Amazon Kindle Fire HD forensics
Document Type
Conference Proceeding
Source of Publication
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Publication Date
1-1-2014
Abstract
© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2014. This research presents two developed approaches for the forensic acquisition of an Amazon Kindle Fire HD. It describes the forensic acquisition and analysis of the Amazon Kindle Fire HD device. Two developed methods of acquisition are presented; one requiring a special cable to reflash the boot partition of the device with a forensic acquisition environment (Method A), and the other exploiting a vulnerability in the device’s Android operating system (Method B). A case study is then presented showing the various digital evidence that can be extracted from the device. The results indicate that Method A is more favorable because it utilizes a general methodology that does not exploit a vulnerability that could potentially be patched by Amazon in future software updates.
DOI Link
ISBN
9783319142883
ISSN
Publisher
Springer Verlag
Volume
132
First Page
39
Last Page
50
Disciplines
Computer Sciences
Keywords
Acquisition, Amazon Kindle Fire HD, Analysis, Android forensics, Digital, Forensic flashing, Forensics
Scopus ID
Recommended Citation
Iqbal, Asif; Alobaidli, Hanan; Marrington, Andrew; and Baggili, Ibrahim, "Amazon Kindle Fire HD forensics" (2014). All Works. 399.
https://zuscholars.zu.ac.ae/works/399
Indexed in Scopus
yes
Open Access
no