SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
Smartphone Forensic




               SungKyong Un
                       ETRI
                  2011.11.24
What is Smartphone Forensic?
■ To get clues and/or evidences from smartphones




       source: Archigraphs@iconarhive   source: samsum.com




                                                             2
Why?




       source: http://www.asymco.com
                                       3
Difference




             4
Difference - Dummy vs. Smart
       Item                Dummy                      Smart
  Target Models          >1,000/Year                 >10/Year
       OS            Symbian, Qualcomm         iOS, Android, Windows
                                                Mobile, BlackberryOS
     Interface             Various                     USB
    Acquisition        Logical, Physical         Logical, Physical,
                                                      Backup
       Data        Phone book, Call history,   + Email, Web History,
                    SMS, Photo, Schedule       Map, Location, SNS,
                                               Message, App, ID/PW
    DB Format              Various                     Sqlite
   3rd Party App               -                    App Market




                                                                       5
Which?




         source: http://www.asymco.com



                                         6
Difference - iOS vs. Android
        Item                   iOS                     Android
 Phone Manufacturer           Apple                Samsung, HTC,
                                                    Motorola, ...
    App Market           iTunes App Store       Android, Amazon, SKT,
                                                  KT, Samsung, ...
      Security        Sandbox, App Screening,   Sandbox, Permission,
                       App Singing, Passcode    App Singing, Pattern
                       Lock, Location Finder,   Screen Lock, Remote
                       Remote Lock, Remote      Wipe, File Encryption
                       Wipe, File Encryption,
                         Encrypted Backup
      Backup                PC, iCloud                    -
 Expansion Storage              No                      Yes
    Multitasking              Limited                   Yes



                                                                        7
Difference - iOS vs. Android




                               8
Difference - iOS vs. Android




                               9
Difference - iOS vs. Android




       source: http://www.androidcentral.com   source:http://http://forums.appleinsider.com/showt
                                                     hread.php?s=&threadid=124611




                                                                                                    10
11
                      Analysis
Tools
        Acquisition
        Acquisition
Analysis - Timeline




                      source: ETRI


                             12
Analysis - Relationship




                          source: ETRI



                                    13
Analysis - Web Browsing




                          source: ETRI
                               14
Analysis - Location




                      source: ETRI
                                15
Analysis - Location




                source: http://radar.oreilly.com/2011/04/apple-location-tracking.html
                                                                                        16
Analysis - App
  Category                                       App

 Phone Call   Skype, Viber, Google Voice, ...

  Message     Cacao Talk, iMessage, Twitter DM, Facebook Message, ...

   SNS        Twitter, Facebook, me2day, ...

  Storage     Dropbox, uCloud, SugarSync, Box.net, iCloud, ...

    Key       DataVault, 1Password, Strip, ...




                                                                        17
Analysis - Communication Network




          source: http://www.i2group.com/documents/video/ANB8_5_US.flv



                                                                         18
Analysis - Social Network




                 source: http://www.youtube.com/watch?v=Q3rhx9MtUro




                                                                      19
Challenge




            source: http://theunderstatement.com
                                                   20
Challenge
■ Apple
   •   425,000 Apps
   •   15B Downloads
■ Google
   •   200,000 Apps
   •   0.5B Downloads

   July, 2011




                        source: http://readwriteweb.com
                                                          21
Architecture



               Backup Files
                                       Analysis Request




                                               Analysis Result

                  SW or
                Web Browser
                                                Presentation


                                USB
                              Connection




                                                                 22

Más contenido relacionado

Destacado

Розслідування Bellingcat щодо збитого на Донбасі МН17
Розслідування Bellingcat щодо збитого на Донбасі МН17Розслідування Bellingcat щодо збитого на Донбасі МН17
Розслідування Bellingcat щодо збитого на Донбасі МН17tsnua
 
Toksikologi forensik smallpox ppt.
Toksikologi forensik smallpox ppt. Toksikologi forensik smallpox ppt.
Toksikologi forensik smallpox ppt. anna maria manullang
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 

Destacado (6)

Digital forensic upload
Digital forensic uploadDigital forensic upload
Digital forensic upload
 
Розслідування Bellingcat щодо збитого на Донбасі МН17
Розслідування Bellingcat щодо збитого на Донбасі МН17Розслідування Bellingcat щодо збитого на Донбасі МН17
Розслідування Bellingcat щодо збитого на Донбасі МН17
 
Toksikologi forensik smallpox ppt.
Toksikologi forensik smallpox ppt. Toksikologi forensik smallpox ppt.
Toksikologi forensik smallpox ppt.
 
