Open Access   Article Go Back

Identification of Tampered SMS Messages in iPhone – A Case Study

Eswara Sai Prasad Chunduru1 , Krishna Mangarai2 , Subrahmani Babu3 , Manohar B Pathak4

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-1 , Page no. 386-395, Jan-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i1.386395

Online published on Jan 31, 2019

Copyright © Eswara Sai Prasad Chunduru, Krishna Mangarai, Subrahmani Babu, Manohar B Pathak . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Eswara Sai Prasad Chunduru, Krishna Mangarai, Subrahmani Babu, Manohar B Pathak, “Identification of Tampered SMS Messages in iPhone – A Case Study,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.386-395, 2019.

MLA Style Citation: Eswara Sai Prasad Chunduru, Krishna Mangarai, Subrahmani Babu, Manohar B Pathak "Identification of Tampered SMS Messages in iPhone – A Case Study." International Journal of Computer Sciences and Engineering 7.1 (2019): 386-395.

APA Style Citation: Eswara Sai Prasad Chunduru, Krishna Mangarai, Subrahmani Babu, Manohar B Pathak, (2019). Identification of Tampered SMS Messages in iPhone – A Case Study. International Journal of Computer Sciences and Engineering, 7(1), 386-395.

BibTex Style Citation:
@article{Chunduru_2019,
author = {Eswara Sai Prasad Chunduru, Krishna Mangarai, Subrahmani Babu, Manohar B Pathak},
title = {Identification of Tampered SMS Messages in iPhone – A Case Study},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2019},
volume = {7},
Issue = {1},
month = {1},
year = {2019},
issn = {2347-2693},
pages = {386-395},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3517},
doi = {https://doi.org/10.26438/ijcse/v7i1.386395}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i1.386395}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3517
TI - Identification of Tampered SMS Messages in iPhone – A Case Study
T2 - International Journal of Computer Sciences and Engineering
AU - Eswara Sai Prasad Chunduru, Krishna Mangarai, Subrahmani Babu, Manohar B Pathak
PY - 2019
DA - 2019/01/31
PB - IJCSE, Indore, INDIA
SP - 386-395
IS - 1
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
390 188 downloads 137 downloads
  
  
           

Abstract

Mobile Phones, now-a-days have become the primary source of evidence in any type of investigation for providing initial leads for framing the future investigation as well as primary evidence. The retrieval and analysis of SMS messages, including deleted ones from the memory of smart mobiles is one of the main process of mobile phone forensics. With the evolution of technology, criminals can manipulate the SMS database and tamper the messages to prove their virtue and mis-guide the investigation. In the current paper we have discussed the method adopted for proving the authenticity of SMS messages retrieved during the analysis of an iPhone.

Key-Words / Index Term

SMS Messages, iPhone, Tampering, Authenticity, iOS

References

[1] Practical Investigations of Digital Forensics Tools for Mobile Devices by Maynard Yates II, M.S. Florida Agricultural and Mechanical University Department of Computer and Information Sciences Technical Building A, Room 211 Tallahassee, FL 32307-5100 Maynard1.yates@famu.edu retrieved December 2018.
[2] Barrios, Rita M. and Lehrfeld, Michael R., "Ios Mobile Device Forensics: Initial Analysis" (2011). Annual ADFSL Conference on Digital Forensics, Security and Law. 4. http://commons.erau.edu/adfsl/2011/friday/4 December 2018
[3] Hoene, Thomas & Creutzburg, Reiner. (2011). iPhone forensics: a practical overview with certain commercial software. 10.1117/12.884589. December 2018.
[4] Cheema, Ahmad & Iqbal, Waseem & Ali, Waqas. (2014). An Open Source Toolkit for iOS Filesystem Forensics. 10.1007/978-3-662-44952-3_15. December 2018.
[5] Forensic Analysis on iOS Devices Author: Tim Proffitt, tim@timproffitt.com https://www.sans.org/reading-room/whitepapers/forensics/forensic-analysis-ios-devices-34092 December 2018.
[6] iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices by Andrew HoogKatie Strzempka.
[7] Bader, M., & Baggili, I. (2010). iPhone 3GS forensics: logical analysis using apple itunes backup utility. Small scale digital device forensics journal, 4(1), 1-15 January 2019.
[8] SQLite Wikipedia article. URL https://en.wikipedia.org/wiki/SQLite January 2019.
[9] How to back up your iPhone, iPad, and iPod touch URL https://support.apple.com/en-in/HT203977 January 2019.
[10] Parsing the iPhone SMS Database article. URL https://linuxsleuthing.blogspot.com/2011/02/parsing-iphone-sms-database.html January 2019.
[11] Wikipedia article. URL https://www.theiphonewiki.com/wiki/Messages#msg_group January 2019.
[12] https://smarterforensics.com/2014/09/sqlite-parser-theres-a-new-gui/ January 2019.
[13] https://smarterforensics.com/2017/09/time-is-not-on-our-side-when-it-comes-to-messages-in-ios-11/ visited on 19/01/2019.
[14] https://linuxsleuthing.blogspot.com/2012/10/whos-texting-ios6-smsdb.html visited on 19/01/2019.
[15] https://www.codeproject.com/Articles/833535/Accessing-Backed-Up-iPhone-SMS-Messages visited on 19/01/2019.
[16] https://blog.jverkamp.com/2015/01/27/ios-backups-in-racket-messages/ visited on 19/01/2019.
[17] http://mrdreigon.com/ios6-sms-database-investigation/ visited on 19/01/2019.
[18] https://www.vivekmchawla.com/2013/04/erd-crows-foot-relationship-symbols-quick-reference.html/ visited on 19/01/2019.
[19] Forensic investigations of Apple’s iPhone by Mats Engman, 2013. https://www.diva-portal.org/smash/get/diva2:651693/fulltext01.pdf retreived January 2019.
[20] Smartphone Forensics Analysis: A Case Study by Mubarak Al-Hadadi and Ali AlShidhani International Journal of Computer and Electrical Engineering, Vol. 5, No. 6, December 2013. January 2019.