Research of Electronic Forensics Model and Key Technology for Intelligent Terminal

Article Preview

Abstract:

The present study about forensics technology intelligent of electronic terminal is mainly in utility demand, and there are many shortcomings in the point of view of forensics mode, evidence standard, forensics technology comprehensive etc.. This article conducts the research from the legal standard, technical standard, technical model, key technology and other aspects of the intelligent terminal of electronic forensics. Firstly , the characteristics and requirements of the intelligent terminal in electronic evidence are analyzed, the status of the domestic and foreign research about intelligent forensic is also analyzed. Then the electronic forensics model of intelligent terminal is proposed in terms of legal standards, technical standards, technical model, key technologies, and in the model as a guide, the related technologies of electronic evidence extraction, evidence analysis, evidence preservation, and other in the intelligent terminal are studied. Forensic Model and related techniques are proposed in this paper have important theoretical and application value for the Judiciary to electronic forensics in intelligent terminal.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

8-13

Citation:

Online since:

February 2015

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Yaowei,Shajin,Android Evidence of intelligent mobile phone [J], Chinese judicial identification, 2012 (1), 45-19.

Google Scholar

[2] Daiji-ming. Research on mobile phone and obtain electronic evidence Forensics [J]. 2007,141(5): 100-102.

Google Scholar

[3] Wayne Jansen. Guidelines on Cell Phone Forensic. http: /csrc, nist. gov/publications/nistpubs/800-72/sp800-72, pdf . (2006).

Google Scholar

[4] Alessandro Distefano A, Gianluigi Mea, Francesco Pace B. Android anti-forensics through a local paradigm. Rome, Digital Investiation, (2010).

DOI: 10.1016/j.diin.2010.05.011

Google Scholar

[5] brahim M Baggili, Richard Mislan, Marcus Rogers. Mobile phone forensics tool testing: a database driven approach. International Journal of Digital Evidence Fall 2007, 6 (2).

Google Scholar

[6] longbo, shiyonghao. iPhoneResearch on mobile phone and obtain electronic evidence Forensics [J]. Police Technology 2010, 9.

Google Scholar

[7] Claud Xiao. Android Adb setuid Right vulnerability analysis. http: /blog. claudxiao. net/2011/04/android-adb-setuid/, 2011-04-07.

Google Scholar

[8] Claud Xiao. Android Mentioning the right code zergRush analysis. http: /blog. claudxiao. net/2011/10/zergrush/, 2011-10-20.

Google Scholar

[9] Songjie, Dang-licheng, Security analysis and Application Research on mobile phone platform Android OS [J]. Computer technology and development, 2010, (06): 152-155.

Google Scholar

[10] Hu-yongjian, Liu-feibei. Summary of multimedia technology in digital [J]. Computer application, 2010, 30(3): 657-662.

Google Scholar

[11] Huang-qinhua, ouyangweimian. Mobile phone and handset overview of digital equipment of Digital Forensics Research [J]. Computer engineering and Application, 2009, 45(18): 83-84.

Google Scholar