Siasatan Forensik
Siasatan ForensikSiasatan Forensik
Siasatan Forensik
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 

Similar a Smartphone forensic

AppTalk Frontline: Web vs Hybrid vs Native
AppTalk Frontline: Web vs Hybrid vs NativeAppTalk Frontline: Web vs Hybrid vs Native
AppTalk Frontline: Web vs Hybrid vs NativeSebastian de Mel
 
Future of Mobile Web Application and Web App Store
Future of Mobile Web Application and Web App StoreFuture of Mobile Web Application and Web App Store
Future of Mobile Web Application and Web App StoreJonathan Jeon
 
Stronger than Chuck Norris: SharePoint in clouds, on earth, in subway and in ...
Stronger than Chuck Norris: SharePoint in clouds, on earth, in subway and in ...Stronger than Chuck Norris: SharePoint in clouds, on earth, in subway and in ...
Stronger than Chuck Norris: SharePoint in clouds, on earth, in subway and in ...Adis Jugo
 
Telecoms 2.0: Understanding the Impact of Open Mobile
Telecoms 2.0: Understanding the Impact of Open MobileTelecoms 2.0: Understanding the Impact of Open Mobile
Telecoms 2.0: Understanding the Impact of Open MobileMobileMonday Norway
 
MTC Spring 2013 - crossplatform woes - robert virkus - 2013-03-13
MTC Spring 2013 -  crossplatform woes - robert virkus - 2013-03-13MTC Spring 2013 -  crossplatform woes - robert virkus - 2013-03-13
MTC Spring 2013 - crossplatform woes - robert virkus - 2013-03-13Enough Software
 
Falsy Values - Warsaw 2011
Falsy Values - Warsaw 2011Falsy Values - Warsaw 2011
Falsy Values - Warsaw 2011Brian LeRoux
 
Smartphone Reporting Done Smarter
Smartphone Reporting Done SmarterSmartphone Reporting Done Smarter
Smartphone Reporting Done SmarterVictor Hernandez
 
Introduction to Android by Demian Neidetcher
Introduction to Android by Demian NeidetcherIntroduction to Android by Demian Neidetcher
Introduction to Android by Demian NeidetcherMatthew McCullough
 
Ugly truths about html5 moosecon - robert virkus - 2013-03-07
Ugly truths about html5   moosecon - robert virkus - 2013-03-07Ugly truths about html5   moosecon - robert virkus - 2013-03-07
Ugly truths about html5 moosecon - robert virkus - 2013-03-07Enough Software
 
API-Centric Rails Web Apps and Hybrid Mobile App Integration
API-Centric Rails Web Apps and Hybrid Mobile App IntegrationAPI-Centric Rails Web Apps and Hybrid Mobile App Integration
API-Centric Rails Web Apps and Hybrid Mobile App IntegrationExist
 
Mobile Development Platforms
Mobile Development PlatformsMobile Development Platforms
Mobile Development PlatformsAndri Yadi
 
Secure Android Apps- nVisium Security
Secure Android Apps- nVisium SecuritySecure Android Apps- nVisium Security
Secure Android Apps- nVisium SecurityJack Mannino
 
mLearnCon 2013 - Developer session, Geoff Stead, Head of Mobile Learning, Qua...
mLearnCon 2013 - Developer session, Geoff Stead, Head of Mobile Learning, Qua...mLearnCon 2013 - Developer session, Geoff Stead, Head of Mobile Learning, Qua...
mLearnCon 2013 - Developer session, Geoff Stead, Head of Mobile Learning, Qua...worklearnmobile
 
Mobile Application Development with WP7 & Others
Mobile Application Development with WP7 & OthersMobile Application Development with WP7 & Others
Mobile Application Development with WP7 & OthersAndri Yadi
 
The Library in Your Pocket: Mobile Trends for Libraries
The Library in Your Pocket: Mobile Trends for LibrariesThe Library in Your Pocket: Mobile Trends for Libraries
The Library in Your Pocket: Mobile Trends for LibrariesMeredith Farkas
 
Day 1 Android: Before Getting Started
Day 1 Android: Before Getting StartedDay 1 Android: Before Getting Started
Day 1 Android: Before Getting StartedAhsanul Karim
 
General Assembly Sydney: Digital Frontiers Workshop
General Assembly Sydney: Digital Frontiers WorkshopGeneral Assembly Sydney: Digital Frontiers Workshop
General Assembly Sydney: Digital Frontiers WorkshopAlex Young
 

Similar a Smartphone forensic (20)

AppTalk Frontline: Web vs Hybrid vs Native
AppTalk Frontline: Web vs Hybrid vs NativeAppTalk Frontline: Web vs Hybrid vs Native
AppTalk Frontline: Web vs Hybrid vs Native
 
Future of Mobile Web Application and Web App Store
Future of Mobile Web Application and Web App StoreFuture of Mobile Web Application and Web App Store
Future of Mobile Web Application and Web App Store
 
Stronger than Chuck Norris: SharePoint in clouds, on earth, in subway and in ...
Stronger than Chuck Norris: SharePoint in clouds, on earth, in subway and in ...Stronger than Chuck Norris: SharePoint in clouds, on earth, in subway and in ...
Stronger than Chuck Norris: SharePoint in clouds, on earth, in subway and in ...
 
