{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:40:04Z","timestamp":1745322004603,"version":"3.40.4"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031710247"},{"type":"electronic","value":"9783031710254"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-71025-4_8","type":"book-chapter","created":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T07:45:14Z","timestamp":1736149514000},"page":"141-163","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Digital Forensic Acquisition Using Private Internet of Things Cloud Application Programming Interfaces"],"prefix":"10.1007","author":[{"given":"Johannes","family":"Oleg\u00e5rd","sequence":"first","affiliation":[]},{"given":"Stefan","family":"Axelsson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,7]]},"reference":[{"key":"8_CR1","unstructured":"D. Baier and F. Egner, friTap: Decrypting TLS on the fly, lolcads tech blog (lolcads.github.io\/posts\/2022\/08\/fritap), 2022."},{"key":"8_CR2","unstructured":"D. Baier, F. Egner and M. Ufer, friTap: Decrypting TLS traffic on the fly, presented at the OSDFCon Webinar (www.youtube.com\/watch?v=GODCq53zgmk), 2023."},{"key":"8_CR3","unstructured":"Y. Brhan, API-Based Cloud Data Acquisition and Analysis from Smart Home IoT Environments, M.S. Thesis, Institute of Legal Informatics and Forensic Science, Hallym University, Chuncheon, South Korea, 2019."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"H. Chung, J. Park and S. Lee, Digital forensic approaches for the Amazon Alexa ecosystem, Digital Investigation, vol. 22(S), pp. S15\u2013S25, 2017.","DOI":"10.1016\/j.diin.2017.06.010"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"C. D\u2019Orazio and K. Choo, A technique to circumvent SSL\/TLS validations on iOS devices, Future Generation Computer Systems, vol. 74, pp. 366\u2013374, 2017.","DOI":"10.1016\/j.future.2016.08.019"},{"key":"8_CR6","unstructured":"Federal Office of Justice, German Code of Criminal Procedure, Federal Ministry of Justice, Berlin, Germany (www.gesetze-im-internet.de\/englisch_stpo\/englisch_stpo.html), 2023."},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"H. Fereidooni, J. Classen, T. Spink, P. Patras, M. Miettinen, A. Sadeghi, M. Hollick and M. Conti, Breaking fitness records without moving: Reverse engineering and spoofing Fitbit, in Research in Attacks, Intrusions and Defenses, M. Dacier, M. Bailey, M. Polychronakis and M. Antonakakis (Eds.), Springer, Cham, Switzerland, pp. 48\u201369, 2017.","DOI":"10.1007\/978-3-319-66332-6_3"},{"key":"8_CR8","unstructured":"Google, Changes to Trusted Certificate Authorities in Android Nougat, Mountain View, California (android-developers.googleblog.com\/2016\/07\/changes-to-trusted-certificate.html), July 7, 2016."},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"C. Howden, L. Liu, Z. Ding, Y. Zhan and K. Lam, Moments in time: A forensic view of Twitter, Proceedings of the IEEE International Conference on Green Computing and Communications, IEEE International Conference on Internet of Things and IEEE International Conference on Cyber, Physical and Social Computing, pp. 899\u2013908, 2013.","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.157"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"C. Howden, L. Liu, Z. Li, J. Li and N. Antonopoulos, Virtual vignettes: The acquisition, analysis and presentation of social network data, Science China Information Science, vol. 57, article no. 032104, 2014.","DOI":"10.1007\/s11432-014-5069-9"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"M. Huber, M. Mulazzani, M. Leithner, S. Schrittwieser, G. Wondracek and E. Weippl, Social snapshots: Digital forensics for online social networks, Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, pp. 113\u2013122, 2011.","DOI":"10.1145\/2076732.2076748"},{"key":"8_CR12","unstructured":"T. Hudson, Hacking your dishwasher or cloudless Home Connect appliances, presented at the SEC-T Conference (www.youtube.com\/watch?v=rhbLgg8mWxs), 2023."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"T. Janarthanan, M. Bagheri and S. Zargari, IoT forensics: An overview of the current issues and challenges, in Digital Forensic Investigation of Internet of Things (IoT) Devices, R. Montasari, H. Jahankhani, R. Hill and S. Parkinson (Eds.), Springer, Cham, Switzerland, pp. 223\u2013254, 2021.","DOI":"10.1007\/978-3-030-60425-7_10"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"O. Kayode and A. Tosun, Analysis of IoT traffic using an HTTP proxy, Proceedings of the IEEE International Conference on Communications, 2019.","DOI":"10.1109\/ICC.2019.8761601"},{"key":"8_CR15","unstructured":"C. Kudera, All your fitness data belongs to you: Reverse engineering the Huawei Health Android app, presented at Easterhegg 2019 (www.youtube.com\/watch?v=xQflFhj8Z2w), 2019."},{"key":"8_CR16","unstructured":"Law Commission, Search Warrants, Law Commission no. 396, HC 852, London, United Kingdom (www.lawcom.gov.uk\/project\/search-warrants), 2020."},{"key":"8_CR17","unstructured":"M. Mazdadi, I. Riadi and A. Luthfi, Live forensics on RouterOS using API services to investigate network attacks, International Journal of Computer Science and Information Security, vol. 15(2), pp. 406\u2013410, 2017."