Review Special Issues

Security and privacy challenges in the field of iOS device forensics

  • Received: 31 March 2020 Accepted: 08 June 2020 Published: 22 June 2020
  • The purpose of this paper is to review existing research literature analyzing the existing challenges facing the forensics community during investigations involving iOS devices. The scope of this paper is to analyze the existing security and privacy challenges and review the research and techniques being developed to combat these challenges. Throughout this paper, examples, where techniques have been applied, are discussed and future topics of research are identified.

    Citation: Dave Bullock, Aliyu Aliyu, Leandros Maglaras, Mohamed Amine Ferrag. Security and privacy challenges in the field of iOS device forensics[J]. AIMS Electronics and Electrical Engineering, 2020, 4(3): 249-258. doi: 10.3934/ElectrEng.2020.3.249

    Related Papers:

  • The purpose of this paper is to review existing research literature analyzing the existing challenges facing the forensics community during investigations involving iOS devices. The scope of this paper is to analyze the existing security and privacy challenges and review the research and techniques being developed to combat these challenges. Throughout this paper, examples, where techniques have been applied, are discussed and future topics of research are identified.


    加载中


    [1] Ferrag MA, Maglaras L, Derhab A (2019) Authentication and authorization for mobile iot devices using biofeatures: Recent advances and future trends. Secur Commun Netw 2019: 1-20.
    [2] Jackson W (2014) Can digital forensics keep up with smartphone tech.
    [3] Waldrop MM (2016) The chips are down for moore's law. Nature News 530: 144. doi: 10.1038/530144a
    [4] Ferrag MA, Maglaras L, Derhab A, et al. (2020) Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues. Telecommun Syst 73: 317-348. doi: 10.1007/s11235-019-00612-5
    [5] Al Fahdi M, Clarke NL, Furnell SM (2013) Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions. 2013 Information Security for South Africa, 1-8.
    [6] Barmpatsalou K, Damopoulos D, Kambourakis G, et al. (2013) A critical review of 7 years of mobile device forensics. Digit Invest 10: 323-349. doi: 10.1016/j.diin.2013.10.003
    [7] Husain MI, Baggili I, Sridhar R (2010) A simple cost-effective framework for iphone forensic analysis. International Conference on Digital Forensics and Cyber Crime, 27-37.
    [8] Bays J and Karabiyik U (2019) Forensic analysis of third party location applications in android and ios. arXiv preprint arXiv:1907.00074.
    [9] Troutman C and Mancha V (2020) Mobile forensics. Digital Forensic Education 61: 175-201. doi: 10.1007/978-3-030-23547-5_10
    [10] Knox S, Moghadam S, Patrick K, et al. (2020) What's really 'happning'? a forensic analysis of android and ios happn dating apps. Comput Secur 94: 101833.
    [11] Hoog A and Strzempka K (2011) iPhone and iOS forensics: Investigation, analysis and mobile security for Apple iPhone, iPad and iOS devices. Elsevier.
    [12] Barmpatsalou K, Cruz T, Monteiro E, et al. (2018) Current and future trends in mobile device forensics: A survey. ACM Comput Surv (CSUR) 51: 1-31.
    [13] Huang CT, Ko HJ, Zhuang ZW, et al. (2018) Mobile forensics for cloud storage service on ios systems. 2018 International Symposium on Information Theory and Its Applications (ISITA), 178-182.
    [14] Long J (2016) The evolution of ios security and privacy features.
    [15] Reiner R (1991) Chief constables. Oxford: Oxford University Press.
    [16] Todesco L (2015) Attacking the xnu kernel in el capitan. Black Hat EU.
    [17] Ariffin A, DOorazio C, Choo KKR, et al. (2013) ios forensics: How can we recover deleted image files with timestamp in a forensically sound manner? 2013 International conference on availability, reliability and security, 375-382.
