Change search
ReferencesLink to record
Permanent link

Direct link
Amazon Kindle Fire HD Forensics
Athena Labs, Dubai.
2014 (English)In: Digital Forensics and Cyber Crime: Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers, Springer, 2014, no Cham, 39-50 p.Chapter in book (Refereed)
Abstract [en]

This research presents two developed approaches for the forensic acquisition of an Amazon Kindle Fire HD. It describes the forensic acquisition and analysis of the Amazon Kindle Fire HD device. Two developed methods of acquisition are presented; one requiring a special cable to reflash the boot partition of the device with a forensic acquisition environment (Method A), and the other exploiting a vulnerability in the device’s Android operating system (Method B). A case study is then presented showing the various digital evidence that can be extracted from the device. The results indicate that Method A is more favorable because it utilizes a general methodology that does not exploit a vulnerability that could potentially be patched by Amazon in future software updates.

Place, publisher, year, edition, pages
Springer, 2014. no Cham, 39-50 p.
National Category
Computer Systems
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kth:diva-191445DOI: 10.1007/978-3-319-14289-0_4ISBN: 978-3-319-14289-0OAI: oai:DiVA.org:kth-191445DiVA: diva2:968837
Note

QC 20160913

Available from: 2016-09-13 Created: 2016-08-30 Last updated: 2016-09-13Bibliographically approved

Open Access in DiVA

No full text

Other links

Publisher's full text

Search in DiVA

By author/editor
Iqbal, Asif
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Altmetric score

Total: 5 hits
ReferencesLink to record
Permanent link

Direct link