Practical Investigations of Digital Forensics Tools for Mobile Devices
|
|
|
- Katherine Park
- 10 years ago
- Views:
Transcription
1 Practical Investigations of Digital Forensics Tools for Mobile Devices Maynard Yates II, M.S. Florida Agricultural and Mechanical University Department of Computer and Information Sciences Technical Building A, Room 211 Tallahassee, FL ABSTRACT With the continued growth of the mobile device market, the possibility of their use in criminal activity will only continue to increase. While the mobile device market provides a great variety of manufactures and models causing a strong diversity. It becomes difficult for a professional investigator to choose the proper forensics tools for seizing internal data from mobile devices. Through this paper, we will give a comprehensive perspective of each popular digital forensic tool and offer an inside view for investigators to choose their free sources or commercial tools. In addition, a summary for the future direction for forensics tools in mobile devices. Categories and Subject Descriptors K.4.1. [Computers and Society]: Public Policy Issues - abuse and crime involving computers; D.4.6 [Operating Systems]: Security and Protection--Access controls General Terms Management and Security, Legal Aspects, Verification. Keywords Digital forensics, handheld devices, mobile devices, forensics tools, Paraben CSI stick, cell Seizure, XRY 1. INTRODUCTION Advancements in technology over the last 20 years have drastically altered the way we live and do business. The continued evolution and development of mobile device technology will increase the need for security protocols and forensics of these devices. Technology has permeated almost every aspect of society from the way we communicate to the way information is discovered about a particular subject. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. InfoSecCD 10, October 1-2, 2010, Kennesaw, GA, USA. Copyright 2010 ACM /10/10 $ A few examples of these changes are: Correspondence: Postal mail Electronic mail ( ) SMS messages (text messages) Telecommunications: Telephones car powered cell phones battery powered cell phones Calendar: Secretary Day Planner Personal Data Assistant (PDA) Smartphone As technology continues to permeate society and mobile computing becomes more prevalent, people will more heavily depend on applications such as , SMS (Short Message Service), MMS (Multimedia Messaging Service) and online transactions (i.e. bank, ins, etc); such devices provide a good source of evidence for forensic investigators to prove or disprove the commitment of crimes or location of suspects/victims [6]. Digital forensics for handheld devices is starting now. Unlike traditional computers, two important factors that must be accounted for in a forensic investigation are the state of the device at the time of acquisition and radio isolation. Traditional digital forensics with personal computers allows an investigator to perform a dead forensic data acquisition simply by disconnecting the power source to preserve the current state of the computer. That option is not available with mobile forensics for fear of loss of evidence or security mechanisms, such as device locks or passwords, being activated [15]. The fact that various operating systems are used for different mobile devices in current markets makes development of digital forensics tools for mobile devices more complicated. This paper is being proposed to survey available digital forensics tools for capturing e-evidence from mobile devices and meet the demand of e-evidence for current and future s crimes. This paper focuses on practical investigations for digital forensics tools that will help investigators or students obtain first-hand experiences in digital forensics for mobile devices. Investigators should be able to perform their job more informed as a result of this case study. This paper is organized as follows: section 2 will discuss the popular operating systems for mobile devices, while section 3 will discuss tools available for forensics of mobile devices. Section 4 will discuss related work; section 5 will discuss how this case study will be carried out, followed by conclusion in section
2 2. OPERATING SYSTEMS Compatibility with a tool is based upon the mobile device s operating system, but how to determine compatibility with rapidly developing technology is a challenge. There are open-source operating systems as well as proprietary, each with own unique features. This paper will examine four of the most popular mobile device operating systems. 2.1 Android Android OS [3] relies on the Linux 2.6 kernel, which acts as an abstraction layer between the hardware and the rest of the hardware stack. The Linux kernel provides access to core services such as security, memory management, process management, network stack, and driver model. It also provides support for the Dalvik virtual machine s functionality, such as threading and low-level memory management. Libraries are the next layer up, and are divided into the Android Runtime library and application libraries. Written in JAVA, the Android Runtime Libraries consists of the Dalvik Virtual Machine (VM) and the core libraries that provide the available functionality for the applications. Each time an Android application is launched, it runs as a separate process and instance of the VM. Android can run multiple instances of the VM efficiently. Other components of the Android OS use C/C++ libraries such as: System C library - a BSD-derived implementation of the standard C system library (libc), tuned for embedded Linux-based devices Media Libraries - based on PacketVideo's OpenCORE; the libraries support playback and recording of many popular audio and video formats, as well as static image files, including MPEG4, H.264, MP3, AAC, AMR, JPG, and PNG Surface Manager - manages access to the display subsystem and seamlessly composites 2D and 3D graphic layers from multiple applications LibWebCore - a modern web browser engine which powers both the Android browser and an embeddable web view SGL - the underlying 2D graphics engine 3D libraries - an implementation based on OpenGL ES 1.0 APIs; the libraries use either hardware 3D acceleration (where available) or