dc.contributor.author |
Pieterse, Heloise
|
|
dc.contributor.author |
Olivier, M
|
|
dc.contributor.author |
Van Heerden, Renier P
|
|
dc.date.accessioned |
2019-03-22T11:43:13Z |
|
dc.date.available |
2019-03-22T11:43:13Z |
|
dc.date.issued |
2018-08 |
|
dc.identifier.citation |
Pieterse, H., Olivier, M. and Van Heerden, R.P. 2018. Detecting manipulated smartphone data on Android and iOS Devices. 17th International Information Security South Africa Conference (ISSA 2018), University of Pretoria, Pretoria, 15-16 August 2018, also published in Proceedings: Springer CCIS (Communications in Computer and Information Science, vol. 973), pp. 89-103 |
en_US |
dc.identifier.isbn |
978-3-030-11406-0 |
|
dc.identifier.isbn |
978-3-030-11407-7 |
|
dc.identifier.uri |
https://link.springer.com/chapter/10.1007/978-3-030-11407-7_7
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/10823
|
|
dc.description |
Copyright: 2018 Springer. Due to copyright restrictions, the attached PDF file contains the accepted version of the published item. For access to the published version, please consult the publisher's website. |
en_US |
dc.description.abstract |
Ever improving technology allows smartphones to become an integral part of people's lives. The reliance on and ubiquitous use of smartphones render these devices rich sources of data. This data becomes increasingly important when smartphones are linked to criminal or corporate investigations. To erase data and mislead digital forensic investigations, end-users can manipulate the data and change recorded events. This paper investigates the effects of manipulating smartphone data on both the Google Android and Apple iOS platforms. The deployed steps leads to the formulation of a generic process for smartphone data manipulation. To assist digital forensic professionals with the detection of such manipulated smartphone data, this paper introduces an evaluation framework for smartphone data. The framework uses key traces left behind as a result of the manipulation of smartphone data to construct techniques to detect the changed data. The outcome of this research study successfully demonstrates the manipulation of smartphone data and presents preliminary evidence that the suggested framework can assist with the detection of manipulated smartphone data. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
Springer |
en_US |
dc.relation.ispartofseries |
Worklist;21741 |
|
dc.subject |
Digital forensics |
en_US |
dc.subject |
Mobile forensics |
en_US |
dc.subject |
Manipulation |
en_US |
dc.subject |
Smartphone data |
en_US |
dc.subject |
Smartphones |
en_US |
dc.subject |
Android |
en_US |
dc.subject |
iOS |
en_US |
dc.title |
Detecting manipulated smartphone data on Android and iOS Devices |
en_US |
dc.type |
Conference Presentation |
en_US |
dc.identifier.apacitation |
Pieterse, H., Olivier, M., & Van Heerden, R. P. (2018). Detecting manipulated smartphone data on Android and iOS Devices. Springer. http://hdl.handle.net/10204/10823 |
en_ZA |
dc.identifier.chicagocitation |
Pieterse, Heloise, M Olivier, and Renier P Van Heerden. "Detecting manipulated smartphone data on Android and iOS Devices." (2018): http://hdl.handle.net/10204/10823 |
en_ZA |
dc.identifier.vancouvercitation |
Pieterse H, Olivier M, Van Heerden RP, Detecting manipulated smartphone data on Android and iOS Devices; Springer; 2018. http://hdl.handle.net/10204/10823 . |
en_ZA |
dc.identifier.ris |
TY - Conference Presentation
AU - Pieterse, Heloise
AU - Olivier, M
AU - Van Heerden, Renier P
AB - Ever improving technology allows smartphones to become an integral part of people's lives. The reliance on and ubiquitous use of smartphones render these devices rich sources of data. This data becomes increasingly important when smartphones are linked to criminal or corporate investigations. To erase data and mislead digital forensic investigations, end-users can manipulate the data and change recorded events. This paper investigates the effects of manipulating smartphone data on both the Google Android and Apple iOS platforms. The deployed steps leads to the formulation of a generic process for smartphone data manipulation. To assist digital forensic professionals with the detection of such manipulated smartphone data, this paper introduces an evaluation framework for smartphone data. The framework uses key traces left behind as a result of the manipulation of smartphone data to construct techniques to detect the changed data. The outcome of this research study successfully demonstrates the manipulation of smartphone data and presents preliminary evidence that the suggested framework can assist with the detection of manipulated smartphone data.
DA - 2018-08
DB - ResearchSpace
DP - CSIR
KW - Digital forensics
KW - Mobile forensics
KW - Manipulation
KW - Smartphone data
KW - Smartphones
KW - Android
KW - iOS
LK - https://researchspace.csir.co.za
PY - 2018
SM - 978-3-030-11406-0
SM - 978-3-030-11407-7
T1 - Detecting manipulated smartphone data on Android and iOS Devices
TI - Detecting manipulated smartphone data on Android and iOS Devices
UR - http://hdl.handle.net/10204/10823
ER -
|
en_ZA |