Extraction of Persistent, Nonvolatile and Deleted Data from Windows Phone without JTAG Implementation

Authors(2) :-Diwakar Yash Dilipkumar, Dr. Ravi K Sheth

Cybercrime is spreading day by day and now become a part of routine life of users. With easily availability of smartphones and internet, which creates opportunity for the cyber criminals to commit such cybercrimes by utilizing smartphones. In today’s world the majority of the devices used in day to day life are Android and iOs but still there are some Windows Phone available in use. In the black market the price of Windows Phone is high due to its high security features and lake of available forensic tools. Before the seizure of AlphaBay and Hansabay (TOR Marketplace) the price of windows phone was high due to secure file system and robust architecture of Windows Phone. The available tool are not sufficient for extracting the forensic artifacts. So in this paper author has proposed and implement the method which is used for physical acquisition without using JTAG on hardware of windows Phone to extract persistent, nonvolatile and deleted data.

Authors and Affiliations

Diwakar Yash Dilipkumar
Student, Raksha Shakti University, Ahmedabad, Gujarat, India
Dr. Ravi K Sheth
Assistant Professor, Department of IT, Raksha Shakti University, Ahmedabad, Gujarat, India

Windows Phone Forensic, Mobile Forensic, Cyber Forensic, Data Carving, Device Recovery

  1. Adesina, Ganiyu. (2014). Mobile Operating Systems and Application Development Platforms: A Survey. 6. 2195 - 2201. (https://www.researchgate.net/publication/279954676_Mobile_Operating_Systems_and_Application_Development_Platforms_A_Survey)
  2. https://download.microsoft.com/download/B/9/A/B9A00269-28D5-4ACA-9E8E-E2E722B35A7D/Windows-Phone-8-1-Security-Overview.pdf
  3. https://en.wikipedia.org/wiki/MOBILedit
  4. https://support.mobiledit.com/portal/kb/articles/connecting-windows-phone
  5. http://www.cyberfore+nsics.in/Products/MobileCheck.aspx
  6. https://www.magnetforensics.com/mobile-forensics/analyzing-windows-phone-artifacts-with-ief/
  7. https://www.oxygen-forensic.com/en/events/press-releases/413-oxygen-forensic-suite-2014-data-acquisition-from-my-windows-phone
  8. Kumar, Satheesh & Kumar, Jinu & Suresh, Jithin. (2015). A Novel Method for Windows Phone Forensics. International Journal of Scientific and Engineering Research. 6. (https://pdfs.semanticscholar.org/6bc3/adbd00307c2393983ff8da97026b3c3d8e4d.pdf )
  9. https://www.forensicswiki.org/wiki/JTAG_Nokia_Lumia_620

Publication Details

Published in : Volume 3 | Issue 7 | September-October 2018
Date of Publication : 2018-09-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 151-156
Manuscript Number : CSEIT18357
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Diwakar Yash Dilipkumar, Dr. Ravi K Sheth, "Extraction of Persistent, Nonvolatile and Deleted Data from Windows Phone without JTAG Implementation", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 7, pp.151-156, September-October-2018.
Journal URL : http://ijsrcseit.com/CSEIT18357

Article Preview