Smartphone Forensic Challenges
Smartphone Forensic Challenges
Abstract
Globally, the extensive use of smartphone devices has led to an increase in storage and
transmission of enormous volumes of data that could be potentially be used as digital evidence
in a forensic investigation. Digital evidence can sometimes be difficult to extract from these
devices given the various versions and models of smartphone devices in the market. Forensic
analysis of smartphones to extract digital evidence can be carried out in many ways, however,
prior knowledge of smartphone forensic tools is paramount to a successful forensic investigation.
In this paper, the authors outline challenges, limitations and reliability issues faced when using
smartphone device forensic tools and accompanied forensic techniques. The main objective of
this paper is intended to be consciousness-raising than suggesting best practices to these
forensic work challenges.
1. INTRODUCTION
Since the debut of the original iPhone in 2007, the evolution of smartphone features has been
on a predictable trajectory with increasing processing speed, user friendliness, security, faster
connectivity and a plethora of apps. With their increasing functionality and ever-growing data
storage, smartphones have become pocket size computers. With advances in technology,
device manufactures continue to add more features like privacy controls and bendable screens
leading to new device models being released each week. Password protection and default
device encryption are now the norm for many of these devices making it a struggle for law
enforcement to find accurate ways for data extraction and analysis.
Device vendors and features of operating systems can vary widely, particularly with Android
devices. The apps that they support also change keeping up with technology advancements.
According to a recent IDC Research survey [1], the top five smartphone vendors by market
share by the end of Q4 2018 were Samsung (18.7%), Apple (18.2%), Huawei (16.1%), Oppo
(7.8%) and Xiaomi (7.6%). The same survey finds "other" device vendors making up 31.6% of
the 2018 smartphone market. Devices from the "other" vendors often are the challenge when it
comes to smartphone forensics as forensic product vendors often focus tuning their product
compatibility with the high-use device models. With smartphones replacing conventional mobile
phones and traditional home computer tasks, their use has been of forensic interest especially
when part of the digital evidence of a crime or litigation.
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (5) : 2019 183
Sundar Krishnan, Bing Zhou & Min Kyung An
Smartphone forensics covers the process of triage, extraction, recovery and analyzing data from
the devices or smartphones. Commonly used smartphone forensic tools are Encase Mobile
Investigator [2], Cellebrite [3], Magnet ACQUIRE [4], Paraben E3-DS [5] and Salvationdata SPF
[6], etc. Smartphones are often targets of security attacks given their support for financial
transactions and the residual private data that they may contain. For a long time, cheap pre-
paid/post-paid (burner) smartphones have been a problem for law enforcement. Forensic
support for such devices can be a challenge as forensic product vendors are often swamped
with supporting various models in the market or just wait for a business/legal case to evolve
around these devices. Due to these factors, most forensic product vendors offer a catalog of
devices that are supported fully or partially. While forensic tools often aid investigators in digital
forensic investigations, an unending challenge is for them to be compatible with various in the
market. When working with these forensic tools, investigators can experience various challenges
related to skill levels, forensic tool reliability and device-tool compatibility with the smartphone
(forensic evidence). Targeting and carefully choosing automated solutions for novice
investigators can improve the efficiency, speed and quality of investigations. In this paper, the
authors discuss existing forensic smartphone acquisition methods and outline challenges with
the implementation of smartphone forensic tools while identifying key areas of improvements.
The rest of the paper is organized as follows. Section 2 covers related works. Section 3 dives
into smartphone forensics, file systems and forensic evidence management. Section 4 outlines
various challenges and limitations. Section 5 provides a discussion on ways of improving overall
smartphone forensics process. Lastly, Section 6 concludes with remarks.
2. RELATED WORK
Digital forensic tools continue to improve in technology and has also embraced Artificial
Intelligence. Most forensic tools comprise of automation, analysis and reporting features. Mobile
traffic continues to skyrocket across the world. According to a study in 2017, Americans used
15.7 trillion megabytes (MBs) of smartphone data in 2017, nearly quadrupling since 2014 and
representing 40 times the volume of traffic in 2010 [7].
