ResearchSpace

Evaluating the authenticity of smartphone evidence

Show simple item record

dc.contributor.author Pieterse, Heloise
dc.contributor.author Olivier, Marius
dc.contributor.author Van Heerden, Renier P
dc.date.accessioned 2017-10-10T08:13:57Z
dc.date.available 2017-10-10T08:13:57Z
dc.date.issued 2017-08
dc.identifier.citation Pieterse, H., Olivier, M. and Van Heerden, R. P. 2017. Evaluating the authenticity of smartphone evidence. Advances in Digital Forensics XIII, pp. 41-61. DOI: 10.1007/978-3-319-67208-3_3 en_US
dc.identifier.isbn 978-3-319-67207-6
dc.identifier.uri https://link.springer.com/chapter/10.1007/978-3-319-67208-3_3
dc.identifier.uri DOI: 10.1007/978-3-319-67208-3_3
dc.identifier.uri https://www.researchgate.net/publication/319390469_Evaluating_the_Authenticity_of_Smartphone_Evidence
dc.identifier.uri http://hdl.handle.net/10204/9651
dc.description Copyright: 2017 International Federation for Information Processing (IFIP). Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, kindly consult the publisher's website. en_US
dc.description.abstract The widespread use and rich functionality of smartphones have made them valuable sources of digital evidence. Malicious individuals are becoming aware of the importance of digital evidence found on smartphones and may be interested in deploying anti-forensic techniques to alter evidence and thwart investigations. It is, therefore, important to establish the authenticity of smartphone evidence. This chapter focuses on digital evidence found on smartphones that has been created by smartphone applications and the techniques that can be used to establish the authenticity of the evidence. In order to establish the authenticity of the evidence, a better understanding of the normal or expected behavior of smartphone applications is required. This chapter introduces a new reference architecture for smartphone applications that models the components and the expected behavior of applications. Seven theories of normality are derived from the reference architecture that enable digital forensic professionals to evaluate the authenticity of smartphone evidence. An experiment conducted to examine the validity of the theories of normality indicates that the theories can assist forensic professionals in identifying authentic smartphone evidence. en_US
dc.language.iso en en_US
dc.publisher Springer en_US
dc.relation.ispartofseries Worklist;19451
dc.subject Smartphone forensics en_US
dc.subject Evidence en_US
dc.subject Authenticity en_US
dc.subject Reference architecture en_US
dc.title Evaluating the authenticity of smartphone evidence en_US
dc.type Book Chapter en_US
dc.identifier.apacitation Pieterse, H., Olivier, M., & Van Heerden, R. P. (2017). Evaluating the authenticity of smartphone evidence., <i>Worklist;19451</i> Springer. http://hdl.handle.net/10204/9651 en_ZA
dc.identifier.chicagocitation Pieterse, Heloise, Marius Olivier, and Renier P Van Heerden. "Evaluating the authenticity of smartphone evidence" In <i>WORKLIST;19451</i>, n.p.: Springer. 2017. http://hdl.handle.net/10204/9651. en_ZA
dc.identifier.vancouvercitation Pieterse H, Olivier M, Van Heerden RP. Evaluating the authenticity of smartphone evidence.. Worklist;19451. [place unknown]: Springer; 2017. [cited yyyy month dd]. http://hdl.handle.net/10204/9651. en_ZA
dc.identifier.ris TY - Book Chapter AU - Pieterse, Heloise AU - Olivier, Marius AU - Van Heerden, Renier P AB - The widespread use and rich functionality of smartphones have made them valuable sources of digital evidence. Malicious individuals are becoming aware of the importance of digital evidence found on smartphones and may be interested in deploying anti-forensic techniques to alter evidence and thwart investigations. It is, therefore, important to establish the authenticity of smartphone evidence. This chapter focuses on digital evidence found on smartphones that has been created by smartphone applications and the techniques that can be used to establish the authenticity of the evidence. In order to establish the authenticity of the evidence, a better understanding of the normal or expected behavior of smartphone applications is required. This chapter introduces a new reference architecture for smartphone applications that models the components and the expected behavior of applications. Seven theories of normality are derived from the reference architecture that enable digital forensic professionals to evaluate the authenticity of smartphone evidence. An experiment conducted to examine the validity of the theories of normality indicates that the theories can assist forensic professionals in identifying authentic smartphone evidence. DA - 2017-08 DB - ResearchSpace DP - CSIR KW - Smartphone forensics KW - Evidence KW - Authenticity KW - Reference architecture LK - https://researchspace.csir.co.za PY - 2017 SM - 978-3-319-67207-6 T1 - Evaluating the authenticity of smartphone evidence TI - Evaluating the authenticity of smartphone evidence UR - http://hdl.handle.net/10204/9651 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record