Font Size: a A A

He Resherch And Implement Of IOS System Forensic

Posted on:2019-03-29Degree:MasterType:Thesis
Country:ChinaCandidate:T Y ZhouFull Text:PDF
GTID:2428330545972907Subject:Software engineering
Abstract/Summary:PDF Full Text Request
At present,the mobile Internet technology has exploded,and a series of smart terminal products such as mobile phones,tablet computers,smart wearable devices and Internet TV have become indispensable communication tools for people's daily work.However,in the same period,the number of criminal cases involving smart terminals has also been on the rise.The intelligence terminal evidence collection will provide a solid guarantee for effectively cracking down on such crimes and maintaining the electronic application security.Taking the use of mobile phones by Chinese citizens as an example,as of the end of 2016,the number of mobile phone users in China has reached 1.8 billion and maintained a high-speed growth trend.The iOS mobile Internet products represented by iPhone,iPad,AppleWatch,iTouch and so on are the leaders of the intelligent terminal system.This thesis takes the iOS intelligent terminal as an example to conduct data forensics research.This paper uses iOS intelligent terminal as an example for data forensics research.The author is mainly engaged in the work of computer forensics and electronic forensic appraisal.Each year in the difficult cases of electronic forensics,iOS equipment occupies a large proportion of the proportion.On the one hand,the Apple brand share in the mobile phone market is extremely high,and on the other hand,the iOS device of Apple devices.Compared with the Android system,it is more closed,more secure,and more difficult for forensic technology.Therefore,it seems that the forensic technology for mobile smart devices represented by iOS devices still faces enormous challenges.First,mobile smart devices continue to introduce new generation products,making the speed of smart mobile terminal forensics technologies and standards set to keep up.The speed of the development of hardware and related software,together with the illegal concealment of criminal evidence or the physical destruction of key evidence,often under the circumstances will use counterfeit tools with certain technical capabilities for reconnaissance confrontation,further increase I find it difficult for law enforcement agencies to collect evidence.In order to obtain the forensic effect with absolute credibility for the first time,it is necessary to further study the related technologies,technical vulnerabilities,storage modes,encryption security strategies and other related technologies of the relevant mobile smart devices,and enhance the technology of electronic forensics in the judicial evidence generation stage.Usability,and then obtain the ability to provide evidence with "knife" role,and effectively improve the deterrence and credibility of government law enforcement agencies in the fight against cyber electronic information crime.Based on the features of the characteristics of the password lock function,this thesis did requirement analysis for forensic need,completed the system design and implementation.And provides a complete solution for the professional work of iPhone forensics.This paper introduces the working principle of evidence to ensure the legitimacy and authority of the forensics work.Then analyzed the hardware structure and the system structure of iPhone,introduced the contents of folders various iPhone data storage.Design of cryptographic breakthrough,image acquisition and sensitive information extraction from three forensic function module.The preliminary research on electronic judicial forensics of iOS device with Apple A4 processor has broken through a series of password security policies elaborately designed by the Apple system to acquire all the data of the entire iOS device in a bit-by-bit mirror copy manner Any clues related to evidence of crime have effectively enhanced e-discovery capabilities for iOS devices.
Keywords/Search Tags:iPhone, iOS, judicial forensics, data Obtain, data analysis
PDF Full Text Request
Related items