Digital Forensics Security Analysis on iOS Devices

Authors

  • Min-Hao Wu College of Information Engineering, Guangzhou Panyu Polytechnic, Guangdong, 511483, China
  • Ting-Cheng Chang College of Information Engineering, Guangzhou Panyu Polytechnic, Guangdong, 511483, China
  • Yi Li-Min College of Information Engineering, Guangzhou Panyu Polytechnic, Guangdong, 511483, China

DOI:

https://doi.org/10.13052/jwe1540-9589.20310

Keywords:

Mobile forensics, iOS forensics, Instant messaging, Social networking, WeChat, QQ, Jailbreak

Abstract

With the rapid development of the Internet era, cell phones play an essential and indispensable role in nowadays life. Smartphones have profoundly influenced our social relationships and our daily lives. Generally speaking, the most common tools we hear about in our daily lives are QQ, WeChat, and other Internet communication services that allow users to send text messages, pictures, and documents, providing a more convenient and faster medium for people to communicate and chat. The popularity and convenience of mobile technology have changed people’s habits of communication. People no longer need to rely on computers to communicate, and computers cannot communicate anytime and anywhere. In the kernel of Linux and Windows, as long as the Message Hooker will install, it can monitor the messages of other programs, including WeChat and QQ, in this research. We can provide relevant law enforcement officers with effective evidence collection so that criminals will not be able to hide. The suspects often delete their WeChat or QQ records after committing the crime. It impossible for our law enforcement agencies to obtain evidence directly from the cell phone and the crime facts. Our research hopes to use some technology to help law enforcement units effectively obtain strong evidence in the iPhone not to hide the crime facts.

Downloads

Download data is not yet available.

Author Biographies

Min-Hao Wu, College of Information Engineering, Guangzhou Panyu Polytechnic, Guangdong, 511483, China

Min-Hao Wu received his Ph.D. degree in Computer Science and Information Engineering from National Central University, Taiwan, in 2016. He is an associate professor in the College of Information Engineering, Guangzhou Panyu Polytechnic, Guangdong Province, China. His research interests include System Security, Mobile Device Security, Web Security, Information Hiding, and Networks.

Ting-Cheng Chang, College of Information Engineering, Guangzhou Panyu Polytechnic, Guangdong, 511483, China

Ting-Cheng Chang received the M.S. and Ph.D. degrees in Process Control and Mechanical Engineering in 1992 and 1996, respectively, from the University of Houston and University of Texas at Arlington, Texas, USA. He is a professor at the College of Information Engineering, Guangzhou Panyu Polytechnic, Guangdong Province, China. His research interests lie in the Internet of Things, Data Mining, Big Data, and Optimal Theory.

Yi Li-Min, College of Information Engineering, Guangzhou Panyu Polytechnic, Guangdong, 511483, China

Yi Li-Min graduated with a Bachelor of Arts degree in 2014. Then she continued to study for a master’s degree in 2018. In 2020, she graduated from Shaanxi Normal University with a master’s degree. She now is a lecture and works in Guangzhou Panyu Polytechnic, Guangdong Province, China. She has been engaged in educational work in colleges since graduating from college and has specific student management experience and academic research ability. Her research interests are Artificial Intelligence-assisted Educational Management, Data Analysis, and Educational Network Security.

References

L. Alex, S. Bill and J. Daryl, “Third Party Application Forensics on Apple Mobile Devices”, Proceedings of the 44th Hawaii International Conference on System Sciences, IEEE, 2011.

L. Gomez-Miralles and J.Arnedo-Moreno, “Universal, Fast Method for iPad Forensic Imaging Via USB Adapter”, Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011.

S. Azadegan, W. Yu, H. Liu, M. Sistani and S. Acharya, “Novel Anti-forensics Approaches for Smart Phones”, Proceedings of the 45th Hawaii International Conference on System Sciences, IEEE, 2012.

M. I. Husain and R. Sridhar, “iForensics: Forensic Analysis of Instant Messaging on Smart Phones,” Digital Forensics and Cyber Crime, vol. 31 of the series Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp. 9–18, 2010.

M. Bader and I. Baggili, “iPhone 3GS Forensics: Logical Analysis Using Apple iTunes Backup Utility”, Small Scale Digital Device Forensics Journal, vol. 4, no. 1, September 2010.

C. Yates, L. Ray, and J. Yang, “An Investigation into iPod Touch Generation 2”, Information Security Curriculum Development Conference, 2011.

N. Kala and R. Thilagaraj, “A Framework for Digital Forensics in I-Devices: Jailed and Jail Broken Devices”, Journal of Advances in Library and Information Science, vol. 2, pp. 82–93, April–June 2013.

S. Salerno, A. Sanzgiri, and S.Upadhyaya, “Exploration of Attacks on Current Generation Smartphones”, Procedia Computer Science, vol. 5, pp. 546–553, 2011.

V.R. Pandya and M. Stamp, “iPhone Security Analysis”, Journal of Information Security, vol. 1, no. 2, pp. 74–87, 2010.

K. Barmpatsalou, D. Damopoulos, G. Kambourakis, and V. Katos, “A Critical Review of 7 Years of Mobile Device Forensics”, Digital Investigation, vol. 10, pp. 323–349, 2013.

J. Zdziarski, “Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices”, Digital Investigation, vol. 11, pp. 3–19, 2014.

Y.T. Chang, K.C. Teng, Y.C. Tso, and S.J. Wang, “Jailbroken iPhone Forensics for the Investigations and Controversy to Digital Evidence”, accepted in Journal of Computers, 2015.

L. Gomez-Miralles and J.Arnedo-Moreno, “Versatile iPad Forensic Acquisition Using the Apple Camera Connection Kit”, Computers and Mathematics with Applications, vol. 63, pp. 544–553, 2012.

L. Gomez-Miralles and J. Arnedo-Moreno, “AirPrint Forensics: Recovering the Contents and Metadata of Printed Documents from iOS Devices”, Mobile Information Systems, Article ID 916262, 10 pages, 2015.

cydiami, https://apt.cydiami.com/, 2021/02. [Online]. Available: https://apt.cydiami.com/

cydia, https://apt.cydia.love/, 2021/02. [Online]. Available: https://apt.cydia.love/, 2020

Published

2021-06-09

Issue

Section

Articles