the included, highly optimized 3D software rasterizer FreeType - bitmap and vector font rendering SQLite - a powerful and lightweight relational database engine available to all applications The Applications Framework layer builds on the advantages that the Android operating system is open source and open platform. This framework was designed to simplify the reuse of components as developers are given full access to the same framework APIs used by core applications. Any application can publish its capabilities and any other application may then make use of those capabilities (subject to security constraints enforced by the framework). Listed below are the core set of services and systems that support open development: A rich and extensible set of Views that can be used to build an application, including lists, grids, text boxes, buttons, and even an embeddable web browser Content Providers that enable applications to access data from other applications (such as Contacts), or to share their own data A Resource Manager, providing access to non-code resources such as localized strings, graphics, and layout files A Notification Manager that enables all applications to display custom alerts in the status bar An Activity Manager that manages the lifecycle of applications and provides a common navigation backstack The top layer, Applications, consists of client, SMS program, calendar, maps, browser, contacts, and other JAVA applications as depicted by Figure 1. Figure 1 Android OS Model 2.2 iphone The iphone operating system derives from Mac OS X desktop operating system with the 3 base layers being ported over from the OS X architecture to the iphone OS. iphone OS [4] is a UNIX based operating system by virtue of sharing the Darwin Foundation from OS X. The iphone OS has four layers: the core OS, core services, media, and Cocoa Touch, a variation of OS X Cocoa layer with added multi-touch functionality for the iphone, depicted by Figure 2. The bottom two layers, Core OS and Core Services, contain the fundamental interfaces for iphone OS, including those used for accessing files, low-level data types, network sockets, as well as access to POSIX and UNIX sockets among others. 157
3 Figure 2 Architecture of iphone OS The next layer, Media, contains the fundamental technologies used to support 2D and 3D drawing, audio, and video such as Open GL, Quick Time, an audio & image viewer, Core Audio and Video. The top layer, Cocoa Touch, provides the fundamental infrastructure used by iphone OS. Figure 3shows that the Cocoa Touch layer has been divided into an application and application framework layers. Figure 3 Blackberry OS Model The hardware level is accessed through the RIM JVM through standard JavaME and Mobile Data Service (MDS) applications. There are 2 runtime environments in the operating system: Proprietary and MDS. The proprietary runtime environment contains the main RIM APIs (memo, calendar, Bluetooth, etc.) as well as the JAVA applications that contain profiles, configurations and optional packages for specific functionality, and services such as the Blackberry Desktop Manager. Mobile Data Service (MDS) focuses mainly on web and enterprise services. MDS is the runtime container for processing pushed data, such as as depicted below in Figure 5. Figure 2: iphone OS in-depth Two major components of Cocoa Touch are the Foundation framework in the Core services layer and the UIKit in the Application Frameworks division of the Cocoa Touch layer. The Foundation framework provides support for file management, network operations, collections, and more. The UIKit framework provides the visual infrastructure for your application, including classes for windows, views, controls, and the controllers that manage those objects. However, there are other frameworks available at this level that gives you access to user s contact and photo information and other features of hardware for an iphone. 2.3 Blackberry Canadian company, Research in Motion (RIM), created the Blackberry phone that was originally geared towards business professionals as a way to stay connected while traveling. The Blackberry OS [9] that powers Blackberry phones is a proprietary system, with little information about it publicly. What is known, as depicted by Figure 4, is that like the Android, the Blackberry runs through a JAVA virtual machine. Figure 4 MDS Transport Diagram 2.4 Windows Mobile Conceptually similar to the iphone OS, Windows Mobile [11] is a Windows OS for mobile devices. They are structured similarly, with some of the same protocols in regards to user info and activities such as registry entries, files, and web activities (web browsing, recently connected computers, Wi-Fi access points), but there are substantial differences that distinguish Windows Mobile from Windows OS. While Windows has 2 diff types of file systems, NTFS & FAT, Windows Mobile uses a variation of the FAT file system called Transaction-Safe FAT, which has some recovery features in the event of sudden shutdown. There are currently four different family types of processor cores in Windows Mobile, ARM (most common), MIPS, and SH4 and x86. There are 2 different types of flash memory, NOR and NAND. NOR has a RAM-like interface; it has a data bus, an address bus and control lines. NOR flash is mapped in the processor s memory map and processor code can be executed directly from it (this is called execute in place ; XIP). NOR flash can also be used as storage location for user data. NAND flash can be regarded as the solid state equivalent of a hard disk. It has an interface with an I/O bus and control lines connecting the 158
