Take a sneak peek at the new NIST.gov and let us know what you think!
(Please note: some content may not be complete on the beta site.).

View the beta site
NIST logo

Publication Citation: PDA Forensic Tools: an Overview and Analysis

NIST Authors in Bold

Author(s): Richard P. Ayers; Wayne Jansen;
Title: PDA Forensic Tools: an Overview and Analysis
Published: August 01, 2004
Abstract: Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet these devices are being used increasingly in military and government agencies, hospitals, and other business settings, where they pose a risk to security and privacy, not only from sensitive information they may contain, but also from the means they typically offer to access such information over wireless networks. User authentication is the first line of defense for a mobile device that falls into the hands of an unauthorized individual. However, motivating users to enable simple PIN or password mechanisms and periodically update their authentication information is difficult at best. This paper describes a general-purpose mechanism for authenticating users through image selection. The underlying rationale is that image recall is an easy and natural way for users to authenticate, removing a serious barrier to users' compliance with corporate policy. The approach described distinguishes itself from other attempts in this area in several ways, including style-dependent image selection, password reuse, and embedded salting, which collectively overcome a number of problems in employing knowledge-based authentication on mobile devices.
Citation: NIST Interagency/Internal Report (NISTIR) - 7100
Keywords: computer forensics, forensic software, forensic toolkits, PDA, Personal Digital Assistant
Research Areas: Computer Forensics, Computer Security
PDF version: PDF Document Click here to retrieve PDF version of paper (3MB)