Extraction of Persistent, Nonvolatile and Deleted Data from Windows Phone without JTAG Implementation

Authors

  • Diwakar Yash Dilipkumar  Student, Raksha Shakti University, Ahmedabad, Gujarat, India
  • Dr. Ravi K Sheth  Assistant Professor, Department of IT, Raksha Shakti University, Ahmedabad, Gujarat, India

Keywords:

Windows Phone Forensic, Mobile Forensic, Cyber Forensic, Data Carving, Device Recovery

Abstract

Cybercrime is spreading day by day and now become a part of routine life of users. With easily availability of smartphones and internet, which creates opportunity for the cyber criminals to commit such cybercrimes by utilizing smartphones. In today’s world the majority of the devices used in day to day life are Android and iOs but still there are some Windows Phone available in use. In the black market the price of Windows Phone is high due to its high security features and lake of available forensic tools. Before the seizure of AlphaBay and Hansabay (TOR Marketplace) the price of windows phone was high due to secure file system and robust architecture of Windows Phone. The available tool are not sufficient for extracting the forensic artifacts. So in this paper author has proposed and implement the method which is used for physical acquisition without using JTAG on hardware of windows Phone to extract persistent, nonvolatile and deleted data.

References

  1. Adesina, Ganiyu. (2014). Mobile Operating Systems and Application Development Platforms: A Survey. 6. 2195 - 2201. (https://www.researchgate.net/publication/279954676_Mobile_Operating_Systems_and_Application_Development_Platforms_A_Survey)
  2. https://download.microsoft.com/download/B/9/A/B9A00269-28D5-4ACA-9E8E-E2E722B35A7D/Windows-Phone-8-1-Security-Overview.pdf
  3. https://en.wikipedia.org/wiki/MOBILedit
  4. https://support.mobiledit.com/portal/kb/articles/connecting-windows-phone
  5. http://www.cyberfore+nsics.in/Products/MobileCheck.aspx
  6. https://www.magnetforensics.com/mobile-forensics/analyzing-windows-phone-artifacts-with-ief/
  7. https://www.oxygen-forensic.com/en/events/press-releases/413-oxygen-forensic-suite-2014-data-acquisition-from-my-windows-phone
  8. Kumar, Satheesh & Kumar, Jinu & Suresh, Jithin. (2015). A Novel Method for Windows Phone Forensics. International Journal of Scientific and Engineering Research. 6. (https://pdfs.semanticscholar.org/6bc3/adbd00307c2393983ff8da97026b3c3d8e4d.pdf )
  9. https://www.forensicswiki.org/wiki/JTAG_Nokia_Lumia_620

Downloads

Published

2018-09-30

Issue

Section

Research Articles

How to Cite

[1]
Diwakar Yash Dilipkumar, Dr. Ravi K Sheth, " Extraction of Persistent, Nonvolatile and Deleted Data from Windows Phone without JTAG Implementation, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 7, pp.151-156, September-October-2018.