4 research outputs found
Paper Session V: Forensic Software Tools for Cell Phone Subscriber Identity Modules
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., smart phones) are ubiquitous. Besides placing calls, cell phones allow users to perform other tasks such as text messaging and phonebook entry management. When cell phones and cellular devices are involved in a crime or other incident, forensic specialists require tools that allow the proper retrieval and speedy examination of data present on the device. For devices conforming to the Global System for Mobile Communications (GSM) standards, certain data such as dialed numbers, text messages, and phonebook entries are maintained on a Subscriber Identity Module (SIM). This paper gives a snapshot of the state of the art of forensic software tools for SIMs.
Keywords: Cell Phone, Forensic Tool, Subscriber Identity Modul
Forensic Tools for Mobile Phone Subscriber Identity Modules
Mobile phones and other handheld devices incorporating cellular capabilities, such as Personal Digital Assistants, are ubiquitous. Besides placing calls, these devices allow users to perform other useful tasks, including text messaging and phonebook entry management. When cell phones and cellular devices are involved in a crime or other incident, forensic specialists require tools that allow the proper retrieval and speedy examination of data present on the device. For devices conforming to the Global System for Mobile Communications (GSM) standards, certain data such as dialed numbers, text messages, and phonebook entries are maintained on a Subscriber Identity Module (SIM). This paper gives a snapshot of the state of the art of forensic software tools for SIMs and an explanation of the types of digital evidence they can recover
Mobile Terminal Security
The miniaturization of electronics and recent developments in
biometric and screen technologies will permit a pervasive presence
of embedded systems. This - and the inclusion of networking
capabilities and IP addresses in many handheld devices - will
foster the widespread deployment of personal mobile
equipment.\smallskip
This work attempts to overview these diverse aspects of mobile
device security. We will describe mobile networks\u27 security (WLAN
and WPAN security, GSM and 3GPP security) and address platform
security issues such as bytecode verification for mobile equipment
and protection against viruses and Trojan horses in mobile
environment - with a concrete J2ME implementation example. Finally
we will turn to hardware attacks and briefly survey the physical
weaknesses that can be exploited to compromise mobile
equipment.\smallski