CFP last date
22 April 2024
Reseach Article

An Agent based Approach using Symbian Phone Forensics

Published on March 2013 by Neha V. Londase, Radhika K. Rathi, Rhucha D. Gangamwar
National Level Technical Conference X-PLORE 2013
Foundation of Computer Science USA
XPLORE - Number 1
March 2013
Authors: Neha V. Londase, Radhika K. Rathi, Rhucha D. Gangamwar
3f5758f7-ece8-4aeb-a88b-01702a73c3d2

Neha V. Londase, Radhika K. Rathi, Rhucha D. Gangamwar . An Agent based Approach using Symbian Phone Forensics. National Level Technical Conference X-PLORE 2013. XPLORE, 1 (March 2013), 1-9.

@article{
author = { Neha V. Londase, Radhika K. Rathi, Rhucha D. Gangamwar },
title = { An Agent based Approach using Symbian Phone Forensics },
journal = { National Level Technical Conference X-PLORE 2013 },
issue_date = { March 2013 },
volume = { XPLORE },
number = { 1 },
month = { March },
year = { 2013 },
issn = 0975-8887,
pages = { 1-9 },
numpages = 9,
url = { /proceedings/xplore/number1/11298-1302/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Level Technical Conference X-PLORE 2013
%A Neha V. Londase
%A Radhika K. Rathi
%A Rhucha D. Gangamwar
%T An Agent based Approach using Symbian Phone Forensics
%J National Level Technical Conference X-PLORE 2013
%@ 0975-8887
%V XPLORE
%N 1
%P 1-9
%D 2013
%I International Journal of Computer Applications
Abstract

Smart phones like the older mobile phones are fast becoming a life style choice. These sleek devices with large amount of personal information in them make smart phone forensics, a key component in any criminal investigation. It presents a contrast between hardware and software approaches and highlights the key advantage of the software approach i. e. the speed at which actionable data can be made available with less technical knowhow. Moreover, the proposed plug-in based agent development provides an extensible framework to handle customizations that will matchup with each unique nuance of phone platform and model. The main focus is the simplicity and extensibility of proposed approach but at the same time the paper does warn about the possible impact to device memory and contrasts with other alternatives.

References
  1. Michael Aubert, with Alexey Gusev . . . [et al. ], Quick Recipes on Symbian OS, Mastering C++ Smartphone Development. John Wiley & Sons, Ltd, 2008. pp. 529– 551.
  2. Symbian-Ltd. Carbide. C++: Introductory White Paper. Forum Nokia, Version 1. 1; 2007 13
  3. Breeuwsma M. , Jongh M. D. , Klaver C. , et al. Forensics data recovery from flash memory. In Small Scale Device Forensics Journal, 2007, 1. 7
  4. Iain Campbell, Symbian OS Communications, John Wiley and Sons, Ltd. , 2007. 11
  5. [Software, 2007] Software, O. (2007). Oxygen Phone Manager II Forensic Edition v2. 13 for Symbian OS smartphones. Oxygen Software, http://www. oxygensoftware. com/en/, 2. 13 editions.
  6. Craig Heath, Symbian OS Platform Security: Software Development Using the Symbian OS Security Architecture (Wiley, 2006). 8
  7. [Kot and Zoltan, 2006] Kot, P. and Zoltan, B. (2006). Gnokii project.
  8. [Siezen, 2005] Siezen, S. (2005). Symbian OS version 9. 1 product description. Technical Report 1. 1, Symbian Ltd.
  9. [McCarthy, 2005] McCarthy, P. (2005). Forensic analysis of mobile phones. Master's thesis, University of South Australia.
  10. [Willassen, 2005] Willassen, S. (2005). Forensic analysis of mobile phone internal memory. In IFIP Int. Conf. Digital Forensics, pages 191–204.
  11. Jo Stichbury Symbian OS Explained, John Wiley and Sons, Ltd. 2004, 1. 10
  12. [Casey, 2004] Casey, E. (2004). Digital Evidence and Computer Crime. Elsevier Academic Press, 2nd edition.
  13. [McDowall, 2004] McDowall, I. (2004). Programming PC Connectivity Applications for Symbian OS. Wiley.
  14. [Croft, 2004] Croft, N. (2004). Secure interoperation of wireless technologies. Master's thesis, University of Pretoria.
  15. [Mery, 2003] Mery, D. (2003). Symbian os version 7. 0 functional description. Technical Report 1. 5, Symbian Ltd.
  16. Svein Yngvar Willassen, Forensics and the GSM mobile phone system, The International Journal of Digital Evidence, Spring 2003, Volume 2 Issue 1
  17. [Goode, 2003] Goode, A. (2003). Forensic extraction of electronic evidence from gsm mobile phones. Secure GSM and Beyond, 10059(9):1–6.
  18. OMA (2001). Syncml sync protocol. Technical Report 1. 0. 1, Open Mobile Alliance
  19. [OMA, 2001] OMA (2001). Syncml sync protocol. Technical Report 1. 0. 1, Open Mobile Alliance.
  20. [SMG, 1999] SMG (1999). Digital cellular telecommunications system (phase 2) - at command set for GSM mobile equipment (me). Technical Report ETS 300 642, European Telecommunications Standards Institute, 650 Route des Lucioles - Sophia Antipolis - Valbonne – FRANCE
  21. [McGowan et al. , 1999] McGowan, P. , Suvak, D. , and Kogan, D. (1999). IrDA object exchange protocol. Technical report, Infrared Data Association.
  22. Richard Harrison, Mark Shackman, Symbian OS C++ for Mobile Phones Volume 3. John Wiley and Sons, Ltd. pp. 204-206
  23. Michael Auburt, Quick Recipies on Symbian OS Mastering C++ Smartphone Development, John Wiley and Sons, Ltd. pp. 60-63
Index Terms

Computer Science
Information Sciences

Keywords

Cyber Forensics Law Enforcement Mobile Computing Security