iOS forensics: how can we recover deleted image files with timestamp in a forensically sound manner?

Date

2013

Authors

Ariffin, A.
D'Orazio, C.J.
Choo, K.K.
Slay, J.

Editors

Advisors

Journal Title

Journal ISSN

Volume Title

Type:

Conference paper

Citation

Proceedings: 2013 International Conference on Availability, Reliability and Security: ARES 2013, 2013, pp.375-382

Statement of Responsibility

Conference Name

2013 International Conference on Availability, Reliability and Security ARES 2013 (2 Sep 2013 - 6 Sep 2013 : Regensburg, Germany)

Abstract

iOS devices generally allow users to synch their images (pictures) and video files using iTunes between Apple products (e.g. an iPhone and a MacBook Pro). Recovering deleted images, particularly in a forensically sound manner, from iOS devices can be an expensive and challenging exercise (due to the hierarchical encrypted file system, etc). In this paper, we propose an operational technique that allows digital forensic practitioners to recover deleted image files by referring to iOS journaling file system. Using an iPhone as a case study, we then conduct a forensic analysis to validate our proposed technique.

School/Discipline

Dissertation Note

Provenance

Description

Access Status

Rights

Copyright 2013 IEEE

License

Grant ID

Call number

Persistent link to this record