Henry et al. [8] conducted a survey of forensic examiners working in both private industry and
government. Almost half (47%) of government personnel reported that smartphone devices are
involved in more than 10% of their cases. Mobile forensic tools have become more user friendly
over time and mask the complexities in automation by offering a push-button approach. Kovar
[11] highlighted the value of push-button forensics, and discusses three main reasons for the
acceptance of increased automation; non-expert market, speed-related financial interest from
consumers and the growing volume of digital evidence resulting in case backlogs.
Given the various apps on a smartphone that individually connect to the cloud for data storage,
Krishnan et al. [10] point to the legal challenges in accessing this data and the cloud provider’s
role. With cloud storage getting cheaper, analyzing large volumes of cloud data from a
smartphone needs automation and machine learning. James and Gladyshev [12] highlight the
challenges in forensic automation. In a survey done in 2016 by Harichandran et al. [9] on
tools/technology needing improvement, North Americans were more focused on mobile
forensics while the Europeans were most concerned with cloud forensics. This could be due to
the new privacy laws like General Data Protection Regulation (GDPR) introduced in 2016 and
their greater degree of severity than that of the United States.
Meanwhile Irons et al. [13] studied how to train competent digital investigators differentiate
between practice and theory as well as skills and knowledge claiming that each area calls for
development to ensure competency. Umale et al. [14] claimed that although forensics toolkits
exist for the forensic investigator, the bulk of the tools do not offer full functionality for multiple
devices. The National Institute for Standards and Technology (NIST) and the Scientific Group on
Digital Evidence (SWGDE) provide an in-depth look at mobile forensics process, outlining the
benefits and the challenges these devices present to Law enforcement [15], [16]. With ever
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (5) : 2019 184
Sundar Krishnan, Bing Zhou & Min Kyung An
increasing makes and models of smartphones being rolled out each day, smartphone forensic
tool vendors are ever keen on catering to these devices. Core forensic skills, such as data
carving, Operating System knowledge and custom programs coupled with analytical thinking will
continue to be necessary. Forensic practitioners need to know how to use forensic tools, but this
is only complementary to a thorough understanding of the forensic process, operating systems,
device applications and investigative skills.
There is a large body of literature that focuses on smartphone file system analysis, forensic
methodology and techniques. A few studies have focused on the challenges faced by forensic
practitioners, but these studies mostly covered smartphone forensic challenges in part coupled
with surveys, security, etc. While the aforementioned works make important contributions, they
do not undertake a fine-grained collection of challenges faced when using forensic tools. A
literature gap was noticed in outlining these challenges faced during smartphone forensics
coupled with forensic tool limitations. This paper overcomes the shortcomings.
3. MOBILE FORENSICS
The growth of mobile security and privacy features and their layers often work opposite to the
ease of doing forensics. Some security features are activated by default by the Operating
System (OS) and protects the user in the background, while others are obvious and seek user
attention. For instance, with every operating system upgrade, Apple’s iOS and Android OS seem
to add another layer of security enhancement. For Apple devices, it started in 2013 with the
introduction of Touch ID, a fingerprint sensor built into the iPhone 5S, and continued in iOS 8
with stronger encryption. Similarly, Android OS is also packed with powerful and practical
security features starting with Android version 5.0 supporting encryption. The healthy completion
between the two platforms have led to a myriad of security features that tend to increase the
forensic challenges during device acquisitions.
Forensic data extracted from these devices can provide investigators and attorneys with the
information they need to crack a case. As mobile devices become smaller and powerful, people
sometimes carry their devices everywhere they go which means they can tell a story about who
the user is communicating with, what they are communicating about, and where the user has
been. The device make, country of origin, carrier, model and OS version are key to ascertain the
security features that accompany the device. Table 1 lists the few security and filesystem
features that can be of consideration for a forensic analyst. Sometimes, certain OS features with
the same device make and model can vary based on the country that it was sold.
Mobile forensics is a branch of digital forensics that relates to methods of evidence extraction
from the mobile devices like smartphones, tablets, wearables, PDAs, GPS units, etc. Mobile
forensic tools acquire data from these devices and provide analysis. Smartphone devices
present many challenges from a forensic perspective due to the ever-changing device models
and apps being developed each day. It is extremely difficult to develop a single solution to cover
all makes and models of devices. In this section, we describe various forensic processes and the
file systems involved.
