Extraction of Persistent, Nonvolatile and Deleted Data from Windows Phone without JTAG Implementation
Keywords:
Windows Phone Forensic, Mobile Forensic, Cyber Forensic, Data Carving, Device RecoveryAbstract
Cybercrime is spreading day by day and now become a part of routine life of users. With easily availability of smartphones and internet, which creates opportunity for the cyber criminals to commit such cybercrimes by utilizing smartphones. In today’s world the majority of the devices used in day to day life are Android and iOs but still there are some Windows Phone available in use. In the black market the price of Windows Phone is high due to its high security features and lake of available forensic tools. Before the seizure of AlphaBay and Hansabay (TOR Marketplace) the price of windows phone was high due to secure file system and robust architecture of Windows Phone. The available tool are not sufficient for extracting the forensic artifacts. So in this paper author has proposed and implement the method which is used for physical acquisition without using JTAG on hardware of windows Phone to extract persistent, nonvolatile and deleted data.
References
- Adesina, Ganiyu. (2014). Mobile Operating Systems and Application Development Platforms: A Survey. 6. 2195 - 2201. (https://www.researchgate.net/publication/279954676_Mobile_Operating_Systems_and_Application_Development_Platforms_A_Survey)
- https://download.microsoft.com/download/B/9/A/B9A00269-28D5-4ACA-9E8E-E2E722B35A7D/Windows-Phone-8-1-Security-Overview.pdf
- https://en.wikipedia.org/wiki/MOBILedit
- https://support.mobiledit.com/portal/kb/articles/connecting-windows-phone
- http://www.cyberfore+nsics.in/Products/MobileCheck.aspx
- https://www.magnetforensics.com/mobile-forensics/analyzing-windows-phone-artifacts-with-ief/
- https://www.oxygen-forensic.com/en/events/press-releases/413-oxygen-forensic-suite-2014-data-acquisition-from-my-windows-phone
- Kumar, Satheesh & Kumar, Jinu & Suresh, Jithin. (2015). A Novel Method for Windows Phone Forensics. International Journal of Scientific and Engineering Research. 6. (https://pdfs.semanticscholar.org/6bc3/adbd00307c2393983ff8da97026b3c3d8e4d.pdf )
- https://www.forensicswiki.org/wiki/JTAG_Nokia_Lumia_620
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.