Share This Article:

Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial Tool

Abstract Full-Text HTML XML Download Download as PDF (Size:1774KB) PP. 83-90
DOI: 10.4236/jis.2014.53009    7,321 Downloads   9,663 Views   Citations

ABSTRACT

Smartphone is a very useful and compact device that fits in person’s pocket, but at the same time it can be used as a tool for criminal activities. In this day and age, people increasingly rely on smart phones rather than desktop computers or laptops to exchange messages, share videos and audio messages. A smartphone is almost equivalent in its application to a PC, hence there are security risks associated with its use such as carrying out a digital crime or becoming a victim of one. Criminals can use smartphones for a number of activities. Namely, committing a fraud over e-mail, harassment via text messages, drug trafficking, child pornography, communications related to narcotics, etc. It is a great challenge for forensic experts to extract data from a smartphone for forensic purposes that can be used as evidence in the court of law. In this case study, I show how to obtain the root access of Samsung S3 phone, how to create DD image and then how to examine DD image via commercial tool like UFED physical analyzer trial version which doesn’t support Android devices? I will extract the messages for Viber on trial version of UFED Physical analyzer.

Conflicts of Interest

The authors declare no conflicts of interest.

Cite this paper

Faheem, M. , Le-Khac, N. and Kechadi, T. (2014) Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial Tool. Journal of Information Security, 5, 83-90. doi: 10.4236/jis.2014.53009.

References

[1] Vacca, J.R. (2002) Computer Forensics. Charles River Media, Hingham.
[2] Cohen, M.I. and PyFlag (2008) PyFlag—An Advanced Network Forensic Framework Communication of the ACM. Digital Investigation, 5, S112-S120.
[3] http://www.webopedia.com/TERM/M/mobile_phone_forensics.html
[4] Jansen, W.A. (2007) Guideline on Cell Phone Forensics.
[5] Palo Alto 31st of January 2011. http://www.kantarworldpanel.com/
[6] Available from http://developer.android.com/about/index.html
[7] Available from http://www.android-app-market.com/android-architecture.html

  
comments powered by Disqus

Copyright © 2018 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.