The iOS operating system is geared toward apps running on their own. Users of iOS devices do
not have direct access to the file system and apps are generally prohibited from accessing or
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (5) : 2019 185
Sundar Krishnan, Bing Zhou & Min Kyung An
creating files outside its container directories [21]. Most of the file-related interfaces in iOS are
designed with concurrency in mind. As of iOS 10.3 (March 2017), Apple File System (APFS) is
now the file system being used on Apple devices. Before iOS 10.3, HFS+ had been used.
TABLE 1: Few Smartphone Security and File-system Highlights [18], [19], [20].
Android iOS
System Security Linux kernel security features Secure boot chain
System Partition and Safe Mode Secure enclave
Biometric authentication Touch ID
Fingerprint FaceID
Device Administration APIs Activation lock
Facial recognition scan Strong passwords
Verified boot (version 6.0 Remote Wipe
onwards)
System image signing
Strong passwords
Remote Wipe
Encryption and data Filesystem Encryption Encryption by default
protection Keychain Two-step verification
Cryptographic APIs Hardware security features
Security-Enhanced Linux File data protection
(SELinux) Limited root usage Passcodes
Full-disk encryption (Android 5.0 Data protection classes
and above) Keychain data protection
Full filesystem encryption at kernel (Keybags)
level (Android 3.0 and later) Per file encryption
File-based encryption (Android 7.0 Keys in separate HW module
and later) Erasure of data after 10 failed
passcode attempts
App Security The Application Sandbox App code signing
Backdoor checks Runtime process security
Filesystem permissions App groups
Data protection in Apps
Secure notes
HealthKit
ReplayKit
SecureElement
iCloud Keychain
AppPay
Network Security TLS, VPN, Wi-Fi, Bluetooth, Wi-Fi TLS, VPN, Wi-Fi, Bluetooth,
Password Sharing AirDrop, Wi-Fi Password Sharing
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (5) : 2019 186
Sundar Krishnan, Bing Zhou & Min Kyung An
depending on the operating condition of the device. Few examples of forensically interesting
data during an on a smartphone device are listed below [22].
In some cases, if proper authentication details are available, data from the cloud storage of apps
can also be recovered. Other methodologies that can be used to find the geographical location
of the device or its user are listed below [23].
1. GPS: The Global Positioning System (GPS) of satellites are used to pinpoint the location
of a smartphone. [Note that Federal Communications Commission (FCC) E911
regulations require wireless carriers to be able to track 911 callers.]
2. Triangulation: Three cell phone towers in close proximity can be used to approximate
the location of the smartphone.
3. Wi-Fi Networks: Even with the GPS turned off, a smartphone can record Wi-Fi network
connections.
4. Ping: Ping by service provider for hardware associated with a smartphone number
5. Rogue tower (Stingray): Rouge devices that impersonate cell towers can trick
smartphones into thinking they are the service provider.
Since smartphone usage has become ubiquitous in our daily life and at our workplaces, they
play a critical role in the theft of intellectual property and other crimes. While computer forensics
has almost become commonplace, smartphone forensics is still evolving and presents several
challenges for digital forensic examiners.
1. Evidence Box and Seizure: Digital forensics operates on the principles that evidence
should always be adequately preserved, processed, documented and admissible in a
court of law. Digital devices may contain latent, trace, or biological evidence. The
forensic investigator should thoroughly document and preserve this potential evidence
for processing before the digital evidence imaging is undertaken.
2. Phone Jammers and Faraday Bag: Smartphone devices are often seized switched on.
Background apps are sometimes activated, and this could alter the state of the device.
Active, apps can invoke services and can start to transmit data over the network. Thus,
the best way to store and transport these devices is to attempt to keep them in a
Faraday bag. A phone jammer is also recommended to be kept beside this evidence.