4 memory chip to the processor. Over this I/O bus, commands, addresses and data are sent. As NAND flash memory is not mapped in the memory space of the processor, code stored in a NAND flash chip cannot be executed directly, but has to be loaded into RAM first, again much like a hard disk. [12] 2.5 Symbian The Symbian system [10] architecture has three layers, but each layer contains packages, which consist of collections of components as depicted by Figure 6. Layers contain packages with no static upward dependencies between layers. A package may depend on other packages in the same layer or in any lower layer. Packages are modular collections of components, owned and maintained by a single organization (although contributed to more widely). Component collections are used to organize the components within a package. All components are aggregated into component collections. A collection should be formed even if there is a single collection in the package. Components contain the files needed to build and test at least one target file. Components implement programming interfaces. The Middleware layer provides APIs that are typically useful for multiple programs in the application layer. A middleware layer component is independent of the hardware platform and its APIs are not used by the operating system (OS) layer. It provides access to services, such as messaging, multimedia, and web & IP services. The OS layer abstracts the hardware platform and contains lowerlevel APIs that are used within the OS layer. This layer defines plug-in interfaces (HAIs) for components that implement hardware adaptations. The OS layer device driver framework includes the API that is available to kernel-mode software (which mostly consists of device drivers). 3. DIGITAL FORENSICS TOOLS The convenience of mobile computing has become frustrating for the forensic community because it is harder to build tools that can be considered industry standard. Unlike computers, technologies for mobile devices are constantly advancing faster than any other technology. Device are advancing so quickly, that development for tools are not able to keep up because there are some drastic differences between forensics of computers and mobile devices as describe in the table below 3.1 Digital Forensics tools for Computers Forensics for computers is easier and less complex in comparison to mobile devices. Computers have two types of memory: Random Access Memory (RAM), or secondary or volatile memory, and Read Only Memory (ROM), or primary memory. A mobile device only has one, RAM, unless a SIM card is present then the SIM card functions as ROM. The most popular operating systems for personal computers are: Windows, Mac, and UNIX, but there is a variety of manufacturers that produce mobile devices: RIM, Apple, Symbian, Palm, etc. just to name a few. Table 1 shows some of the differences [6]: Table 1 Forensics of Computers versus Forensics of Mobile Devices Figure 5 Decomposition Hierarchy for the Symbian OS The 3 layers of the Symbian OS device platform: Application Middleware OS The Application layer primarily implements interactive UI applications, such as the organizer application suite, multimedia applications, network applications, device settings, etc. Many of the applications provide interfaces to allow their functionality to be accessed by another application program, or to support extensibility or customization. Issues Forensics of Computers Forensics of Handheld Devices On/off dilemma Less problematic More problematic Evidence volatility Lower Higher Imaging process Less tricky More tricky Size of evidence Larger Smaller Technological development Slower Faster Operating systems Less problematic More problematic Training Clear Unclear Forensic tools More proprietary tools More open source tools 159
5 3.2 FTK Mobile Phone Examiner FTK Mobile Phone Examiner (MPE) [2] is the most commonly used forensic tool for mobile devices in the US, a distinction shared with Guidance s Encase Forensic suite. Mobile Phone Examiner can be used as a standalone application or as a fully integrated part of Forensic Toolkit (FTK) interface. Using MPE affords the investigator the option of a quick and easy field acquisition via cable, Infrared, or Bluetooth connection without altering data on the device, which is essential in establishing court admissible evidence. When integrated with FTK, MPE can take advantage of leading technology validated by courts and organizations such as Securities & Exchange Commission (SEC), Federal Bureau of Investigations (FBI), and the Internal Revenue Service (IRS) just to name a few. This integration would allow MPE to perform forensic analysis on multiple phones simultaneously within the same FTK interface as well as manipulate that data for easy interpretation. Reports produced by the integrated suite, which are instantly ready to be used as evidence in court, include both phone and computer analysis which allows an investigator to easily correlate data from a mobile phone to evidentiary data from a computer or another phone. 3.3 Oxygen Forensic Suite Oxygen Forensic Suite [7] is the tool of choice for many agencies in Europe, serving law enforcement, tax and customs, government authorities in Great Britain, Germany, Australia, Sweden, and Finland among others. Oxygen prides itself on its reputation of being able to extract unique information from a smartphone such as phone basic information and SIM-card data, contacts list, caller groups, speed dials, missed/outgoing/incoming calls, standard SMS/MMS/ folders, custom SMS/MMS/ folders, calendar events schedule, tasks, and text notes. However the features are not truly unique as all three tools can extract this information. However Oxygen s ability to tap into the LifeBlog and geotagging in Symbian OS in nokia phones gives it an advantage over its competition. Unlike MPE or Device Seizure, a special agent application is used to perform forensic analysis combining the advantages of both logical and physical data acquisitions. 3.4 EnCase Neutrino Guidance Software has become an industry leader on the strength of its product EnCase Forensic software, aside from AccessData s Forensic ToolKit (FTK), and has over 30,000 licensed users of EnCase. Its customer base includes more than 100 of the Fortune 500 and over half of the top 50, including: Allstate, Chevron, Ford, General Electric, Honeywell, Mattel, Northrop Grumman, Pfizer, UnitedHealth Group, Viacom and Wachovia. As a complement to their award winning, industry leading forensic solution, EnCase Neutrino [5] is designed to provide the same technology and foundation for forensic investigations for mobile devices. Amidst all the wireless signal blocking technologies, EnCase boasts a claim that the WaveShield technology used in EnCase Neutrino is the only extensively tested technology, including within close proximity of cell towers, to ensure integrity of evidence and reliability for field acquisitions. When performing data acquisition, a phone wizard is launched that identifies the device and determines the correct USB cable for a forensically sound acquisition. Unlike other tools, data acquisition and analysis starts with the device s SIM, if present, and then continues to the device. Neutrino s ability to obtain the device s serial number, cell tower location, manufacturer information among other information, shows why it is considered the de facto standard for forensic solutions. 