Hybrid Apps / iPhoneDevCon 2010
Hybrid Apps / iPhoneDevCon 2010Hybrid Apps / iPhoneDevCon 2010
Hybrid Apps / iPhoneDevCon 2010
 
Introduction to Android
Introduction to AndroidIntroduction to Android
Introduction to Android
 
Telecoms 2.0: Understanding the Impact of Open Mobile
Telecoms 2.0: Understanding the Impact of Open MobileTelecoms 2.0: Understanding the Impact of Open Mobile
Telecoms 2.0: Understanding the Impact of Open Mobile
 
MTC Spring 2013 - crossplatform woes - robert virkus - 2013-03-13
MTC Spring 2013 -  crossplatform woes - robert virkus - 2013-03-13MTC Spring 2013 -  crossplatform woes - robert virkus - 2013-03-13
MTC Spring 2013 - crossplatform woes - robert virkus - 2013-03-13
 
Falsy Values - Warsaw 2011
Falsy Values - Warsaw 2011Falsy Values - Warsaw 2011
Falsy Values - Warsaw 2011
 
Smartphone Reporting Done Smarter
Smartphone Reporting Done SmarterSmartphone Reporting Done Smarter
Smartphone Reporting Done Smarter
 
Introduction to Android by Demian Neidetcher
Introduction to Android by Demian NeidetcherIntroduction to Android by Demian Neidetcher
Introduction to Android by Demian Neidetcher
 
Ugly truths about html5 moosecon - robert virkus - 2013-03-07
Ugly truths about html5   moosecon - robert virkus - 2013-03-07Ugly truths about html5   moosecon - robert virkus - 2013-03-07
Ugly truths about html5 moosecon - robert virkus - 2013-03-07
 
API-Centric Rails Web Apps and Hybrid Mobile App Integration
API-Centric Rails Web Apps and Hybrid Mobile App IntegrationAPI-Centric Rails Web Apps and Hybrid Mobile App Integration
API-Centric Rails Web Apps and Hybrid Mobile App Integration
 
Mobile Development Platforms
Mobile Development PlatformsMobile Development Platforms
Mobile Development Platforms
 
Secure Android Apps- nVisium Security
Secure Android Apps- nVisium SecuritySecure Android Apps- nVisium Security
Secure Android Apps- nVisium Security
 
mLearnCon 2013 - Developer session, Geoff Stead, Head of Mobile Learning, Qua...
mLearnCon 2013 - Developer session, Geoff Stead, Head of Mobile Learning, Qua...mLearnCon 2013 - Developer session, Geoff Stead, Head of Mobile Learning, Qua...
mLearnCon 2013 - Developer session, Geoff Stead, Head of Mobile Learning, Qua...
 
Mobile Application Development with WP7 & Others
Mobile Application Development with WP7 & OthersMobile Application Development with WP7 & Others
Mobile Application Development with WP7 & Others
 
The Library in Your Pocket: Mobile Trends for Libraries
The Library in Your Pocket: Mobile Trends for LibrariesThe Library in Your Pocket: Mobile Trends for Libraries
The Library in Your Pocket: Mobile Trends for Libraries
 
Day 1 Android: Before Getting Started
Day 1 Android: Before Getting StartedDay 1 Android: Before Getting Started
Day 1 Android: Before Getting Started
 
Anuradha_Resume_2016
Anuradha_Resume_2016Anuradha_Resume_2016
Anuradha_Resume_2016
 
General Assembly Sydney: Digital Frontiers Workshop
General Assembly Sydney: Digital Frontiers WorkshopGeneral Assembly Sydney: Digital Frontiers Workshop
General Assembly Sydney: Digital Frontiers Workshop
 

Más de 00heights

Bitcoin 기술분석 - 조남수
Bitcoin 기술분석 - 조남수Bitcoin 기술분석 - 조남수
Bitcoin 기술분석 - 조남수00heights
 
화폐의 이해 - 조복현
화폐의 이해 - 조복현화폐의 이해 - 조복현
화폐의 이해 - 조복현00heights
 
비트코인과 디지털통화 - 이주영
비트코인과 디지털통화 - 이주영비트코인과 디지털통화 - 이주영
비트코인과 디지털통화 - 이주영00heights
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics00heights
 