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (5) : 2019 187
Sundar Krishnan, Bing Zhou & Min Kyung An
3. Device State: Smartphone devices should be charged, turned on and set to airplane
mode to avoid a shutdown, which would inevitably alter file state. Disabling Wi-Fi and
Hotspots is also recommended. If possible, the SIM card may be removed and
preserved.
The Android Debug Bridge (ADB) is a versatile command-line tool that lets the investigator
communicate with a Android smartphone device. It is a client-server program that includes the
client, a background process daemon and a server. ADB is included in the Android SDK
Platform-Tools package. Android’s ADB is free to use and can be downloaded along with the
SDK Manager. ADB usually communicates with the device over USB but can also use Wi-Fi
after some initial setup over the USB. Using ADB, all visible files can be obtained through the file
system, which does not include deleted files or hidden partitions.
The Hex Dumping technique is commonly used to upload a modified boot loader into a protected
area of memory (e.g., RAM) on a smartphone device using a flasher box [15]. A series of
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (5) : 2019 188
Sundar Krishnan, Bing Zhou & Min Kyung An
commands is sent from the flasher box to the smartphone device to place it in a diagnostic
mode. Once in diagnostic mode, the flasher box captures all (or sections) of the device’s flash
memory and sends it to the forensic workstation.
JTAG is used when forensic extractions cannot acquire a physical image or when a device is
logically damaged or “bricked” [15]. Many device manufacturers support the JTAG standard.
Forensic examiners can communicate with a JTAG-compliant component of a smartphone
device by utilizing special purpose standalone programmer devices to probe defined JTAG test
points. JTAG extractions are more advanced and invasive than HEX Dumping as the examiner
must dismantle some (or most) of a smartphone device to obtain access to establish the wiring
connections.
The Hex Dumping and JTAG extraction methods [15] require a connectivity between a
smartphone device and a forensic workstation. These methods allow a more direct access to the
raw information stored in smartphone device’s flash memory. However, the ability of a given tool
to parse and decode the captured data can be challenging. Sometimes, all data contained within
a given flash memory chip may not be acquired as well.
The Chip-off Forensics involves physically removing the flash memory chip from the smartphone
device and preparing it using balling techniques allowing for a chip reader to acquire the raw
data residing on the chip [15]. This method provides examiners with the ability to create a binary
image of the removed chip. While the chip reader is a required device for the extraction, a chip
adapter may also be required depending on chip specifications. Unlike JTAG, the Chip-off is a
destructive process, and the smartphone device may no longer function as before. Many
examiners start with a non-destructive technique such as Logical, JTAG and HEX-dumping
before opting for a Chip-off.
The Micro Read process records the physical observation of the gates on a NAND or NOR chip
with the use of an electron microscope [15]. Skilled technical expertise coupled with almost no
commercially available tools make such extractions a rarity. It is generally accepted that the
Micro-Read technique is most forensically sound and most technical, while the manual
extraction technique is the simplest. For a successful acquisition at this level, technical experts,
necessary equipment, time and in-depth knowledge of proprietary information is required. Also,
there are no known U.S. Law Enforcement agencies performing acquisitions at this level.
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (5) : 2019 189
Sundar Krishnan, Bing Zhou & Min Kyung An
A forensic examiner can expect to encounter such rooted phones as a part of evidence. Also, as
rooting Android smartphone devices has become a common phenomenon because
manufacturers and Android OS do not provide root access to device owners by default, forensic
examiner may need to root devices to acquire data for forensic examination. However, common
users seldom root their smartphone device unless an application from the app store needs such
an access on their device for its functioning. Usually the device manufacturer and Android do not
provide root access to the device owner by default. Meanwhile, Abalenkovs et al. [20] that a bit
by bit extraction of data from iOS smartphone devices has become a moving target due to
increasingly stronger protection mechanisms.
For the above reasons and the diverseness of makes and models of smartphone devices,
forensic tools can be more challenging when rooting is required. The forensic examiner should
decide on root level access and obtain necessary approvals before rooting the device. Once root
access is granted, the forensic examiner is able to perform extensive data recovery and file
carving which uncovers deleted evidence stored on the device (evidence).
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (5) : 2019 190
Sundar Krishnan, Bing Zhou & Min Kyung An
Note that before forensic examiners root devices, risks of the rooting process must be
ascertained to decide whether to accept a specific risk or take action to prevent or minimize it.
