Evaluation of Smartphone Data using a Reference Architecture

Pieterse, Olivier, and van Heerden

2019

Citation information

H. Pieterse, M. Olivier, and R. van Heerden. “Evaluation of Smartphone Data using a Reference Architecture”. In: International Journal of Electronic Security and Digital Forensics (2019). Accepted for publication

Abstract

The 21st century is continuously witnessing the growth and evolution of smartphone technology. Central to this evolution is the use of popular smartphone applications. The frequent use of smartphone applications by people for everyday activities allows for the creation and storage of large quantities of smartphone data. Smartphone data is susceptible to change and can be compromised by anti-forensic tools, malware or malicious users. It is, therefore, important to establish the authenticity of such data before forming any conclusions. The first step to establishing the authenticity of smartphone data is to acquire a better understanding of the expected behaviour of smartphone applications. This paper introduces a reference architecture for smartphone applications, which captures the architectural components and models the expected behaviour of smartphone applications. An experiment conducted to examine the smartphone data of Android’s default messaging application indicates that the reference architecture can assist digital forensic professionals in identifying authentic smartphone data.

Definitive version

The definitive version of the paper is available from the publisher.
DOI: 10.1504/IJESDF.2019.10018774

BibTeX reference

@article(phone-ref-arch,
author={Heloise Pieterse and Martin Olivier and van Heerden, Renier},
title={Evaluation of Smartphone Data using a Reference Architecture},
journal={International Journal of Electronic Security and Digital Forensics},
note={Accepted for publication},
year={2019} )


[Publications] [Home]
Page maintained by Martin Olivier
Record refreshed: March 21, 2019

Beta version of new bibliography database; please report errors (or copyright violations) that may have slipped in.