Computer forensics, Cyber forensics, Mobile device forensics
Computer Engineering | Electrical and Computer Engineering | Forensic Science and Technology
In this paper, we present LiFE (Logical iOS Forensics Examiner), an open source iOS backup forensics examination tool. This tool helps both researchers and practitioners alike in both understanding the backup structures of iOS devices and forensically examining iOS backups. The tool is currently capable of parsing device information, call history, voice messages, GPS locations, conversations, notes, images, address books, calendar entries, SMS messages, Aux locations, facebook data and e-mails. The tool consists of both a manual interface (where the user is able to manually examine the backup structures) and an automated examination interface (where the tool pulls out evidence from known files). Additionally, LiFE is designed so that the evidence located in files would retain its integrity. It is important to note that most of the evidence examined by LiFE is parsed from SQLite databases that are backed up by iTunes. LiFE also offers an extensibility option to the user, where an examiner can add new evidence SQLite files to the application that can be automatically parsed, and these known files are then automatically populated in the automated GUI’s toolbar with an icon added to the investigator’s liking.
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.
Baggili, Ibrahim; Al Awawdeh, Shadi; and Moore, Jason, "LiFE (Logical iOS Forensics Examiner): An Open Source iOS Backup Forensics Examination Tool" (2014). Electrical & Computer Engineering and Computer Science Faculty Publications. 13.
Baggili, I., Al Awawdeh, S., & Moore, J. (2014, May). LiFE (Logical iOS Forensics Examiner): An Open Source iOS backup forensics examination tool. In Proceedings of the Conference on Digital Forensics, Security and Law (pp. 41-52).