3.5 Paraben s Device Seizure Device Seizure has low minimum system requirements so it can run on any computer, new, old, or ancient. It can also add support and perform forensic analysis on unsupported phones if they come from supported manufacturers. Similar to MPE, but unlike Oxygen, Paraben s device seizure [8] can search through a phone s memory dump for crucial evidence. Device Seizure focuses on the physical level of acquisition because you can acquire more information with physical acquisition than logical. 3.6 Other Tools There is many other free source or commercial tools that are available for use in forensic investigations such as: Palm dd (pdd) [16], which is a spin off the UNIX dd, is a windows based command-line tool that allows an investigator to complete a physical data acquisition from Palm OS handhelds. PDD creates two files; one file has device specific information and the other file contains the bit by bit image. These files can then be exported to different forensic tools, such as EnCase or Autopsy. However since this is a command-line tool, graphic libraries, report generation, and search facilities are not included in these files. Pilot-Link [16] can be used to retrieve an image of the RAM of a PDA device. Pilot Link is open source software developed within the Linux community to provide a communication bridge between a Linux host and Palm OS digital devices. It uses the HotSync protocol which allows Pilot-Link to logically acquire the devices contents that can then be analyzed by EnCase, HEX editor, or Palm OS Emulator. Unfortunately, it doesn t support hashing algorithms, making it harder to compare acquisitions for data integrity. TULP2G is short for Telefoon Uitlees Programma, 2e Generatie and used to recover evidence from handheld devices Currently, available plug-ins are mainly targeted towards GSM phone examinations 160
6 4. RELATED WORK Forensic tools for handheld devices are relatively fewer than those available for personal computers, and of those available, their application is generally limited to the popular operating systems Palm and Pocket PC [6]. Most previous publications [11, 12] are concentrated on forensics concerns either a particular operating system (i.e. Symbian, ipod, PDA) or a comprehensive analysis of most smartphone features and performance. This paper [12] introduces the forensic application of freely available tools and describes how known methods of Physical Acquisition can be applied to Windows CE devices. Casey et al [12] provided an overview of Windows Mobile Forensics, describing various methods of acquiring and examining data on Windows Mobile devices. Mislan wrote a similar paper [15] concerning Blackberry and iphone forensics. NIST has an excellent paper on PDA Forensics Tools that discusses the different procedures and techniques when performing Mobile forensics [14]. However, there lacks an overview research paper that does a comprehensive study of forensics tools for mobile devices within more operating systems or from the perspective of a digital forensics investigator. This overview will lay out the foundation of digital forensic tools for mobile devices as we endeavor to provide an avenue for discussion regarding mobile forensics. 5. PROPOSED WORK There are many free sources and commercial digital forensics tools for mobile devices. However, there are few comparisons and benchmarks are available to guide investigator or students to choose those tools for their practical needs. The section will address those issues. During the experimentation of this case study, we will use SIMfill [14], a tool created by the National Institute of Standards and Technology (NIST), to automatically generate the test data for this case study which will then be placed on each mobile device via USB cable connection. After the data has been transferred to each device, each forensic tool will perform a forensic data acquisition and the data acquired documented. This process will be repeated two more times to ensure consistency and accuracy of the data being acquired and to satisfy the Federal Rules of Evidence [1]. Once the process is complete, we will compare the results based upon the following: Time it takes to acquire data The type of data acquired against the test set Categorically o By device model o By forensics tool How admissible is it as evidence Inconsistencies with the forensic tool and with the particular carrier (Verizon, AT&T, Sprint, etc.) of the phone will be recorded and how the results were affected by the inconsistencies. Through this exploratory experimentation, we will be able to give substantial detail to back up a claim of which investigation tool is optimal for various mobile devices. In addition, we will build a set of benchmarks for robust comparisons of all digital tools for mobile/handheld devices in different operating system environments. 6. CONCLUSIONS With the increase in research and practical use towards mobile devices, we hope to not just follow the trend but to supply investigators/practitioners a more interactive, convenient, efficient way of capturing e-evidences via choosing reliable and suitable digital forensics tools. We make the set of benchmarks available for any researcher who wants to compare the new tools with other tools for different operating systems. In the future we hope to include more tools and create more benchmarks that exploit the features of many different handheld devices and concur with the design variations we want. In addition, we will improve on existing benchmarks and continuously retrieve various feedback to make benchmarks more effective and easy to use. Future research will be conducted to formalize the abstract design discussed in this paper that will eventually lead to implementation and testing. ACKNOWLEDGMENTS This work has been supported in part by U.S. Department of Education grant P120A REFERENCES [1] AccessData Corporation. (n.d.). The Rules of Digital Evidence and AccessData Technology. Retrieved May 10, 2010, from AccessData Corporation: [2] AccessData. (n.d.). Mobile Phone Examiner. Retrieved May 15, 2010, from AccessData: [3] Android Inc. (n.d.). What is Android Android Developers. Retrieved May 23, 2010, from Android Developers: [4] Apple Inc. (n.d.). iphone Technologies Overview. Retrieved May 22, 2010, from iphone Reference Library: scellaneous/conceptual/iphoneostechoverview/iphoneos Technologies/iPhoneOSTechnologies.html#//apple_ref/doc/u id/tp ch3-sw1 [5] Guidance Software. (n.d.). EnCase Neutrino. Retrieved May 28, 2010, from Guidance Software: 161