In the following, the examples of risks to evaluate are listed:
When it comes to selecting the most suitable method, many aspects are considered: the level of
thoroughness required, the available time for carrying out the process and what type of
information it is necessary to obtain such as volatile information, previously deleted data,
information from third party applications, etc. Figure 3 shows a forensic process flow useful to
follow when making such a decision. It considers other aspects as well such as whether a USB
debugging is activated, whether a terminal is locked with an access granted, etc.
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (5) : 2019 191
Sundar Krishnan, Bing Zhou & Min Kyung An
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (5) : 2019 192
Sundar Krishnan, Bing Zhou & Min Kyung An
tools as well as the criteria necessary for being able to evaluate the suitability of using one tool
versus another.
Saleem et al. [26] performed a comparative evaluation of Margin of Error and Confidence
Interval (CI) against two smartphone devices, Samsung HTC (Desire 300) and Galaxy (GT-
S5300) using five trial versions of various smartphone forensic tools. In their conclusion, tools
fared with mixed results highlighting the fact that selection of the appropriate tool is required per
investigation. Meanwhile, Padmanabhan et al. [27] analyzed few smartphone forensic tools for
reliability and accuracy. Their experimental results show that XRY 5.0 performed better than
UFED Physical Pro1.1.3.8 in terms of reliability and accuracy. Osho et al. [28] claimed that
finding a forensic tool or toolkit that is virtually applicable across all smartphone device platforms
and operating systems is currently infeasible. Computer Forensics Tool Testing program (CFTT)
[29] often reports on smartphone device acquisition tools (organized by publication date) and
can be a useful source on tool reliability.
As the market floods with various device models, forensic product vendors have been trying their
best to keep up device compatibility. Also, as the chances of rooting the smartphone device via
forensic tools are getting more difficult, reliability of such tools for evidence acquisition and
analysis has become more essential.
JTAG forensics is another method of data acquisition, which utilizes Test Access Ports (TAPs)
on a smartphone device instructing the smartphone processor to transfer the raw data stored on
connected memory chips. When commercial forensic extraction options cannot acquire a
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (5) : 2019 193
Sundar Krishnan, Bing Zhou & Min Kyung An
physical image or a device is logically damaged or “bricked”, the advanced method, jtagging,
can extract a full physical image from devices.
4.10 Timestamps
Sometimes, timestamps such as file “creation time” reported by what tools are created based on
acquisition timestamp.
The Figure 4 shows an example of possible ambiguity in reported timestamps. Because of such
ambiguity, few time formats conversions can result in creating incorrect data such as "last
Modification time" reported as 12/31/1979 and "last access time" of files reported as 7/28/2067.
Therefore, it would be helpful for forensic analysts to cross-verify metadata before reporting on
findings involving timestamps.
1. If the device is rooted, remove the gesture.key or password.key file in accordance with
the mode of protection established.
2. Install a personalized recovery tool such as ClockWorkMod or Team Win Recovery
Project (TWRP) and then deactivate device access locking.
3. Using brute force to crack the device. (On a 4-digit pin, it has been demonstrated the pin
can be cracked in a maximum period of 16 hours.)
4. Do a “Smudge Attack” [35], which involves obtaining the locking pattern from fingerprints
on the device’s screen by using different-angled photographs.
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (5) : 2019 194
Sundar Krishnan, Bing Zhou & Min Kyung An
difficult for physical acquisition or when the device is powered off. Jalibreaking an iOS
smartphone involves restarting of the device thereby erasing the volatile memory.
While forensic acquisition tools are executed on smartphone devices, they must be kept
powered on throughout the process due to the volatile nature of data. These tools load client
APIs to a device to be executed or install small boot-loader code into the device's RAM during
boot. Thus, there will be no concept of a write blocker during acquisition that could potentially
cause questioning of evidence integrity by the opposing counsel. However, during manual
acquisition methods using advanced dd command (application), a write blocker is advised during
file transfers.
