Ever improving technology allows smartphones to become an integral part of people's lives. The reliance on and ubiquitous use of smartphones render these devices rich sources of data. This data becomes increasingly important when smartphones are linked to criminal or corporate investigations. To erase data and mislead digital forensic investigations, end-users can manipulate the data and change recorded events. This paper investigates the effects of manipulating smartphone data on both the Google Android and Apple iOS platforms. The deployed steps leads to the formulation of a generic process for smartphone data manipulation. To assist digital forensic professionals with the detection of such manipulated smartphone data, this paper introduces an evaluation framework for smartphone data. The framework uses key traces left behind as a result of the manipulation of smartphone data to construct techniques to detect the changed data. The outcome of this research study successfully demonstrates the manipulation of smartphone data and presents preliminary evidence that the suggested framework can assist with the detection of manipulated smartphone data.
Reference:
Pieterse, H., Olivier, M. and Van Heerden, R.P. 2018. Detecting manipulated smartphone data on Android and iOS Devices. 17th International Information Security South Africa Conference (ISSA 2018), University of Pretoria, Pretoria, 15-16 August 2018, also published in Proceedings: Springer CCIS (Communications in Computer and Information Science, vol. 973), pp. 89-103
Pieterse, H., Olivier, M., & Van Heerden, R. P. (2018). Detecting manipulated smartphone data on Android and iOS Devices. Springer. http://hdl.handle.net/10204/10823
Pieterse, Heloise, M Olivier, and Renier P Van Heerden. "Detecting manipulated smartphone data on Android and iOS Devices." (2018): http://hdl.handle.net/10204/10823
Pieterse H, Olivier M, Van Heerden RP, Detecting manipulated smartphone data on Android and iOS Devices; Springer; 2018. http://hdl.handle.net/10204/10823 .
Copyright: 2018 Springer. Due to copyright restrictions, the attached PDF file contains the accepted version of the published item. For access to the published version, please consult the publisher's website.