An open source toolkit for ios filesystem forensics

1Citations
Citations of this article
15Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Despite the fact that every iOS release introduces new security restrictions that must be overcome in order to recover data from iPhones, the locations where the data of interest resides are generally consistent. This paper analyzes the iOS filesystem and identifies files and directories that contain data that can aid investigations of traditional crimes involving iPhones as well as hacking and cracking attacks launched from iPhones. Additionally, best practices for minimizing the false positive rate during data carving are identified. These findings are implemented in an open source forensic investigation toolkit that operates in a forensically-sound manner.

Author supplied keywords

Cite

CITATION STYLE

APA

Cheema, A. R., Iqbal, M. M. W., & Ali, W. (2014). An open source toolkit for ios filesystem forensics. In IFIP Advances in Information and Communication Technology (Vol. 433, pp. 227–236). Springer New York LLC. https://doi.org/10.1007/978-3-662-44952-3_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free