4.15 Encryption
Personal smartphone devices are encrypted by default when sold with various methods such as
password lock, bio-metric authentication, and use of encrypted memory cards thereby providing
a user with additional means to protect data. Such data encryption capabilities on on-board or
removable memory storage are offered as a standard feature in many smartphone devices or
available through add-on applications. With the advanced encryptions, cracking passwords to
unlock a device has been getting more difficult for all forensic tools. Also, data storage on
devices have resulted in longer decryption time. Even though most mainstream forensic tools
provide a password bypass and password recovery mechanism, decryption is still a challenge to
these tools. Thus, Flasher box, JTAG, or chip-off extraction methods have become necessary
when devices are locked by their service providers [36]. Meanwhile, many smartphone vendors
and network carriers also have introduced advancements in anti-theft features such as
“automatic device wipe” after a set of unsuccessful attempts which interfere with a legitimate
forensic investigation.
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (5) : 2019 195
Sundar Krishnan, Bing Zhou & Min Kyung An
time spent can be a variable. The investigator’s ability to link a suspect as the one who clicked
the photos on the smartphone can take time and patience. Similarly, accessing and processing
data from third-party servers or the cloud could take a lot of paperwork and coordination with
external teams. Planning of such investigations and clear identification of roles and
responsibilities of the team are highly recommended. Special handling may be required for some
situations especially when dealing with evidence and suspect across geographical borders and
jurisdictions. Thus, the forensic investigators should set realistic timelines and factor additional
time for unknown tasks when updating management or reporting to authorities.
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (5) : 2019 196
Sundar Krishnan, Bing Zhou & Min Kyung An
conducting routine digital forensics can benefit from accreditation against standards set by The
American Society of Crime Laboratory Directors Laboratory Accreditation Board (ASCLD/LAB)
[46], ISO/IEC 17020:2012 [47] or ISO/IEC 17025:2005 standards [48]. Through accreditation, a
digital forensic laboratory demonstrates that its management, operations, personnel,
procedures, equipment, and security, etc. meet recommendations outlined on international
standards. A forensic laboratory accreditation can provide a standard or framework to ensure
confidence in the results obtained from the forensic processes of digital evidence investigation.
Similarly, adoption of a Quality Management System (QMS) to support training programs,
periodic competency checks of examiners, policy documentation, use of standards, controls and
recommended best-practices can help overcome work quality concerns while improving
productivity.
6. CONCLUSION
In this paper, we studied various challenges faced by a forensic investigator when dealing with
smartphone forensics and provided a comparative overview of these challenges. While
smartphones provide a ton of valuable information, deterrents to their successful forensics can
be a mix of their evolving technology, stronger security features, forensic tool limitations,
communication protocols, customization by multiple device carriers, and the sheer number of
models. Thus, an important consideration for the forensic investigators is to be fully aware of
what data can and should be extracted from the devices in question, risks in the extraction
process, and how much quality data can be retrieved and processed by the specific forensic tool
at hand given the tool limitations. Future research will need to be undertaken to document
workflows on tool options for an investigator when encountering these challenges. Development
of a forensic tool picker software application would be helpful that could direct the investigator on
forensic tool compatibility based upon smartphone device (evidence) specifications and
supported devices from forensic tool vendor.
7. ACKNOWLEDGEMENT
The authors would like to thank the forensics lab at the Cyber Forensics Intelligence Center,
Sam Houston State University, for providing necessary research facilities and access to digital
forensic tools.
8. REFERENCES
[1] “Smartphone Market Share.”, Internet:.https://www.idc.com/promo/smartphone-market-
share/vendor, 2018, [May 19, 2019].
[5] “E3 DS for Mobile forensics, Smartphone Forensics, and IoT forensics - Paraben
Corporation.”, Internet: https://paraben.com/mobile-forensics-software/ , [May 22, 2019].
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (5) : 2019 197
Sundar Krishnan, Bing Zhou & Min Kyung An
[8] Henry P., 2013, “The SANS Survey of Digital Forensics and Incident Response.”, Internet:
https://blogs.sans.org/computer-forensics/files/2013/07/sans_dfir_survey_2013.pdf, [May
22, 2019].