    [18] Blanch JL and Christensen SS (2018) Biometric basics: Options to gather data from digital devices locked by a biometric key. US Att'ys Bull 66: 3.
    [19] Ferrag MA, Maglaras L, Derhab A, et al. (2018) Taxonomy of biometric-based authentication schemes for mobile computing devices. 2018 3rd international conference on pattern analysis and intelligent systems (PAIS), 1-8.
    [20] Mahalik H, Tamma R, Bommisetty S (2016) Practical Mobile Forensics. Packt Publishing Ltd.
    [21] Edge C and Trouton R (2020) The evolution of apple device management. Apple Device Management, 1-54.
    [22] Fox-Brewster T (2018) The feds can now (probably) unlock every iphone model in existence.
    [23] Afonin O (2017) New security measures in ios 11 and their forensic implications.
    [24] Lutes KD and Mislan RP (2008) Challenges in mobile phone forensics. Proceeding of the 5th International Conference on Cybernetics and Information Technologies, Systems and Applications (CITSA).
    [25] Castro D and McQuinn A (2016) Unlocking encryption: Information security and the rule of law. Information Technology and Innovation Foundation.
    [26] Bédrune JB and Sigwald J (2011) iphone data protection in depth. Vortrag von der HITB-SecConf.
    [27] Hyrynsalmi S, Koskinen J, Hyrynsalmi SM (2019) A review of ethical discussions on platforms and ecosystems. Proceedings of the Third Seminar on Technology Ethics 2019 2505: 9-19. In: Proceedings of the Third Seminar on Technology Ethics 2019.
    [28] Martin J, Alpuche D, Bodeman K, et al. (2019) Handoff all your privacy-a review of apple's bluetooth low energy continuity protocol. Proceedings on Privacy Enhancing Technologies 2019: 34-53. doi: 10.2478/popets-2019-0057
    [29] Otte SJ (2017) Whether the department of justice should have the authority to compel apple inc. to breach its iphone security measures. U Cin L Rev 85: 877.
    [30] Hack M (2016) The implications of apple's battle with the fbi. Network Security 2016: 8-10.
    [31] Stephan K (2017) Apple versus the feds: How a smartphone stymied the fbi. IEEE Consumer Electronics Magazine 6: 103-104.
    [32] Nellis S and Cadell C (2018) Apple moves to store icloud keys in china, raising human rights fears. Available from: https://www.reuters.com/article/us-china-apple-icloud-insight/apple-moves-to-store-icloud-keys-in-china-raisinghuman-rights-fears-idUSKCN1G8060.
    [33] Lashinsky A (2012) Inside Apple: The secrets behind the past and future success of Steve Jobs's iconic brand. Hachette UK.
    [34] Simao AMDL, Sicoli FC, de Melo LP, et al. (2011) Acquisition of digital evidence in android smartphones. 9th Australian Digital Forensics Conference, 116.
    [35] Lorenzo F, McDonald JT, Andel TR, et al. (2019) Evaluating side channel resilience in iphone 5c unlock scenarios. 2019 SoutheastCon, 1-7.
    [36] Ntantogian C, Apostolopoulos D, Marinakis G, et al. (2014) Evaluating the privacy of android mobile applications under forensic analysis. Comput Secur 42: 66-76. doi: 10.1016/j.cose.2014.01.004
    [37] E. G. Warrants (2019) The great debate. Available from: https://egrove.olemiss.edu/cgi/viewcontent.cgi?article=1000&context=greatdebate.
    [38] Anagnostopoulos L, Zeadally S, Exposito E (2016) Handling big data: research challenges and future directions. The Journal of Supercomputing 72: 1494-1516. doi: 10.1007/s11227-016-1677-z
    [39] Wang X, Shamsi F, Okshtein Y, et al. (2014) Clustering geofence-based alerts for mobile devices. US Patent 8,755,824.
  • Reader Comments
  • © 2020 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(688) PDF downloads(241) Cited by(2)

Article outline

Figures and Tables

Figures(1)  /  Tables(1)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog