dc.contributor.author |
Pieterse, Heloise
|
|
dc.contributor.author |
Oliver, DM
|
|
dc.contributor.author |
Van Heerden, Renier P
|
|
dc.date.accessioned |
2019-12-12T09:12:57Z |
|
dc.date.available |
2019-12-12T09:12:57Z |
|
dc.date.issued |
2019-06 |
|
dc.identifier.citation |
Pieterse, H., Oliver, D.M., and Van Heerden, R.P. 2019. Evaluation framework for detecting manipulated smartphone data. SAIEE Africa Research Journal, v10(2), pp 67-76. |
en_US |
dc.identifier.issn |
0038-2221 |
|
dc.identifier.issn |
1991-1696 |
|
dc.identifier.uri |
https://ieeexplore.ieee.org/document/8732797
|
|
dc.identifier.uri |
DOI: 10.23919/SAIEE.2019.8732797
|
|
dc.identifier.uri |
http://hdl.handle.net/10204/11256
|
|
dc.description |
Copyright: 2019 SAIEE. Due to copyright restrictions, the attached PDF file only contains the preprint of the full text item. For access to the full text item, kindly consult the publisher's website. |
en_US |
dc.description.abstract |
Ever improving technology allows smartphones to become an integral part of people’s lives. The reliance on and ubiquitous use of smartphones render these devices rich sources of data. This data becomes increasingly important when smartphones are linked to criminal or corporate investigations. To erase data and mislead digital forensic investigations, endusers can manipulate the data and change recorded events. This paperinvestigatestheeffectsofmanipulatingsmartphonedataon both the Google Android and Apple iOS platforms. The deployed stepsleadstotheformulationofagenericprocessforsmartphone data manipulation. To assist digital forensic professionals with the detection of such manipulated smartphone data, this paper introduces an evaluation framework for detecting manipulated smartphone data. The framework uses key traces left behind as a result of the manipulation of smartphone data to construct techniques to detect the changed data. Assessment of the evaluation framework involves three distinct theoretical scenarios that involve the deletion and modi cation of existing data, as well as a failed attempt to insert fabricated data. The results produced by the evaluation framework suggest the framework can assist with the detection of manipulated smartphone data. The purpose of this research study was to demonstrate the manipulation of smartphone data and present an evaluation framework to detect such manipulated data. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
SAIEE |
en_US |
dc.relation.ispartofseries |
Worklist;22714 |
|
dc.subject |
Digital forensics |
en_US |
dc.subject |
Mobile forensics |
en_US |
dc.subject |
Smartphone data |
en_US |
dc.title |
Evaluation framework for detecting manipulated smartphone data |
en_US |
dc.type |
Article |
en_US |
dc.identifier.apacitation |
Pieterse, H., Oliver, D., & Van Heerden, R. P. (2019). Evaluation framework for detecting manipulated smartphone data. http://hdl.handle.net/10204/11256 |
en_ZA |
dc.identifier.chicagocitation |
Pieterse, Heloise, DM Oliver, and Renier P Van Heerden "Evaluation framework for detecting manipulated smartphone data." (2019) http://hdl.handle.net/10204/11256 |
en_ZA |
dc.identifier.vancouvercitation |
Pieterse H, Oliver D, Van Heerden RP. Evaluation framework for detecting manipulated smartphone data. 2019; http://hdl.handle.net/10204/11256. |
en_ZA |
dc.identifier.ris |
TY - Article
AU - Pieterse, Heloise
AU - Oliver, DM
AU - Van Heerden, Renier P
AB - Ever improving technology allows smartphones to become an integral part of people’s lives. The reliance on and ubiquitous use of smartphones render these devices rich sources of data. This data becomes increasingly important when smartphones are linked to criminal or corporate investigations. To erase data and mislead digital forensic investigations, endusers can manipulate the data and change recorded events. This paperinvestigatestheeffectsofmanipulatingsmartphonedataon both the Google Android and Apple iOS platforms. The deployed stepsleadstotheformulationofagenericprocessforsmartphone data manipulation. To assist digital forensic professionals with the detection of such manipulated smartphone data, this paper introduces an evaluation framework for detecting manipulated smartphone data. The framework uses key traces left behind as a result of the manipulation of smartphone data to construct techniques to detect the changed data. Assessment of the evaluation framework involves three distinct theoretical scenarios that involve the deletion and modi cation of existing data, as well as a failed attempt to insert fabricated data. The results produced by the evaluation framework suggest the framework can assist with the detection of manipulated smartphone data. The purpose of this research study was to demonstrate the manipulation of smartphone data and present an evaluation framework to detect such manipulated data.
DA - 2019-06
DB - ResearchSpace
DP - CSIR
KW - Digital forensics
KW - Mobile forensics
KW - Smartphone data
LK - https://researchspace.csir.co.za
PY - 2019
SM - 0038-2221
SM - 1991-1696
T1 - Evaluation framework for detecting manipulated smartphone data
TI - Evaluation framework for detecting manipulated smartphone data
UR - http://hdl.handle.net/10204/11256
ER -
|
en_ZA |