Fast Data Acquisition with Mobile Device in Digital Crime

  • Chang-Woo Song
  • Jeong-Hyun Lim
  • Kyung-Yong Chung
  • Ki-Wook Rim
  • Jung-Hyun Lee
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 215)


As mass storage media is recently becoming more common due to spread of smart phones in which new technologies have been applied, data collected from digital crime has been increased a lot. At the time, if the investigator did not conduct the initial response properly, we may lose the value as the evidence. Thus, the collection of digital evidence in a short time is required. Therefore, this paper proposes the methods to collect data rapidly at the scene of the crime based on table related to criminal charges. Implemented application can collect data with a consideration of each feature of software and provide the rapid results through a pattern search.


Mobile device Forensic Evidence collection Data acquisition 



This research was supported by Basic Science Research Program through the National Research Foundation of Korea funded by the Ministry of Education, Science and Technology (No. 2012-0004478).


  1. 1.
    Kubi AK, Saleem S, Popov O (2011) Evaluation of some tools for extracting E-evidence from mobile devices. In: Proceedings of the international conference on application of information and communication technologies, pp 1–6Google Scholar
  2. 2.
    Bertè R, Dellutri F, Grillo A, Lentini A, Me G, Ottaviani V (2009) Fast Smart phones forensic analysis results through MIAT and forensic farm. Int J Electron Secur Digit Forensics, IndersciGoogle Scholar
  3. 3.
    Lin IL, Chao HC, Peng SH (2001) Research of digital evidence forensics standard operating procedure with comparison and analysis based on smart phone. In: Proceedings of the international conference on broadband and wireless computing, communication and applications, pp 386–391Google Scholar
  4. 4.
    Akkaladevi S, Keesara H, Luo X (2011) Efficient forensic tools for handheld device: a comprehensive perspective. Softw Eng Res Manage Appl Stud Comput Intell 377:349–359Google Scholar
  5. 5.
    Andrew H (2011) Android forensics: investigation, analysis and mobile security for Google Android. SyngressGoogle Scholar
  6. 6.
    Andrew H, Katie S (2011) iPhone and iOS forensics: investigation, analysis and mobile security for Apple iPhone, iPad, and iOS Devices. SyngressGoogle Scholar
  7. 7.
    Said H, Yousif A, Humaid H (2011) IPhone forensics techniques and crime investigation. Proceedings of the international conference and workshop on current trends in information technology, pp 120–125Google Scholar
  8. 8.
    Zareen A, Baig S (2010) Mobile phone forensics: challenges, analysis and tools classification. In: Proceedings of the IEEE international workshop on systematic approaches to digital forensic engineering, pp 47–55Google Scholar
  9. 9.
    Kuntze N, Rudolph C (2001) Secure digital chains of evidence. In: Proceedings of the IEEE international workshop on systematic approaches to digital forensic engineering, pp 1–8Google Scholar
  10. 10.
    Raghav S, Saxena AK (2009) Mobile forensics: guidelines and challenges in data preservation and acquisition. In: IEEE student conference on research and development, pp 5–8Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  • Chang-Woo Song
    • 1
  • Jeong-Hyun Lim
    • 2
  • Kyung-Yong Chung
    • 3
  • Ki-Wook Rim
    • 4
  • Jung-Hyun Lee
    • 1
  1. 1.Department of Computer Science and EngineeringInha University, YonghyeonIncheonKorea
  2. 2.School of International Affairs and InformationDongguk UniversitySeoulKorea
  3. 3.School of Computer Information EngineeringSangji UniversityGangwon-doKorea
  4. 4.Department of Computer Science and EngineeringSunmoon UniversityAsan-si, Chungcheongnam-doKorea

Personalised recommendations