skip to main content
10.1145/2184751.2184827acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

iPhone social networking for evidence investigations using iTunes forensics

Published:20 February 2012Publication History

ABSTRACT

The smart phone, like a small computer, providing not only the functions of normal phones and wireless Internet access, but also all kinds of application tools, serves as a platform of the sources of real-time information, information sharing and information exchange in our daily lives. As a result, the extract the crucial digital evidence in the smart phone, it has now become a challenge in the technology time. In particular, it is for when the smart phone applications are committed as the illegal contacts. In this paper, we discuss the most five popular mobile social networking applications in iPhone usages. The backup files of social networking applications could offer us the crucial evidence in this paper study. The relative information of social networking applications operated in iPhone is able to be accessed if necessary, even though iPhone has been destructed or encrypted by the suspect. It could help the investigators to exactly reconstruct the crime venue and find the truth.

References

  1. 44 Billion Mobile App Downloads by 2016, Retrieved October 1, 2011, from http://www.abiresearch.com/press/3668-44+Billion+Mobile+App+Downloads+by+2016.Google ScholarGoogle Scholar
  2. Facebook for iPhone, Facebook, Retrieved October 6, 2011, from http://www.facebook.com/iphone.Google ScholarGoogle Scholar
  3. WhatsApp Inc. Retrieved October 6, 2011, from http://www.whatsapp.com/.Google ScholarGoogle Scholar
  4. Viber Media Inc. Retrieved October 6, 2011, from http://www.viber.com/.Google ScholarGoogle Scholar
  5. Skype 3.5 for iPhone, Skype Limited. Retrieved October 6, 2011, from http://www.skype.com/intl/en-us/get-skype/on-your-mobile/download/iphone-for-skype/.Google ScholarGoogle Scholar
  6. Windows live messenger, Microsoft, Retrieved October 6, 2011, from http://explore.live.com/windows-live-messenger-mobile.Google ScholarGoogle Scholar
  7. Luis, G. M. and Joan, A. M. 2011. Universal, fast method for iPad forensic imaging via USB adapter, Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. IEEE, Korea, 200--207. DOI=http://dx.doi.org/10.1109/IMIS.2011.41 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Hoog, A. and Gaffaney, K. 2009. iPhone Forensics. Via Forensics.Google ScholarGoogle Scholar
  9. Zdziarski, J. 2008. iPhone Forensics, O'Reilly Media. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Rabaiotti, J. R. and Hargreaves, C. J. 2010. Using a software exploit to image RAM on an embedded system, Digital Investigation, 95--103. DOI=http://dx.doi.org/10.1016/j.diin.2010.01.005 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Micro Systemation XRY, Retrieved October 1, 2011, from http://www.msab.com/Google ScholarGoogle Scholar
  12. Paraben Corporation Device Seizure, Retrieved October 1, 2011, from http://www.paraben.com/device-seizure.htmlGoogle ScholarGoogle Scholar
  13. iTunes, Apple Inc. Retrieved October 4, 2011, from http://www.apple.com/tw/itunes/features/Google ScholarGoogle Scholar
  14. Crosby, A. iPhone forensics, without the iPhone, Retrieved October 13, 2011, from http://www.slideshare.net/hrgeeks/iphone-forensics-without-the-iphoneGoogle ScholarGoogle Scholar
  15. Bader, M. and Baggili, I. 2010. iPhone 3GS Forensics: Logical analysis using Apple iTunes Backup Utility, small scale digital device forensics journalGoogle ScholarGoogle Scholar
  16. SQLite Database Browser. sourceforge.net, Retrieved October 5, 2011, from http://sqlitebrowser.sourceforge.netGoogle ScholarGoogle Scholar
  17. plist Editor for Windows 1.0, iPodRobot.com, Retrieved October 5, 2011, from http://www.windows7download.com/win7-plist-editor-for-windows/htqyjntb.htmlGoogle ScholarGoogle Scholar
  18. Alex, L. Bill, S. and Daryl, J. 2011. Third Party Application Forensics on Apple Mobile Devices, Proceedings of the 44th Hawaii International Conference on System Sciences, 1--9. DOI=http://dx.doi.org/10.1109/HICSS.2011.440 Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. iPhone and iPod touch: About backups. Retrieved October 4, 2011, from http://support.apple.com/kb/HT1766?viewlocale=zh_TWGoogle ScholarGoogle Scholar

Index Terms

  1. iPhone social networking for evidence investigations using iTunes forensics

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ICUIMC '12: Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
          February 2012
          852 pages
          ISBN:9781450311724
          DOI:10.1145/2184751

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 20 February 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate251of941submissions,27%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader