Inicio  /  Applied Sciences  /  Vol: 12 Par: 21 (2022)  /  Artículo
ARTÍCULO
TITULO

Mobile Cyber Forensic Investigations of Web3 Wallets on Android and iOS

Mohammad Meraj Mirza    
Akif Ozer and Umit Karabiyik    

Resumen

As many new mobile device applications are leveraging blockchain technologies, Web3 wallets were created as a tool to store, manage, stack, and perform cryptocurrency-related transactions. Therefore, it is necessary to investigate what these new nontraditional applications store in their mobile apps and what can be recovered through cyberforensic procedures, which can help the cyberforensics community, tool developers, and law enforcement.

 Artículos similares

       
 
Youn Kyu Lee and Dohoon Kim    
Event-based system (EBS) is prevalent in various systems including mobile cyber physical systems (MCPSs), Internet of Things (IoT) applications, mobile applications, and web applications, because of its particular communication model that uses implicit i... ver más
Revista: Applied Sciences

 
S.V Manikanthan,T Padmapriya,Azham Hussain,E Thamizharasi     Pág. pp. 4 - 19
Nowadays, Artificial Intelligence is being integrated into the modern innovations, including mobile, Electronic gadgets and as well as our daily lives. The smartphones are becoming a crucial and indistinguishable part of modern life. Whether that be... ver más

 
Ekin Ozer and Maria Q. Feng    
With the help of community participants, smartphones can become useful wireless sensor network (WSN) components, form a self-governing structural health monitoring (SHM) system, and merge structural mechanics with participatory sensing and server computi... ver más
Revista: Applied Sciences

 
Nelson H. Carreras Guzman and Adam Gergo Mezovari    
From autonomous vehicles to robotics and machinery, organizations are developing autonomous transportation systems in various domains. Strategic incentives point towards a fourth industrial revolution of cyber?physical systems with higher levels of autom... ver más
Revista: Information

 
Mohamad Adib Azhar,Madihah Mohd Saudi,Azuan Ahmad,Azreena Abu Bakar     Pág. pp. 61 - 79
Internet users all over the world are highly exposed to social media exploitation, where they are vulnerable to be targeted by this cyber-attack. Furthermore, excessive use of social media leads to Internet Addiction Disorder (IAD). Fortunately, social m... ver más