7 &Product_S=AccordianTwo&menu_id=117&id=348&terms =mobile+devices [6] Lim, N., & Khoo, A. (2009, June). Forensics of Computers and Handheld Devices: Identical or Fraternal Twins? Communications of the ACM, pp [7] Oxygen Forensic. (n.d.). Oxygen Forensic Suite Retrieved May 15, 2010, from Oxygen Forensic: [8] Paraben Corporation. (n.d.). Device Seizure. Retrieved May 29, 2010, from Paraben Corporation [9] Schiffman, J. (2010). Blackberry OS Report 2. Retrieved May 24, 2010, from [10] Symbian Foundation. (n.d.). Symbian Software Model. Retrieved May 23, 2010, from Symbian Developer Community: m_model [11] Casey, E., Bann, M., & Doyle, J. (n.d.). Introduction to Windows Mobile Forensics. Digital Investigation Volume 6, Issues 3-4, Pages , May 2010 [12] Klaver, C. (2010). Windows Mobile Advanced Forensics. Digital Investigation, Volume 6, Issues 3-4, Pages , May 2010, [13] Rick Ayers, Wayne Jansen, Nicolas Cilleros, and Ronan Daniellou. (October 2007). retrieved from Cell Phone Forensic Tools: An Overview and Analysis. National Institute of Standards and Technology [14] Wayne Janson and Aurélien Delaitre, Mobile Forensic Reference Materials: A Methodology and Reification, National Institute of Standards and Technology, [15] Mislan, R. (2008). Mobile Device Analysis. Small Scale Digital Device Forensics Journal. [16] Sansurooah, K. (2007). An overview and examination of digital PDA devices under forensics toolkits. Prodeedings of the 5th Australian Digital Forensics Conference (pp ). Perth, Western Australia: School of Computer and Information Science, Edith Cowan University. 162
Lecture 1 Introduction to Android
These slides are by Dr. Jaerock Kwon at. The original URL is http://kettering.jrkwon.com/sites/default/files/2011-2/ce-491/lecture/alecture-01.pdf so please use that instead of pointing to this local copy
Creating and Using Databases for Android Applications
Creating and Using Databases for Android Applications Sunguk Lee * 1 Research Institute of Industrial Science and Technology Pohang, Korea [email protected] *Correspondent Author: Sunguk Lee* ([email protected])
Mobile Phones Operating Systems
Mobile Phones Operating Systems José Costa Software for Embedded Systems Departamento de Engenharia Informática (DEI) Instituto Superior Técnico 2015-05-28 José Costa (DEI/IST) Mobile Phones Operating
Introduction to Android
Introduction to Android Poll How many have an Android phone? How many have downloaded & installed the Android SDK? How many have developed an Android application? How many have deployed an Android application
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Mobile Operating Systems. Week I
Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone
Overview of CS 282 & Android
Overview of CS 282 & Android Douglas C. Schmidt [email protected] www.dre.vanderbilt.edu/~schmidt Institute for Software Integrated Systems Vanderbilt University Nashville, Tennessee, USA CS 282
Application of Android OS as Real-time Control Platform**
AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 2 http://dx.doi.org/10.7494/automat.2013.17.2.197 Krzysztof Ko³ek* Application of Android OS as Real-time Control Platform** 1. Introduction An android operating
Android Architecture. Alexandra Harrison & Jake Saxton
Android Architecture Alexandra Harrison & Jake Saxton Overview History of Android Architecture Five Layers Linux Kernel Android Runtime Libraries Application Framework Applications Summary History 2003
Reminders. Lab opens from today. Many students want to use the extra I/O pins on
Reminders Lab opens from today Wednesday 4:00-5:30pm, Friday 1:00-2:30pm Location: MK228 Each student checks out one sensor mote for your Lab 1 The TA will be there to help your lab work Many students
Developing Applications for ios
Developing Applications for ios Lecture 1: Mobile Applications Development Radu Ionescu [email protected] Faculty of Mathematics and Computer Science University of Bucharest Content Key concepts
CS378 -Mobile Computing. Android Overview and Android Development Environment
CS378 -Mobile Computing Android Overview and Android Development Environment What is Android? A software stack for mobile devices that includes An operating system Middleware Key Applications Uses Linux
Mobile Operating Systems Lesson 03 PalmOS Part 1
Mobile Operating Systems Lesson 03 PalmOS Part 1 Oxford University Press 2007. All rights reserved. 1 PalmOS An OS for handheld devices Designed for highly efficient running of small productivity programs
ANDROID OPERATING SYSTEM
ANDROID OPERATING SYSTEM Himanshi Grover,Devesh Agrawal IT Department, Dronacharya College Of Engg Gurgaon,Haryana,India Abstract - Android has become need rather than luxury these days. The computing
Design and Implementation of Forensic System in Android Smart Phone
Design and Implementation of Forensic System in Android Smart Phone Xinfang Lee 1, Chunghuang Yang 1 2, Shihj en Chen, Jainshing Wu 2 1 Graduate Institute of Information and computer Education National
Development. SriSeshaa Technologies. Table of Contents
SriSeshaa Technologies Development Table of Contents SriSeshaa Android Development... 2 Introduction to Android... 3 SriSeshaa Capabilities... 3 SriSeshaa Android Case Studies... 5 Privacy Guard... 5 Backup
Chapter 8 Objectives. Chapter 8 Operating Systems and Utility Programs. Operating Systems. Operating Systems. Operating Systems.