[9] Harichandran V. S., Breitinger F., Baggili I., and Marrington A., (2016, Mar) , “A cyber
forensics needs analysis survey: Revisiting the domain’s needs a decade later,” [On-line],
Comput. Secur., vol. 57, pp. 1–13, Available:
https://www.sciencedirect.com/science/article/pii/
S0167404815001595, [May 22, 2019].
[10] Krishnan S., Chen L., (2014), “Legal Concerns and Challenges in Cloud Computing,” in 2nd
International Symposium on Digital Forensics and Security (ISDFS 2014), [On-line],
Available: https://arxiv.org/abs/1905.10868 , [May 21, 2019].
[11] Kovar D., (2009), “Push button forensics – managing the downsides | Integriography: A
Journal of Broken Locks, Ethics, and Computer Forensics,” Intergriography: A Journal of
Broken Locks, Ethics, and Computer Forensics , [On-line], Internet:
https://integriography.wordpress.com/2009/11/19/push-button-forensics-managing-the-
downsides/, [May 18, 2019].
[12] James J. I. , Gladyshev P. (2013, Mar) , “Challenges with Automation in Digital Forensic
Investigations,” Available: http://arxiv.org/abs/1303.4498, [May 18, 2019].
[13] Irons A. D., Stephens P., Ferguson R. I. (2009 Sept), “Digital Investigation as a distinct
discipline: A pedagogic perspective,” Digit. Investig., vol. 6, no. 1–2, pp. 82–90, Internet:
https://linkinghub.elsevier.com/retrieve/pii/S1742287609000309, [May 18, 2019].
[14] Umale M., Deshmukh A. B., Tambhakhe M. D., (2014) “Mobile phone forensics challenges
and tools classification: A review”, [On-line], Internet:
https://pdfs.semanticscholar.org/867c/098360eb7ed57bd991bf0bb99042799f2824.pdf,
[May 18, 2019].
[15] Ayers R., Brothers S., Jansen W., (2007, May), “Guidelines on Mobile Device Forensics,”
NIST Spec. Publ. 800-101 Revis. 1, Internet:
https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-101r1.pdf, [May 18, 2019].
[17] Steve, “Android File System and Directory Structure Explained,” Internet:
http://www.stevesandroidguide.com/android-files/, 2017, [May 18, 2019].
[19] “System and kernel security | Android Open Source Project.” Internet:
https://source.android.com/security/overview/kernel-security, [May 20, 2019].
[20] Abalenkovs D, Bondarenko P, Pathapati V. K., Nordbø A., Piatkivskyi D., Rekdal J. E.,
Ruthven P. B., (2012), “Mobile forensics: Comparison of extraction and analyzing methods
of ios and android”, [On-line], Available: https://andynor.net/static/fileupload/399/Mobile
Forensics - Comparisonof extraction and analyzing methods of iOS and Android.pdf, [May
20, 2019].
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (5) : 2019 198
Sundar Krishnan, Bing Zhou & Min Kyung An
https://developer.apple.com/library/archive/documentation/FileManagement/Conceptual/Fil
eSystemProgrammingGuide/FileSystemOverview/FileSystemOverview.html. [May 18,
2019].
[22] “What digital forensics artifacts can you find on a mobile phone?”, Internet:
https://www.gillware.com/digital-forensics/mobile-forensics/. [May 18, 2019].
[25] Lohiya R., John P., and Shah P. (2015, May), “Survey on Mobile Forensics,” Int. J. Comput.
Appl., vol. 118, no. 16, [On-line], pp. 6–11, Internet:
http://research.ijcaonline.org/volume118/number16/pxc3903476.pdf, [May 17, 2019].
[26] Saleem S., Popov O., and Appiah-Kubi O. K., (2013, Oct), “Evaluating and Comparing
Tools for Mobile Device Forensics Using Quantitative Analysis,” Springer, Berlin,
Heidelberg, [On-line], pp. 264–282, Available: http://link.springer.com/10.1007/978-3-642-
39891-9_17, [May 17, 2019].
