
51.3K papers, 1M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20243
2023205
2022552
2021267
2020339
2019343