2022, Vol. 3, Issue 1, Part A
Extract data from encrypted mobile devices
Author(s): Brij Mohan Goel and Shefali Saini
Abstract: In modern criminal investigations, mobile devices are seized at all kinds of crime scenes, and data from these devices often become important evidence in a case. Several mobile forensic technologies have been created and evaluated through research to extract potential evidence data from devices for decades. However, as mobile devices have become essential tools for everyday life, security and privacy concerns have increased, and modern smartphone vendors have implemented various types of security protection measures, such as encryption, to guard against unauthorized access to your product data. This trend is making obtaining forensic evidence more difficult than ever, and extracting data from those devices for criminal investigation is becoming more and more difficult. Today, mobile forensics focus on identifying the most prevalent technologies, such as bypassing security features and hacking targeted smartphones by exploiting their weaknesses. In this paper, we explain the increased protection and security measures on modern mobile devices and their impact on traditional forensic data mining techniques for law enforcement purposes. To overcome challenges, new forensic methods rely on bypassing security features and exploiting system weaknesses. A new model for forensic acquisition has been proposed. The model is based on a legal framework that focuses on the usability of digital evidence obtained by exploiting vulnerabilities.
Pages: 55-64 | Views: 413 | Downloads: 144
Download Full Article: Click Here
How to cite this article:
Brij Mohan Goel, Shefali Saini. Extract data from encrypted mobile devices. Int J Res Circuits Devices Syst 2022;3(1):55-64.