Citation: Dave Bullock, Aliyu Aliyu, Leandros Maglaras, Mohamed Amine Ferrag. Security and privacy challenges in the field of iOS device forensics[J]. AIMS Electronics and Electrical Engineering, 2020, 4(3): 249-258. doi: 10.3934/ElectrEng.2020.3.249
[1] | Ferrag MA, Maglaras L, Derhab A (2019) Authentication and authorization for mobile iot devices using biofeatures: Recent advances and future trends. Secur Commun Netw 2019: 1-20. |
[2] | Jackson W (2014) Can digital forensics keep up with smartphone tech. |
[3] | Waldrop MM (2016) The chips are down for moore's law. Nature News 530: 144. doi: 10.1038/530144a |
[4] | Ferrag MA, Maglaras L, Derhab A, et al. (2020) Authentication schemes for smart mobile devices: Threat models, countermeasures, and open research issues. Telecommun Syst 73: 317-348. doi: 10.1007/s11235-019-00612-5 |
[5] | Al Fahdi M, Clarke NL, Furnell SM (2013) Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions. 2013 Information Security for South Africa, 1-8. |
[6] | Barmpatsalou K, Damopoulos D, Kambourakis G, et al. (2013) A critical review of 7 years of mobile device forensics. Digit Invest 10: 323-349. doi: 10.1016/j.diin.2013.10.003 |
[7] | Husain MI, Baggili I, Sridhar R (2010) A simple cost-effective framework for iphone forensic analysis. International Conference on Digital Forensics and Cyber Crime, 27-37. |
[8] | Bays J and Karabiyik U (2019) Forensic analysis of third party location applications in android and ios. arXiv preprint arXiv:1907.00074. |
[9] | Troutman C and Mancha V (2020) Mobile forensics. Digital Forensic Education 61: 175-201. doi: 10.1007/978-3-030-23547-5_10 |
[10] | Knox S, Moghadam S, Patrick K, et al. (2020) What's really 'happning'? a forensic analysis of android and ios happn dating apps. Comput Secur 94: 101833. |
[11] | Hoog A and Strzempka K (2011) iPhone and iOS forensics: Investigation, analysis and mobile security for Apple iPhone, iPad and iOS devices. Elsevier. |
[12] | Barmpatsalou K, Cruz T, Monteiro E, et al. (2018) Current and future trends in mobile device forensics: A survey. ACM Comput Surv (CSUR) 51: 1-31. |
[13] | Huang CT, Ko HJ, Zhuang ZW, et al. (2018) Mobile forensics for cloud storage service on ios systems. 2018 International Symposium on Information Theory and Its Applications (ISITA), 178-182. |
[14] | Long J (2016) The evolution of ios security and privacy features. |
[15] | Reiner R (1991) Chief constables. Oxford: Oxford University Press. |
[16] | Todesco L (2015) Attacking the xnu kernel in el capitan. Black Hat EU. |
[17] | Ariffin A, DOorazio C, Choo KKR, et al. (2013) ios forensics: How can we recover deleted image files with timestamp in a forensically sound manner? 2013 International conference on availability, reliability and security, 375-382. |
[18] | Blanch JL and Christensen SS (2018) Biometric basics: Options to gather data from digital devices locked by a biometric key. US Att'ys Bull 66: 3. |
[19] | Ferrag MA, Maglaras L, Derhab A, et al. (2018) Taxonomy of biometric-based authentication schemes for mobile computing devices. 2018 3rd international conference on pattern analysis and intelligent systems (PAIS), 1-8. |
[20] | Mahalik H, Tamma R, Bommisetty S (2016) Practical Mobile Forensics. Packt Publishing Ltd. |
[21] | Edge C and Trouton R (2020) The evolution of apple device management. Apple Device Management, 1-54. |
[22] | Fox-Brewster T (2018) The feds can now (probably) unlock every iphone model in existence. |
[23] | Afonin O (2017) New security measures in ios 11 and their forensic implications. |
[24] | Lutes KD and Mislan RP (2008) Challenges in mobile phone forensics. Proceeding of the 5th International Conference on Cybernetics and Information Technologies, Systems and Applications (CITSA). |
[25] | Castro D and McQuinn A (2016) Unlocking encryption: Information security and the rule of law. Information Technology and Innovation Foundation. |
[26] | Bédrune JB and Sigwald J (2011) iphone data protection in depth. Vortrag von der HITB-SecConf. |
[27] | Hyrynsalmi S, Koskinen J, Hyrynsalmi SM (2019) A review of ethical discussions on platforms and ecosystems. Proceedings of the Third Seminar on Technology Ethics 2019 2505: 9-19. In: Proceedings of the Third Seminar on Technology Ethics 2019. |
[28] | Martin J, Alpuche D, Bodeman K, et al. (2019) Handoff all your privacy-a review of apple's bluetooth low energy continuity protocol. Proceedings on Privacy Enhancing Technologies 2019: 34-53. doi: 10.2478/popets-2019-0057 |
[29] | Otte SJ (2017) Whether the department of justice should have the authority to compel apple inc. to breach its iphone security measures. U Cin L Rev 85: 877. |
[30] | Hack M (2016) The implications of apple's battle with the fbi. Network Security 2016: 8-10. |
[31] | Stephan K (2017) Apple versus the feds: How a smartphone stymied the fbi. IEEE Consumer Electronics Magazine 6: 103-104. |
[32] | Nellis S and Cadell C (2018) Apple moves to store icloud keys in china, raising human rights fears. Available from: https://www.reuters.com/article/us-china-apple-icloud-insight/apple-moves-to-store-icloud-keys-in-china-raisinghuman-rights-fears-idUSKCN1G8060. |
[33] | Lashinsky A (2012) Inside Apple: The secrets behind the past and future success of Steve Jobs's iconic brand. Hachette UK. |
[34] | Simao AMDL, Sicoli FC, de Melo LP, et al. (2011) Acquisition of digital evidence in android smartphones. 9th Australian Digital Forensics Conference, 116. |
[35] | Lorenzo F, McDonald JT, Andel TR, et al. (2019) Evaluating side channel resilience in iphone 5c unlock scenarios. 2019 SoutheastCon, 1-7. |
[36] | Ntantogian C, Apostolopoulos D, Marinakis G, et al. (2014) Evaluating the privacy of android mobile applications under forensic analysis. Comput Secur 42: 66-76. doi: 10.1016/j.cose.2014.01.004 |
[37] | E. G. Warrants (2019) The great debate. Available from: https://egrove.olemiss.edu/cgi/viewcontent.cgi?article=1000&context=greatdebate. |
[38] | Anagnostopoulos L, Zeadally S, Exposito E (2016) Handling big data: research challenges and future directions. The Journal of Supercomputing 72: 1494-1516. doi: 10.1007/s11227-016-1677-z |
[39] | Wang X, Shamsi F, Okshtein Y, et al. (2014) Clustering geofence-based alerts for mobile devices. US Patent 8,755,824. |