CISUC

Current and Future Trends in Mobile Device Forensics: A Survey

Authors

Abstract

Contemporary mobile devices are the result of an evolution process where computational and networking capabilities have been continuously pushed so as to keep pace with the constantly growing workload requirements. This has allowed devices such as smartphone and tablets to perform increasingly complex tasks, up to the point of efficiently replacing traditional options such as desktop computers and notebooks. However, these devices are more prone to theft, to compromising or to exploitation for attacks and other malicious activity, mainly due to their portability and size. The need for investigation of the aforementioned incidents resulted in the creation of the Mobile Forensics (MF) discipline. MF, a sub-domain of Digital Forensics (DF) is specialized in extracting and processing evidence from mobile devices in such a way that attacking entities and actions are identified and traced. Beyond its primary research interest on accurate evidence acquisition from mobile devices, MF has recently expanded its scope to encompass the organized and advanced evidence representation and analysis of entities behavior. The current paper aims to present the research conducted within the MF ecosystem during the last six years. Moreover, it identifies the gaps and highlights the differences from past research directions. Lastly, it addresses challenges and open issues in the field.

Keywords

Mobile Forensics, Digital Forensics, Mobile Cloud Forensics, Evidence Acquisition, Forensic Ontologies, Evidence Parsing, Digital Investigations

Subject

Mobile Forensics

Related Project

H2020 ATENA (Advanced Tools to assEss and mitigate the criticality of ICT compoNents and their dependencies over Critical InfrAstructures)

Journal

ACM Computing Surveys, Vol. 51, #3, pp. 46, May 2018

DOI


Cited by

Year 2018 : 3 citations

 Ibrar Yaqoob, Ibrahim Abaker Targio Hashem, Arif Ahmed, S.M. Ahsan Kazmi, Choong Seon Hong, Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges, Future Generation Computer Systems, 2018, ISSN 0167-739X, https://doi.org/10.1016/j.future.2018.09.058.

 Li, C.-Y., Huang, C.-C., Lai, F., Lee, S.-L., Wu, J., "A Comprehensive Overview of Government Hacking Worldwide",
(2018) IEEE Access, 6, art. no. 8470931, pp. 55053-55073. DOI: 10.1109/ACCESS.2018.2871762

 Umair A., Nanda P., He X., Choo KK.R. (2018) User Relationship Classification of Facebook Messenger Mobile Data using WEKA. In: Au M. et al. (eds) Network and System Security. NSS 2018. Lecture Notes in Computer Science, vol 11058. Springer, Cham. DOI: 10.1007/978-3-030-02744-5_25