{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T04:04:20Z","timestamp":1750910660447,"version":"3.41.0"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319672076"},{"type":"electronic","value":"9783319672083"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67208-3_3","type":"book-chapter","created":{"date-parts":[[2017,8,30]],"date-time":"2017-08-30T12:21:00Z","timestamp":1504095660000},"page":"41-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Evaluating the Authenticity of Smartphone Evidence"],"prefix":"10.1007","author":[{"given":"Heloise","family":"Pieterse","sequence":"first","affiliation":[]},{"given":"Martin","family":"Olivier","sequence":"additional","affiliation":[]},{"given":"Renier","family":"van Heerden","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,31]]},"reference":[{"issue":"6","key":"3_CR1","doi-asserted-by":"publisher","first-page":"576","DOI":"10.7763\/IJCEE.2013.V5.776","volume":"5","author":"M Al-Hadadi","year":"2013","unstructured":"Al-Hadadi, M., AlShidhani, A.: Smartphone forensics analysis: A case study. International Journal of Computer and Electrical Engineering 5(6), 576\u2013580 (2013)","journal-title":"International Journal of Computer and Electrical Engineering"},{"key":"3_CR2","unstructured":"Android Developers, SmsManager (2015). developer.android.com\/reference\/android\/telephony\/SmsManager.html"},{"key":"3_CR3","unstructured":"Android Developers, Storage Options (2016). developer.android.com\/guide\/topics\/data\/data-storage.html"},{"key":"3_CR4","unstructured":"Bader, M., Baggili, I.: iPhone 3GS forensics: Logical analysis using Apple iTunes Backup Utility. Small Scale Digital Device Forensics Journal 4(1) (2010)"},{"key":"3_CR5","volume-title":"Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet","author":"E Casey","year":"2011","unstructured":"Casey, E.: Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet. Academic Press, Waltham (2011)"},{"key":"3_CR6","volume-title":"Digital Forensic Evidence Examination","author":"F Cohen","year":"2009","unstructured":"Cohen, F.: Digital Forensic Evidence Examination. Fred Cohen & Associates, Livermore (2009)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Curran, K., Robinson, A., Peacocke, S., Cassidy, S.: Mobile phone forensic analysis. In: Li, C., Ho, A. (eds.) Crime Prevention Technologies and Applications for Advancing Criminal Investigations. IGI Global, Hershey, Pennsylvania, pp. 250\u2013262 (2012)","DOI":"10.4018\/978-1-4666-1758-2.ch016"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Eixelsberger, W., Ogris, M., Gall, H., Bellay, B.: Software architecture recovery of a program family. In: Proceedings of the Twentieth International Conference on Software Engineering, pp. 508\u2013511 (1998)","DOI":"10.1109\/ICSE.1998.671617"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of the Sixteenth ACM Conference on Computer and Communications Security, pp. 235\u2013245 (2009)","DOI":"10.1145\/1653662.1653691"},{"key":"3_CR10","unstructured":"Freiling, F., Spreitzenbarth, M., Schmitt, S.: Forensic analysis of smartphones: the Android Data Extractor Lite (ADEL). In: Proceedings of the ADFSL Conference on Digital Forensics, Security and Law, pp. 151\u2013160 (2011)"},{"key":"3_CR11","unstructured":"Garfinkel, S.: Anti-forensics: techniques, detection and countermeasures. In: Proceedings of the Second International Conference on i-Warfare and Security, pp. 77\u201384 (2007)"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Goadrich, M., Rogers, M.: Smart smartphone development: iOS versus Android. In: Proceedings of the Forty-Second ACM Technical Symposium on Computer Science Education, pp. 607\u2013612 (2011)","DOI":"10.1145\/1953163.1953330"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Govindaraj, J., Verma, R., Mata, R., Gupta, G.: iSecureRing: Forensic-ready secure iOS apps for jailbroken iPhones. Poster paper presented at the IEEE Symposium on Security and Privacy (2014)","DOI":"10.1007\/978-3-319-24123-4_14"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Grosskurth, A., Godfrey, M.: A reference architecture for web browsers. In: Proceedings of the Twenty-First IEEE International Conference on Software Maintenance, pp. 661\u2013664 (2005)","DOI":"10.1109\/ICSM.2005.13"},{"issue":"6","key":"3_CR15","first-page":"314","volume":"70","author":"M Hannon","year":"2014","unstructured":"Hannon, M.: An increasingly important requirement: Authentication of digital evidence. Journal of the Missouri Bar 70(6), 314\u2013323 (2014)","journal-title":"Journal of the Missouri Bar"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"Harris, R.: Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem. Digital Investigation 3(S), S44\u2013S49 (2006)","DOI":"10.1016\/j.diin.2006.06.005"},{"key":"3_CR17","unstructured":"Hassan, A., Holt, R.: A reference architecture for web servers. In: Proceedings of the Seventh Working Conference on Reverse Engineering, pp. 150\u2013159 (2000)"},{"key":"3_CR18","unstructured":"International Data Corporation