Despite the fact that every iOS release introduces new security restrictions that must be overcome in order to recover data from iPhones, the locations where the data of interest resides are generally consistent. This paper analyzes the iOS filesystem and identifies files and directories that contain data that can aid investigations of traditional crimes involving iPhones as well as hacking and cracking attacks launched from iPhones. Additionally, best practices for minimizing the false positive rate during data carving are identified. These findings are implemented in an open source forensic investigation toolkit that operates in a forensically-sound manner.
CITATION STYLE
Cheema, A. R., Iqbal, M. M. W., & Ali, W. (2014). An open source toolkit for ios filesystem forensics. In IFIP Advances in Information and Communication Technology (Vol. 433, pp. 227–236). Springer New York LLC. https://doi.org/10.1007/978-3-662-44952-3_15
Mendeley helps you to discover research relevant for your work.