Chapter 8 Objectives Chapter 8 s and Utility Programs Describe the two types of software Understand the startup process for a personal computer Describe the term user interface Explain features common
Remote Desktop on Mobile
Remote Desktop on Mobile SonamGavhane RasikaPhanse Monica Sadafule B.W.Balkhande Abstract In This paper we will see how the remote Desktop with static IP can be accessed using Android based mobile phones,to
GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS
Embedded Systems White Paper GETTING STARTED WITH ANDROID DEVELOPMENT FOR EMBEDDED SYSTEMS September 2009 ABSTRACT Android is an open source platform built by Google that includes an operating system,
Chapter 5: System Software: Operating Systems and Utility Programs
Understanding Computers Today and Tomorrow 12 th Edition Chapter 5: System Software: Operating Systems and Utility Programs Learning Objectives Understand the difference between system software and application
Android Operating System
Prajakta S.Adsule Student-M.B.A.[I.T.] BharatiVidyapeeth Deemed University,Pune(india) [email protected] Mob. No. 9850685985 Android Operating System Abstract- Android operating system is one
Discovering Computers
Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet Chapter 9 Operating Systems Objectives Overview Define an operating system Describe the start-up process and shutdown
ECWM511 MOBILE APPLICATION DEVELOPMENT Lecture 1: Introduction to Android
Why Android? ECWM511 MOBILE APPLICATION DEVELOPMENT Lecture 1: Introduction to Android Dr Dimitris C. Dracopoulos A truly open, free development platform based on Linux and open source A component-based
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY
ANDROID BASED MOBILE APPLICATION DEVELOPMENT and its SECURITY Suhas Holla #1, Mahima M Katti #2 # Department of Information Science & Engg, R V College of Engineering Bangalore, India Abstract In the advancing
Cell Phone Operating Systems
Cell Phone Operating Systems The first smartphone was the IBM Simon and was designed in 1992. The phone themselves have changed. The most important changes are in the Operating System (OS) Operating Systems
Mobility Introduction Android. Duration 16 Working days Start Date 1 st Oct 2013
Mobility Introduction Android Duration 16 Working days Start Date 1 st Oct 2013 Day 1 1. Introduction to Mobility 1.1. Mobility Paradigm 1.2. Desktop to Mobile 1.3. Evolution of the Mobile 1.4. Smart phone
Data Synchronization in Mobile Computing Systems Lesson 06 Synchronization Software HotSync, ActiveSync and Intellisync
Data Synchronization in Mobile Computing Systems Lesson 06 Synchronization Software HotSync, ActiveSync and Intellisync Oxford University Press 2007. All rights reserved. 1 Synchronization software A synchronizer
Programming the Android Platform. Logistics
Programming the Android Platform CMSC498G Logistics Professor Adam Porter 4125 AVW [email protected] Course meets W 3:00 3:50 in CSI 3118 1 Goals Learn more about Mobile devices Mobile device programming
Mobile Operating Systems Lesson 07 Symbian OS
Mobile Operating Systems Lesson 07 Symbian OS Oxford University Press 2007. All rights reserved. 1 Oxford University Press 2007. All rights reserved. 2 Symbian OS multi-modal communication support OS for
Università Degli Studi di Parma. Distributed Systems Group. Android Development. Lecture 1 Android SDK & Development Environment. Marco Picone - 2012
Android Development Lecture 1 Android SDK & Development Environment Università Degli Studi di Parma Lecture Summary - 2 The Android Platform Android Environment Setup SDK Eclipse & ADT SDK Manager Android
DEVELOPING MOBILE APPLICATIONS USING ANDROID
ISSN 2229-5518 2300 DEVELOPING MOBILE APPLICATIONS USING ANDROID M.VARUN KUMAR, S.THIRUMALINI, S.RAJESH KUMAR, N.VANISRI, PULIDINDI VENUGOPAL School of Information Technology &VITBS VIT University,Vellore-632014
Mobile Devices and Systems Lesson 02 Handheld Pocket Computers and Mobile System Operating Systems
Mobile Devices and Systems Lesson 02 Handheld Pocket Computers and Mobile System Operating Systems Oxford University Press 2007. All rights reserved. 1 Handheld Pocket Computers Come in many manifestations
An Introduction to Android
An Introduction to Android Michalis Katsarakis M.Sc. Student [email protected] Tutorial: hy439 & hy539 16 October 2012 http://www.csd.uoc.gr/~hy439/ Outline Background What is Android Android as a
A Review of Different Comparative Studies on Mobile Operating System
Research Journal of Applied Sciences, Engineering and Technology 7(12): 2578-2582, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: August 30, 2013 Accepted: September
Introduction to Android
Introduction to Android Ref: Wei-Meng Lee, BEGINNING ANDROID 4 APPLICATION DEVELOPMENT, Ch1, John Wiley & Sons, 2012 1. What is Android Android is a mobile operating system that is based on a modified
Issues in Android on Mobile Platform and Their Resolution
Issues in Android on Mobile Platform and Their Resolution 1 Monika A. Ganpate, 2 Dipika R. Shinde 1, 2 Institute of Management and Computer Studies, Thane (West), India, University of Mumbai, India Abstract:
An Introduction to Android. Huang Xuguang Database Lab. Inha University 2009.11.2 Email: [email protected]
An Introduction to Android Huang Xuguang Database Lab. Inha University 2009.11.2 Email: [email protected] Outline Background What is Android? Development for Android Background Internet users and Mobile
Lecture 6: Operating Systems and Utility Programs
Lecture 6: Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone
Research and Design of Universal and Open Software Development Platform for Digital Home
Research and Design of Universal and Open Software Development Platform for Digital Home CaiFeng Cao School of Computer Wuyi University, Jiangmen 529020, China [email protected] Abstract. With the development
Case Study: Mobile Device Forensics in Texting and Driving Cases
Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge
Running a Program on an AVD
Running a Program on an AVD Now that you have a project that builds an application, and an AVD with a system image compatible with the application s build target and API level requirements, you can run
Android Development. Lecture AD 0 Android SDK & Development Environment. Università degli Studi di Parma. Mobile Application Development
Android Development Lecture AD 0 Android SDK & Development Environment 2013/2014 Parma Università degli Studi di Parma Lecture Summary Android Module Overview The Android Platform Android Environment Setup
Case Study: Smart Phone Deleted Data Recovery
Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics
ECWM511 MOBILE APPLICATION DEVELOPMENT Lecture 1: Introduction to Android
Why Android? ECWM511 MOBILE APPLICATION DEVELOPMENT Lecture 1: Introduction to Android Dr Dimitris C. Dracopoulos A truly open, free development platform based on Linux and open source A component-based
Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security
Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile
Introduction to Android
Introduction to Android Android Smartphone Programming Matthias Keil Institute for Computer Science Faculty of Engineering October 19, 2015 Outline 1 What is Android? 2 Development on Android 3 Applications:
Chapter 4. Operating Systems and File Management
Chapter 4 Operating Systems and File Management Chapter Contents Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup
NEW RESEARCH DIRECTIONS IN THE AREA OF SMART PHONE FORENSIC ANALYSIS
NEW RESEARCH DIRECTIONS IN THE AREA OF SMART PHONE FORENSIC ANALYSIS Firdous Kausar Department of Computer Science, College of Computer and Information Sciences, Imam University, Riyadh, Saudi Arabia.