[27] Padmanabhan R., Lobo K., Ghelani M., Sujan D., and Shirole M. (2016, Aug),
“Comparative analysis of commercial and open source mobile device forensic tools,” Ninth
International Conference on Contemporary Computing (IC3), 2016, pp. 1–6, Internet:
http://ieeexplore.ieee.org/document/7880238/, [May 18, 2019].
[28] Osho, O., & Ohida, S. O. (2016), “Comparative evaluation of mobile forensic tools,” mecs-
press.net, Available:http://www.mecs-press.net/ijitcs/ijitcs-v8-n1/IJITCS-V8-N1-9.pdf, [May
18, 2019].
[34] Ayers R. P., “Smart Phone Tool Specification | NIST.”, (2010, Apr), Internet:
https://www.nist.gov/publications/smart-phone-tool-specification, [May 18, 2019].
[35] Martínez A. (2016), “Tools for carrying out forensic analyses on mobile devices | INCIBE-
CERT,” INCIBE, Internet: https://www.incibe-cert.es/en/blog/mobile-forensic-analyses-tools.
[May 18, 2019].
[36] Aviv A. J., Gibson K., Mossop E., Blaze M., and Smith J. M. (2010), “Smudge attacks on
smartphone touch screens,” Proceedings of the 4th USENIX conference on Offensive
technologies. USENIX Association, [On-line], pp. 1–7, Internet:
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (5) : 2019 199
Sundar Krishnan, Bing Zhou & Min Kyung An
[37] Engler R. and Miller C. (2013), “Six Persistent Challenges with Smartphone Forensics,”
Forensicmag, Internet: https://www.forensicmag.com/article/2013/02/6-persistent-
challenges-smartphone-forensics. [May 19, 2019].
[39] Ghosh R. K. (2017), “Mobile OS and Application Protocols,” in Wireless Networking and
Mobile Data Management, Singapore: Springer Singapore, [On-line], pp. 217–261.
Internet: http://link.springer.com/10.1007/978-981-10-3941-6_8, [Jun 10, 2019].
[40] Mikalack B., The Vestige Team, How much does Digital Forensic Services Cost? Internet:
https://www.vestigeltd.com/thought-leadership/digital-forensic-services-cost-guide-vestige-
digital-investigations/ , [Sept 5, 2019].
[41] Grossman L (2016, Mar) , Inside Apple CEO Tim Cook’s Fight With the FBI, Internet:
https://time.com/4262480/tim-cook-apple-fbi-2/, [Sept 5, 2019].
[42] Benner K., Lichtblau E., The New York Times, U.S. Says It Has Unlocked iPhone Without
Apple, Internet: https://www.nytimes.com/2016/03/29/technology/apple-iphone-fbi-justice-
department-case.html , [Sept 8, 2019].
[43] Novac M (2017), Gizmodo, The FBI Paid $900,000 to Unlock the San Bernardino
Terrorist's iPhone, Internet: https://gizmodo.com/the-fbi-paid-900-000-to-unlock-the-san-
bernardino-kill-1795010203 , [Sept 8, 2019].
[44] Al Hanaei, E. H., Rashid, A. (2014, May). DF-C2M2: a capability maturity model for digital
forensics organisations. In 2014 IEEE Security and Privacy Workshops (pp. 57-60). IEEE. ,
[Sept 10, 2019].
[45] Frye v. United States, 293 F. 1013 (D.C. Cir. 1923) , Internet:
https://www.law.ufl.edu/_pdf/faculty/little/topic8.pdf , [Sept 12, 2019].
[46] Daubert v. Merrell Dow Pharmaceuticals (92-102), 509 U.S. 579 (1993), Internet:
https://www.law.cornell.edu/supct/html/92-102.ZS.html , [Sept 12, 2019].
[48] Conformity assessment — Requirements for the operation of various types of bodies
performing inspection, ISO/IEC 17020:2012 [-,IEC], Internet:
https://www.iso.org/standard/52994.html , [Sept 9, 2019].
[49] General requirements for the competence of testing and calibration laboratories, ISO/IEC
17025:2005, Internet: https://www.iso.org/standard/39883.html, [Sept 8, 2019].
International Journal of Computer Science and Security (IJCSS), Volume (13) : Issue (5) : 2019 200