{"title":"获取移动设备的挑战,同时尽量减少可用取证数据的损失","authors":"Lazaro A. Herrera","doi":"10.1109/ISDFS49300.2020.9116458","DOIUrl":null,"url":null,"abstract":"The move from computers to mobile devices has placed forensic professionals in a tough spot when performing analysis of seized hardware. Forensics specialists must contend with hardware that is designed to be secure as it is highly mobile, is capable of receiving commands from a suspect after it has been seized which could include commands that are capable of destroying evidence remotely, obsolescence of certain forensics methods such as deleted file recovery from block storage while having to purchase expensive software and hardware packages to extract any usable data.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Challenges of acquiring mobile devices while minimizing the loss of usable forensics data\",\"authors\":\"Lazaro A. Herrera\",\"doi\":\"10.1109/ISDFS49300.2020.9116458\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The move from computers to mobile devices has placed forensic professionals in a tough spot when performing analysis of seized hardware. Forensics specialists must contend with hardware that is designed to be secure as it is highly mobile, is capable of receiving commands from a suspect after it has been seized which could include commands that are capable of destroying evidence remotely, obsolescence of certain forensics methods such as deleted file recovery from block storage while having to purchase expensive software and hardware packages to extract any usable data.\",\"PeriodicalId\":221494,\"journal\":{\"name\":\"2020 8th International Symposium on Digital Forensics and Security (ISDFS)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 8th International Symposium on Digital Forensics and Security (ISDFS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISDFS49300.2020.9116458\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS49300.2020.9116458","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Challenges of acquiring mobile devices while minimizing the loss of usable forensics data
The move from computers to mobile devices has placed forensic professionals in a tough spot when performing analysis of seized hardware. Forensics specialists must contend with hardware that is designed to be secure as it is highly mobile, is capable of receiving commands from a suspect after it has been seized which could include commands that are capable of destroying evidence remotely, obsolescence of certain forensics methods such as deleted file recovery from block storage while having to purchase expensive software and hardware packages to extract any usable data.