Zdziarski, 2013 - Google Patents

iOS forensic investigative methods

Zdziarski, 2013

View PDF
Document ID
6991911376321812606
Author
Zdziarski J
Publication year

External Links

Snippet

The iPhone and iPad have quickly become mobile market leaders in the United States and other countries, finding their way into the corporate world and the everyday lives of millions of end users. Their wide range of functionality, combined with a mobile,“always on” design …
Continue reading at www.zdziarski.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/30144Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security

Similar Documents

Publication Publication Date Title
Zdziarski iPhone forensics: recovering evidence, personal data, and corporate assets
Cahyani et al. Forensic data acquisition from cloud‐of‐things devices: windows Smartphones as a case study
Quick et al. Cloud storage forensics
Hoog et al. iPhone and iOS forensics: Investigation, analysis and mobile security for Apple iPhone, iPad and iOS devices
Barmpatsalou et al. A critical review of 7 years of Mobile Device Forensics
Bommisetty et al. Practical mobile forensics
Mahalik et al. Practical mobile forensics
Federici Cloud data imager: A unified answer to remote acquisition of cloud storage areas
Tamma et al. Learning android forensics
Tamma et al. Practical Mobile Forensics: Forensically investigate and analyze iOS, Android, and Windows 10 devices
Grispos et al. Recovering residual forensic data from smartphone interactions with cloud storage providers
US9614826B1 (en) Sensitive data protection
Epifani et al. Learning iOS forensics
US11513812B2 (en) Targeted data extraction system and method
Nolan et al. First responders guide to computer forensics
Tso et al. iPhone social networking for evidence investigations using iTunes forensics
Skulkin et al. Learning Android Forensics: Analyze Android devices with the latest forensic tools and techniques
Pessolano et al. Forensic analysis of the nintendo 3ds nand
Tahiri Mastering mobile forensics
Dorai et al. Vide-vault app identification and extraction system for iOS devices
Zdziarski iOS forensic investigative methods
Abalenkovs et al. Mobile forensics: Comparison of extraction and analyzing methods of ios and android
Eterovic‐Soric et al. Windows 7 antiforensics: a review and a novel approach
Moreb Introduction to ios forensics
Sengupta et al. A platform independent and forensically sound method to extract WhatsApp data from mobile phones