Research, Smartphone Growth Expected to Drop to Single Digits in 2016, Led by China\u2019s Transition from Developing to Mature Market, According to IDC. Press Release, Framingham, Massachusetts, March 3, 2016"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Iulia-Maria, T., Ciocarlie, H.: Best practices in iPhone programming: model-view-controller architecture \u2013 carousel component development. In: Proceedings of the International Conference on Computer as a Tool (2011)","DOI":"10.1109\/EUROCON.2011.5929308"},{"key":"3_CR20","unstructured":"Jacobs, B.: iOS from Scratch with Swift: Data Persistence and Sandboxing on iOS, Envato Tuts+, December 25, 2015. code.tutsplus.com\/tutorials\/ios-from-scratch-with-swift-data-persistence-and-sandboxing-on-ios-cms-25505"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Joorabchi, M., Mesbah, A.: Reverse engineering iOS mobile applications. In: Proceedings of the Nineteenth Working Conference on Reverse Engineering, pp. 177\u2013186 (2012)","DOI":"10.1109\/WCRE.2012.27"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Kubi, A., Saleem, S., Popov, O.: Evaluation of some tools for extracting e-evidence from mobile devices. In: Proceedings of the Fifth International Conference on the Application of Information and Communication Technologies (2011)","DOI":"10.1109\/ICAICT.2011.6110999"},{"key":"3_CR23","unstructured":"Lessard, J., Kessler, G.: Android forensics: Simplifying cell phone examinations. Small Scale Digital Device Forensics Journal 4(1) (2010)"},{"key":"3_CR24","series-title":"IFIP \u2014 The International Federation for Information Processing","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/0-387-31163-7_5","volume-title":"Advances in Digital Forensics","author":"M Losavio","year":"2006","unstructured":"Losavio, M.: Non-technical manipulation of digital data. In: Pollitt, M., Shenoi, S. (eds.) DigitalForensics 2005. ITIFIP, vol. 194, pp. 51\u201363. Springer, Boston (2006). doi:10.1007\/0-387-31163-7_5"},{"issue":"4","key":"3_CR25","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MSP.2011.85","volume":"9","author":"C Miller","year":"2011","unstructured":"Miller, C.: Mobile attacks and defense. IEEE Security and Privacy 9(4), 68\u201370 (2011)","journal-title":"IEEE Security and Privacy"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Pieterse, H., Olivier, M., van Heerden, R.: Playing hide-and-seek: detecting the manipulation of android timestamps. In: Proceedings of the Information Security for South Africa Conference (2015)","DOI":"10.1109\/ISSA.2015.7335065"},{"issue":"2","key":"3_CR27","doi-asserted-by":"crossref","first-page":"92","DOI":"10.23919\/SAIEE.2016.8531545","volume":"107","author":"H Pieterse","year":"2016","unstructured":"Pieterse, H., Olivier, M., van Heerden, R.: Reference architecture for Android applications to support the detection of manipulated evidence. SAIEE Africa Research Journal 107(2), 92\u2013103 (2016)","journal-title":"SAIEE Africa Research Journal"},{"key":"3_CR28","unstructured":"Prasad, A.: Android to rule smartphone market with 85% share in 2020 says IDC report, International Business Times, March 5, 2016"},{"issue":"4","key":"3_CR29","first-page":"58","volume":"6","author":"I Sporea","year":"2012","unstructured":"Sporea, I., Aziz, B., McIntyre, Z.: On the availability of anti-forensic tools for smartphones. International Journal of Security 6(4), 58\u201364 (2012)","journal-title":"International Journal of Security"},{"key":"3_CR30","unstructured":"Thomson, L.: Mobile devices: New challenges for admissibility of electronic evidence. Scitech Lawyer 9(3) (2013)"},{"key":"3_CR31","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-662-44952-3_14","volume-title":"Advances in Digital Forensics X","author":"R Verma","year":"2014","unstructured":"Verma, R., Govindaraj, J., Gupta, G.: Preserving dates and timestamps for incident handling in android smartphones. In: Peterson, G., Shenoi, S. (eds.) DigitalForensics 2014. IAICT, vol. 433, pp. 209\u2013225. Springer, Heidelberg (2014). doi:10.1007\/978-3-662-44952-3_14"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics XIII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67208-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T08:22:59Z","timestamp":1750839779000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-67208-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319672076","9783319672083"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67208-3_3","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"31 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DigitalForensics","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Digital Forensics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 January 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 February 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"digitalforensics2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifip119.org\/Conferences\/ConferenceProgram2017.pdf","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}