Analysis of a third-party application for mobile forensic investigation
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ryu, J.H. | - |
dc.contributor.author | Kim, N.Y. | - |
dc.contributor.author | Kwon, B.W. | - |
dc.contributor.author | Suk, S.K. | - |
dc.contributor.author | Park, J.H. | - |
dc.contributor.author | Park, J.H. | - |
dc.date.available | 2019-03-13T01:43:34Z | - |
dc.date.created | 2018-09-12 | - |
dc.date.issued | 2018-06 | - |
dc.identifier.issn | 1976-913X | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/31620 | - |
dc.description.abstract | Nowadays, third-party applications form an important part of the mobile environment, and social networking applications in particular can leave a variety of user footprints compared to other applications. Digital forensics of mobile third-party applications can provide important evidence to forensics investigators. However, most mobile operating systems are now updated on a frequent basis, and developers are constantly releasing new versions of them. For these reasons, forensic investigators experience difficulties in finding the locations and meanings of data during digital investigations. Therefore, this paper presents scenario-based methods of forensic analysis for a specific third-party social networking service application on a specific mobile device. When applied to certain third-party applications, digital forensics can provide forensic investigators with useful data for the investigation process. The main purpose of the forensic analysis proposed in the present paper is to determine whether the general use of third-party applications leaves data in the mobile internal storage of mobile devices and whether such data are meaningful for forensic purposes. © KIPS. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Korea Information Processing Society | - |
dc.relation.isPartOf | Journal of Information Processing Systems | - |
dc.title | Analysis of a third-party application for mobile forensic investigation | - |
dc.type | Article | - |
dc.identifier.doi | 10.3745/JIPS.03.0097 | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | Journal of Information Processing Systems, v.14, no.3, pp.680 - 693 | - |
dc.identifier.kciid | ART002363597 | - |
dc.description.journalClass | 1 | - |
dc.identifier.scopusid | 2-s2.0-85049390564 | - |
dc.citation.endPage | 693 | - |
dc.citation.number | 3 | - |
dc.citation.startPage | 680 | - |
dc.citation.title | Journal of Information Processing Systems | - |
dc.citation.volume | 14 | - |
dc.contributor.affiliatedAuthor | Park, J.H. | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | N | - |
dc.subject.keywordAuthor | Digital investigation | - |
dc.subject.keywordAuthor | Forensics | - |
dc.subject.keywordAuthor | Mobile | - |
dc.subject.keywordAuthor | Third-party applications | - |
dc.description.journalRegisteredClass | scopus | - |
dc.description.journalRegisteredClass | kci | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.