ANDROID PROGRAMMING - INTRODUCTION. Roberto Beraldi
ANDROID PROGRAMMING - INTRODUCTION Roberto Beraldi Introduction Android is built on top of more than 100 open projects, including linux kernel To increase security, each application runs with a distinct
OXYGEN FORENSIC SUITE 2010 GETTING STARTED
OXYGEN SOFTWARE OXYGEN FORENSIC SUITE 2010 GETTING STARTED 2000-2010 Oxygen Software http://www.oxygen-forensic.com Table of contents Table of contents...2 General information...3 Installation...5 Extracting
Mobile Operating Systems Lesson 05 Windows CE Part 1
Mobile Operating Systems Lesson 05 Windows CE Part 1 Oxford University Press 2007. All rights reserved. 1 Windows CE A 32 bit OS from Microsoft Customized for each specific hardware and processor in order
ITG Software Engineering
Basic Android Development Course ID: Page 1 Last Updated 12/15/2014 Basic Android Development ITG Software Engineering Course Overview: This 5 day course gives students the fundamental basics of Android
Mobile Device Manual for 3G DVRs
Mobile Device Manual for 3G DVRs The 3G DVR can be monitored with APPS for supported mobile device operating systems. Please refer to the table below for your specific mobile device application. Please
Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results
Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results Physical Extraction Physical extraction involves either Removing chips from circuit board
IST STREP Project. Deliverable D3.3.1u Middleware User s Guide Multi-Radio Device Management Layer. http://www.ist-plastic.org
IST STREP Project Deliverable D3.3.1u Middleware User s Guide Multi-Radio Device Management Layer http://www.ist-plastic.org Project Number : IST-26955 Project Title : PLASTIC Deliverable Type : Report
Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.
Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures
TRACING VNC AND RDP PROTOCOL ARTEFACTS ON WINDOWS MOBILE AND WINDOWS SMARTPHONE FOR FORENSIC PURPOSE
TRACING VNC AND RDP PROTOCOL ARTEFACTS ON WINDOWS MOBILE AND WINDOWS SMARTPHONE FOR FORENSIC PURPOSE Abstract Paresh Kerai School of Computer and Security Science Edith Cowan University Perth, Western
Best Practice Document Hints and Tips
Marshal Ltd. Date: 02/06/2007 Marshal EndPoint Security From Best Practice Document Hints and Tips Marshal Software Ltd CSL 005 Marshal EndPoint Security Best Practice (2) Privacy Control: None Version:
Evolution of Smartphones And Android Operating System
Evolution of Smartphones And Android Operating System Evolution of Smartphones Background First telephone call was made on March 10, 1876 by Alexander Graham Bell. After that Pager continues to dominate
Ways to Use USB in Embedded Systems
Ways to Use USB in Embedded Systems by Yingbo Hu, R&D Embedded Engineer and Ralph Moore, President of Micro Digital Universal Serial Bus (USB) is a connectivity specification that provides ease of use,
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
ANDROID. Programming basics
ANDROID Programming basics Overview Mobile Hardware History Android evolution Android smartphone overview Hardware components at high level Operative system Android App development Why Android Apps? History
An Introduction to Android Application Development. Serdar Akın, Haluk Tüfekçi
An Introduction to Android Application Serdar Akın, Haluk Tüfekçi ARDIC ARGE http://www.ardictech.com April 2011 Environment Programming Languages Java (Officially supported) C (Android NDK Needed) C++
Android v ios Mobile Operating Systems
v ios Mobile Operating Systems is an open source operating system widely used on smartphones and tablets. has been available under a free and open source software license from October 21, 2008 and until
Certified Digital Forensics Examiner
Certified Digital Forensics Examiner Course Name: CDFE V6.0 Duration: Language: 5 days English Format: Instructor-led (Lecture and Lab) Prerequisite: Experience in using a computer Student Materials: Student
Comprehensive Digital Forensic Solutions www.paraben.com
Comprehensive Digital Forensic Solutions www.paraben.com Mobile Device Forensic & Security Concerns Presenter Are we addicted? The Best Approach Cases Devices Everywhere PDA Devices Mobile Phones Hybrids
VoIP support on Qtopia. Vladimir Minenko, Ph.D.
VoIP support on Qtopia Vladimir Minenko, Ph.D. 08 07 TABLE OF CONTENTS 1 Introduction 2 Qtopia 3 Telephony in Qtopia 4 VoIP general things 5 Current status 6 What is coming 7 Resources and Links INTRODUCTION
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
A Short Introduction to Android
A Short Introduction to Android Notes taken from Google s Android SDK and Google s Android Application Fundamentals 1 Plan For Today Lecture on Core Android Three U-Tube Videos: - Architecture Overview
Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.
