Mobile Forensics

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 1671 Experts worldwide ranked by ideXlab platform

Federica Rosso - One of the best experts on this subject based on the ideXlab platform.

  • how to deliver open sustainable innovation an integrated approach for a sustainable marketable product
    Sustainability, 2016
    Co-Authors: Francesco Cappa, Fausto Del Sette, Darren Hayes, Federica Rosso
    Abstract:

    The adoption of open innovation and peer production, powered by 3D printing technology, is transforming traditional manufacturing methods towards a “third industrial revolution”. The purpose of this research is to provide empirical evidence for an integrated approach, based on collaborative product development and peer production, combined with 3D printing, to deliver more sustainable, yet competitive, marketable products. In particular, this experimental study is conducted in the context of Mobile Forensics, an emerging market where limited expensive products exist and alternative solutions are needed. The technical viability and economic feasibility of the prototype developed in this research validate the proposed integrated approach, which could be a game-changer in the field of Mobile Forensics, as well as in other sectors. The sustainability improvements with this approach are a reduction of the total cost, thereby making it affordable for lower income users, and a decrease in energy consumption and pollutant emissions. The validated integrated approach offers start-up opportunities to develop and deliver more sustainable, marketable products, towards the paradigm of Open Sustainable Innovation. While the device developed and tested in this research has similar features to existing products, the methodology, implementation, and motivation are original.

Reiner Creutzburg - One of the best experts on this subject based on the ideXlab platform.

Ioannis Kounelis - One of the best experts on this subject based on the ideXlab platform.

  • ICITST - The Mobileak project: Forensics methodology for Mobile application privacy assessment
    2012
    Co-Authors: Pasquale Stirparo, Ioannis Kounelis
    Abstract:

    When talking about privacy, we talk about information, about data. There are several aspects that have to be considered when aiming to assess the privacy level of an application. These aspects are the states in which data can exist: data at rest, data in use and data in transit. Each of these require different methodologies and technologies in order to be properly addressed. This paper focuses on the state where data are at rest. It will be shown how common Mobile Forensics methodologies and tools can be used to assess the privacy level of Mobile applications, and therefore how Mobile applications store and manage personal information.

  • The Mobileak project: Forensics methodology for Mobile application privacy assessment
    Internet Technology And Secured …, 2012
    Co-Authors: Pasquale Stirparo, Ioannis Kounelis
    Abstract:

    When talking about privacy, we talk about information, about data. There are several aspects that have to be considered when aiming to assess the privacy level of an application. These aspects are the states in which data can exist: data at rest, data in use and data in transit. Each of these require different methodologies and technologies in order to be properly addressed. This paper focuses on the state where data are at rest. It will be shown how common Mobile Forensics methodologies and tools can be used to assess the privacy level of Mobile applications, and therefore how Mobile applications store and manage personal information.

Rajiv V. Dharaskar - One of the best experts on this subject based on the ideXlab platform.

  • Mobile Forensics: the roadblocks ahead, proposed solutions using Protocol Filtering and SIM programming
    2009
    Co-Authors: Rizwan Ahmed, Rajiv V. Dharaskar
    Abstract:

    From student to business worker, the popularity and ubiquity of Mobile devices is exploding. As these devices saturate modern culture, they continue to grow in functionality. Acquiring information from a Mobile phone is now an important issue in many criminal investigations. Mobile phones can contain large amounts of information which can be of use in an investigation. These include typical Mobile device data including SMS, phone records, images, audio, video, calendar and diary entries. As the difference between a PDA and a Mobile phone is now blurred, the data that can reside on a Mobile phone is somewhat endless.In this paper, we try to identify factors that pose as major roadblocks for Mobile Forensics and describes techniques to address two resulting problems in particular: the limited coverage of available phone models by forensic tools, and the inadequate means for validating the correct functioning of forensic tools

  • ICISTM - Mobile Forensics: An Introduction from Indian Law Enforcement Perspective
    Information Systems Technology and Management, 2009
    Co-Authors: Rizwan Ahmed, Rajiv V. Dharaskar
    Abstract:

    Mobile phone proliferation in our societies is on the increase. Advances in semiconductor technologies related to Mobile phones and the increase of computing power of Mobile phones led to an increase of functionality of Mobile phones while keeping the size of such devices small enough to fit in a pocket. This led Mobile phones to become portable data carriers. This in turn increased the potential for data stored on Mobile phone handsets to be used as evidence in civil or criminal cases. This paper examines the nature of some of the newer pieces of information that can become potential evidence on Mobile phones. It also highlights some of the weaknesses of Mobile forensic toolkits and procedures. Finally, the paper shows the need for more in depth examination of Mobile phone evidence.

Rajesh Krishna Balan - One of the best experts on this subject based on the ideXlab platform.

  • the case for Mobile Forensics of private data leaks towards large scale user oriented privacy protection
    Asia-Pacific Workshop on Systems, 2013
    Co-Authors: Joseph Chan Joo Keng, Tan Kiat Wee, Lingxiao Jiang, Rajesh Krishna Balan
    Abstract:

    Privacy protection against Mobile applications on Mobile devices is becoming a serious concern as user sensitive data may be leaked without proper justification. Most current leak detection tools only report leaked private data, but provide inadequate information about the causes of the leaks for end users to take preventive measures. Hence, users often cannot reconcile the way they have used an application to a reported leak --- i.e., they are unable to comprehend the (il)legitimacy of the leak or make a decision on whether to allow the leak. This paper aims to demonstrate the feasibility and benefits of identifying the causes of leaks from a user's point of view, which we call Mobile Forensics of privacy leaks. Its goal is to correlate user actions to leaks, and report the causes from a user-oriented perspective. To make the case, we have performed a preliminary study that identifies leak causes based on logs of user actions in more than 220 Android applications and corresponding leak reports from a leak detection tool. Our results show that more than 60% of the 105 applications (of the 220 we sampled) that leak private data leak data do so due to user actions on certain in-application GUI widgets. About 44% also leak data right after users launch them, while 32% leak data periodically after launch. We also constructed a database containing leak causes from all tested apps, and demonstrated the use of visual overlays to warn users about potential leaks.

  • APSys - The case for Mobile Forensics of private data leaks: towards large-scale user-oriented privacy protection
    Proceedings of the 4th Asia-Pacific Workshop on Systems - APSys '13, 2013
    Co-Authors: Joseph Chan Joo Keng, Tan Kiat Wee, Lingxiao Jiang, Rajesh Krishna Balan
    Abstract:

    Privacy protection against Mobile applications on Mobile devices is becoming a serious concern as user sensitive data may be leaked without proper justification. Most current leak detection tools only report leaked private data, but provide inadequate information about the causes of the leaks for end users to take preventive measures. Hence, users often cannot reconcile the way they have used an application to a reported leak --- i.e., they are unable to comprehend the (il)legitimacy of the leak or make a decision on whether to allow the leak. This paper aims to demonstrate the feasibility and benefits of identifying the causes of leaks from a user's point of view, which we call Mobile Forensics of privacy leaks. Its goal is to correlate user actions to leaks, and report the causes from a user-oriented perspective. To make the case, we have performed a preliminary study that identifies leak causes based on logs of user actions in more than 220 Android applications and corresponding leak reports from a leak detection tool. Our results show that more than 60% of the 105 applications (of the 220 we sampled) that leak private data leak data do so due to user actions on certain in-application GUI widgets. About 44% also leak data right after users launch them, while 32% leak data periodically after launch. We also constructed a database containing leak causes from all tested apps, and demonstrated the use of visual overlays to warn users about potential leaks.