Digital Forensics Techniques: Theory, Methods and Applications

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (31 December 2021) | Viewed by 5906

Special Issue Editor


E-Mail Website
Guest Editor
School of Cybersecurity, Korea University, 145 Anam-ro, Seongbuk-gu, Seoul 02841, Korea
Interests: cybersecurity; digital forensics; incident response; steganography; cryptography and cryptanalysis

Special Issue Information

Dear Colleagues,

The changing paradigm has become an inevitable aspect of modern digital forensics. New types of hardware, software, and services are frequently being introduced, meaning that examiners always need to have new methods and tools against emerging challenges in digital forensics. Therefore, there is a need for advanced forensic techniques to support efficient cybercrime investigations and incident response, which requires novel approaches for automated and integrated analysis on digital traces from multiple different types of sources.

This Special Issue invites submissions related to theoretical approaches or practical applications of all aspects of digital forensics, including but not limited to the following topics of specific interest:

  • Artificial intelligence/machine learning applied to digital forensics
  • Automated tool development for digital forensics
  • Blockchain technologies in digital forensics
  • Case studies involving digital evidence
  • Cloud data acquisition
  • Cyber threat intelligence
  • Cyberphysical system analysis
  • Darknet investigation
  • Data fragment forensics
  • Data recovery and reassembly
  • Data visualization in digital forensics
  • Dataset development for research, training, education, and tool testing
  • Electronic document analysis
  • Event correlation mining
  • Event reconstruction and user behavior analysis
  • Infotainment forensics
  • Internet-of-Things forensics
  • Malware detection and analysis
  • Maritime digital forensics
  • Memory acquision and analysis
  • Mobile and embedded device forensics
  • Multimedia analysis
  • New versions of operating systems and applications
  • Social network mining
  • Standardized representation of digital forensic information
  • Storage device, partition, volume and filesystem forensics
  • Text data mining (e.g., topic modeling)
  • Tool testing methodology

Prof. Dr. Sangjin Lee
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Cyberattack analysis
  • Data analysis and mining
  • Data recovery
  • Digital forensics
  • Incident response

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

24 pages, 1229 KiB  
Article
Digital Forensics Analysis of Ubuntu Touch on PinePhone
by Yansi Keim, Yung Han Yoon and Umit Karabiyik
Electronics 2021, 10(3), 343; https://doi.org/10.3390/electronics10030343 - 01 Feb 2021
Cited by 3 | Viewed by 4979
Abstract
New smartphones made by small companies enter the technology market everyday. These new devices introduce new challenges for mobile forensic investigators as these devices end up becoming pertinent evidence during an investigation. One such device is the PinePhone from Pine Microsystems (Pine64). These [...] Read more.
New smartphones made by small companies enter the technology market everyday. These new devices introduce new challenges for mobile forensic investigators as these devices end up becoming pertinent evidence during an investigation. One such device is the PinePhone from Pine Microsystems (Pine64). These new devices are sometimes also shipped with OSes that are developed by open source communities and are otherwise never seen by investigators. Ubuntu Touch is one of these OSes and is currently being developed for deployment on the PinePhone. There is little research behind both the device and OS on what methodology an investigator should follow to reliably and accurately extract data. This results in potentially flawed methodologies being used before any testing can occur and contributes to the backlog of devices that need to be processed. Therefore, in this paper, the first forensic analysis of the PinePhone device with Ubuntu Touch OS is performed using Autopsy, an open source tool, to establish a framework that can be used to examine and analyze devices running the Ubuntu Touch OS. The findings include analysis of artifacts that could impact user privacy and data security, organization structure of file storage, app storage, OS, etc. Moreover, locations within the device that stores call logs, SMS messages, images, and videos are reported. Interesting findings include forensic artifacts, which could be useful to investigators in understanding user activity and attribution. This research will provide a roadmap to the digital forensic investigators to efficiently and effectively conduct their investigations where they have Ubuntu Touch OS and/or PinePhone as the evidence source. Full article
(This article belongs to the Special Issue Digital Forensics Techniques: Theory, Methods and Applications)
Show Figures

Figure 1

Back to TopTop