클라우드 컴퓨팅 보안 이슈 극복을 위한 제언
클라우드 컴퓨팅 보안 이슈 극복을 위한 제언클라우드 컴퓨팅 보안 이슈 극복을 위한 제언
클라우드 컴퓨팅 보안 이슈 극복을 위한 제언00heights
 
IT Trend Information Source
IT Trend Information SourceIT Trend Information Source
IT Trend Information Source00heights
 

Más de 00heights (6)

Bitcoin 기술분석 - 조남수
Bitcoin 기술분석 - 조남수Bitcoin 기술분석 - 조남수
Bitcoin 기술분석 - 조남수
 
화폐의 이해 - 조복현
화폐의 이해 - 조복현화폐의 이해 - 조복현
화폐의 이해 - 조복현
 
비트코인과 디지털통화 - 이주영
비트코인과 디지털통화 - 이주영비트코인과 디지털통화 - 이주영
비트코인과 디지털통화 - 이주영
 
The Future of Digital Forensics
The Future of Digital ForensicsThe Future of Digital Forensics
The Future of Digital Forensics
 
클라우드 컴퓨팅 보안 이슈 극복을 위한 제언
클라우드 컴퓨팅 보안 이슈 극복을 위한 제언클라우드 컴퓨팅 보안 이슈 극복을 위한 제언
클라우드 컴퓨팅 보안 이슈 극복을 위한 제언
 
IT Trend Information Source
IT Trend Information SourceIT Trend Information Source
IT Trend Information Source
 

Último

Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 

Último (20)

Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 

Smartphone forensic

  • 1. Smartphone Forensic SungKyong Un ETRI 2011.11.24
  • 2. What is Smartphone Forensic? ■ To get clues and/or evidences from smartphones source: Archigraphs@iconarhive source: samsum.com 2
  • 3. Why? source: http://www.asymco.com 3
  • 5. Difference - Dummy vs. Smart Item Dummy Smart Target Models >1,000/Year >10/Year OS Symbian, Qualcomm iOS, Android, Windows Mobile, BlackberryOS Interface Various USB Acquisition Logical, Physical Logical, Physical, Backup Data Phone book, Call history, + Email, Web History, SMS, Photo, Schedule Map, Location, SNS, Message, App, ID/PW DB Format Various Sqlite 3rd Party App - App Market 5
  • 6. Which? source: http://www.asymco.com 6
  • 7. Difference - iOS vs. Android Item iOS Android Phone Manufacturer Apple Samsung, HTC, Motorola, ... App Market iTunes App Store Android, Amazon, SKT, KT, Samsung, ... Security Sandbox, App Screening, Sandbox, Permission, App Singing, Passcode App Singing, Pattern Lock, Location Finder, Screen Lock, Remote Remote Lock, Remote Wipe, File Encryption Wipe, File Encryption, Encrypted Backup Backup PC, iCloud - Expansion Storage No Yes Multitasking Limited Yes 7
  • 8. Difference - iOS vs. Android 8
  • 9. Difference - iOS vs. Android 9
  • 10. Difference - iOS vs. Android source: http://www.androidcentral.com source:http://http://forums.appleinsider.com/showt hread.php?s=&threadid=124611 10
  • 11. 11 Analysis Tools Acquisition Acquisition
  • 12. Analysis - Timeline source: ETRI 12
  • 13. Analysis - Relationship source: ETRI 13
  • 14. Analysis - Web Browsing source: ETRI 14
  • 15. Analysis - Location source: ETRI 15
  • 16. Analysis - Location source: http://radar.oreilly.com/2011/04/apple-location-tracking.html 16
  • 17. Analysis - App Category App Phone Call Skype, Viber, Google Voice, ... Message Cacao Talk, iMessage, Twitter DM, Facebook Message, ... SNS Twitter, Facebook, me2day, ... Storage Dropbox, uCloud, SugarSync, Box.net, iCloud, ... Key DataVault, 1Password, Strip, ... 17
  • 18. Analysis - Communication Network source: http://www.i2group.com/documents/video/ANB8_5_US.flv 18
  • 19. Analysis - Social Network source: http://www.youtube.com/watch?v=Q3rhx9MtUro 19
  • 20. Challenge source: http://theunderstatement.com 20
  • 21. Challenge ■ Apple • 425,000 Apps • 15B Downloads ■ Google • 200,000 Apps • 0.5B Downloads July, 2011 source: http://readwriteweb.com 21
  • 22. Architecture Backup Files Analysis Request Analysis Result SW or Web Browser Presentation USB Connection 22