},{"key":"8_CR18","unstructured":"Mozilla Foundation, NSS Key Log Format: Firefox Source Docs, San Francisco, California (firefox-source-docs.mozilla.org\/security\/nss\/index.html), 2024."},{"key":"8_CR19","unstructured":"Norwegian Ministry of Justice and Public Security, Act on Procedure in Criminal Matters (Criminal Procedures Act): Chapter 15 (in Norwegian), Oslo, Norway (lovdata.no\/dokument\/NL\/lov\/1981-05-22-25\/KAPITTEL_4#KAPITTEL_4), 2023."},{"key":"8_CR20","unstructured":"OpenSSL Project Authors, SSL_CTX_set_keylog_callback (www.openssl.org\/docs\/man1.1.1\/man3\/SSL_CTX_set_keylog_callback.html), 2018."},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"D. Pawlaszczyk, M. Bochmann, P. Engler, C. Klaver and C. Hummert, API-based evidence acquisition in the cloud \u2013 A survey, Open Research Europe, vol. 2, article no. 69, 2022.","DOI":"10.12688\/openreseurope.14784.1"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"V. Roussev, A. Barreto and I. Ahmed, API-based forensic acquisition of cloud drives, in Advances in Digital Forensics XII, G. Peterson and S. Shenoi (Eds.), Springer, Cham, Switzerland, pp. 213\u2013235, 2016.","DOI":"10.1007\/978-3-319-46279-0_11"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"V. Roussev and S. McCulley, Forensic analysis of cloud-native artifacts, Digital Investigation, vol. 16(S), pp. S104\u2013S113, 2016.","DOI":"10.1016\/j.diin.2016.01.013"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Y. Shin, H. Kim, S. Kim, D. Yoo, W. Jo and T. Shon, Certificate-injection-based encrypted traffic forensics in AI speaker ecosystem, Forensic Science International: Digital Investigation, vol. 33(S), article no. 301010, 2020.","DOI":"10.1016\/j.fsidi.2020.301010"},{"key":"8_CR25","unstructured":"Softscheck, Reverse engineering the TP-Link HS110, Sankt Augustin, Germany (www.softscheck.com\/en\/blog\/tp-link-reverse-engineering), 2016."},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"M. Stoyanova, Y. Nikoloudakis, S. Panagiotakis, E. Pallis and E. Markakis, A survey of Internet of Things (IoT) forensics: Challenges, approaches and open issues, IEEE Communications Surveys and Tutorials, vol. 22(2), pp. 1191\u20131221, 2020.","DOI":"10.1109\/COMST.2019.2962586"},{"key":"8_CR27","unstructured":"Supreme Court of Norway, HR-2019-610-A (Case no. 19-010640STR-HRET), Criminal Case, Appeal Against Order: Tidal Music AS v. The Public Prosecution Authority, Oslo, Norway (www.domstol.no\/globalassets\/upload\/hret\/decisions-in-english-translation\/hr-2019-610-a.pdf), 2019."},{"key":"8_CR28","unstructured":"Swedish Parliament, Modernized Regulations on the Use of Coercive Measures (in Swedish), Stockholm, Sweden (www.riksdagen.se\/sv\/dokument-lagar\/arende\/betankande\/modernare-regler-for-anvandningen-av-tvangsmedel_H901JuU15), 2022."},{"key":"8_CR29","unstructured":"Swedish Social Democratic Party, Modernized Regulations on the Use of Coercive Measures (in Swedish), Swedish Parliament, Stockholm, Sweden (www.regeringen.se\/rattsliga-dokument\/proposition\/2022\/02\/prop.-202122119), 2022."},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"T. Wu, F. Breitinger and I. Baggili, IoT ignorance is digital forensics research bliss: A survey to understand IoT forensics definitions, challenges and future research directions, Proceedings of the Fourteenth International Conference on Availability, Reliability and Security, article no. 46, 2019.","DOI":"10.1145\/3339252.3340504"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"J. Yang, J. Kim, J. Bang, S. Lee and J. Park, CATCH: Cloud data acquisition through comprehensive and hybrid approaches, Forensic Science International: Digital Investigation, vol. 43(S), article no. 301442, 2022.","DOI":"10.1016\/j.fsidi.2022.301442"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"M. Youn, Y. Lim, K. Seo, H. Chung and S. Lee, Forensic analysis of AI speaker with display Echo Show 2nd generation as a case study, Forensic Science International: Digital Investigation, vol. 38(S), article no. 301130, 2021.","DOI":"10.1016\/j.fsidi.2021.301130"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics XX"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-71025-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T11:15:39Z","timestamp":1745320539000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-71025-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031710247","9783031710254"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-71025-4_8","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"7 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DigitalForensics","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Digital Forensics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New Delhi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 January 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 January 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"digitalforensics2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifip119.org\/Conferences\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}