Chapter 8 Objectives Chapter 8 Operating Systems and Utility Programs Identify the the types types of of system software Summarize the the startup process on on a a personal computer Describe the the functions
Certified Digital Forensics Examiner
Cyber Security Training & Consulting Certified Digital COURSE OVERVIEW 5 Days 40 CPE Credits $3,000 Digital is the investigation and recovery of data contained in digital devices. This data is often the
Android Basics. Xin Yang 2016-05-06
Android Basics Xin Yang 2016-05-06 1 Outline of Lectures Lecture 1 (45mins) Android Basics Programming environment Components of an Android app Activity, lifecycle, intent Android anatomy Lecture 2 (45mins)
OMX, Android, GStreamer How do I decide what to use? 15 July 2011
OMX, Android, GStreamer How do I decide what to use? 15 July 2011 When to use which framework? Android (easiest) Customer wants a full featured media player with minimal trouble and no prior knowledge
A Survey on Mobile Forensic for Android Smartphones
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar Apr. 2015), PP 15-19 www.iosrjournals.org A Survey on Mobile Forensic for Android Smartphones
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Middleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
Operating Systems Overview As we have learned in working model of a computer we require a software system to control all the equipment that are
Session 07 Operating Systems Overview As we have learned in working model of a computer we require a software system to control all the equipment that are connected to computer and provide good environment
How To Develop An App For Ios (Windows)
Mobile Application Development Lecture 14 ios SDK 2013/2014 Parma Università degli Studi di Parma Lecture Summary ios operating system ios SDK Tools of the trade ModelViewController MVC interaction patterns
Windows Embedded 7 E versus Windows Embedded 7 P
Windows Embedded 7 E versus Windows Embedded 7 P Applications and Services Development.Net Framework.Net Framework 3.5 SP1.NET Framework 2.0 Client Profile.NET Framework 3.0.NET Framework 3.0 Client Profile.NET
Mobile Devices - An Introduction to the Android Operating Environment. Design, Architecture, and Performance Implications
Mobile Devices - An Introduction to the Android Operating Environment Design, Architecture, and Performance Implications Dominique A. Heger DHTechnologies (DHT) [email protected] 1.0 Introduction With
ORACLE MOBILE APPLICATION FRAMEWORK DATA SHEET
ORACLE MOBILE APPLICATION FRAMEWORK DATA SHEET PRODUCTIVE ENTERPRISE MOBILE APPLICATIONS DEVELOPMENT KEY FEATURES Visual and declarative development Mobile optimized user experience Simplified access to
Virtualization: Hypervisors for Embedded and Safe Systems. Hanspeter Vogel Triadem Solutions AG
1 Virtualization: Hypervisors for Embedded and Safe Systems Hanspeter Vogel Triadem Solutions AG 2 Agenda Use cases for virtualization Terminology Hypervisor Solutions Realtime System Hypervisor Features
Android Application Development. Daniel Switkin Senior Software Engineer, Google Inc.
Android Application Development Daniel Switkin Senior Software Engineer, Google Inc. Goal Get you an idea of how to start developing Android applications Introduce major Android application concepts Walk
CSI Crime Scene Investigations
CSI Crime Scene Investigations Did Jack do it? Speaker Introductions Amber Schroader Paraben Corporation Oodles of forensic experience Tyler Cohen Federal Government (Still Cool Person) IPod Obsession
ANDROID INTRODUCTION TO ANDROID
ANDROID JAVA FUNDAMENTALS FOR ANDROID Introduction History Java Virtual Machine(JVM) JDK(Java Development Kit) JRE(Java Runtime Environment) Classes & Packages Java Basics Data Types Variables, Keywords,
ORACLE ADF MOBILE DATA SHEET
ORACLE ADF MOBILE DATA SHEET PRODUCTIVE ENTERPRISE MOBILE APPLICATIONS DEVELOPMENT KEY FEATURES Visual and declarative development Java technology enables cross-platform business logic Mobile optimized
Chapter 8 Operating Systems and Utility Programs
Operating Systems What are the functions of an? start the computer provide a user interface manage programs Chapter 8 Operating Systems and Utility Programs administer security control a network manage
BlackBerry Smartphone Application Development
BlackBerry Smartphone Application Development Trenton Computer Festival Sat 24 April 2010 John DeGood NU3E [email protected] http://degood.org/ Sat 24 Apr 2010 BlackBerry Smartphone Application Development
CS3600 SYSTEMS AND NETWORKS
CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 2: Operating System Structures Prof. Alan Mislove ([email protected]) Operating System Services Operating systems provide an environment for
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
EnCase Forensic Product Overview
GUIDANCE SOFTWARE EnCase Forensic EnCase Forensic Product Overview The Standard in Digital Investigations GUIDANCE SOFTWARE EnCase Forensic EnCase Forensic Version 7 The mission of Guidance Software has
Praktikum Entwicklung Mediensysteme (für Master)
Praktikum Entwicklung Mediensysteme (für Master) An Introduction to Android An Introduction to Android What is Android? Installation Getting Started Anatomy of an Android Application Life Cycle of an Android
Android on i.mx Applications Processors
July 2009 Android on i.mx Applications Processors Sridharan Subramanian Senior Product Manager Software and Platforms Abstract Android is a software platform and operating system for mobile devices, based
What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes
What Happens When You Press that Button? Explaining Cellebrite UFED Data Extraction Processes Table of Contents UFED Basics...3 Extraction Types...4 Logical extraction...5 Logical extractions of ios devices...5
Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014
Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security
Chapter 2 System Structures
Chapter 2 System Structures Operating-System Structures Goals: Provide a way to understand an operating systems Services Interface System Components The type of system desired is the basis for choices
