Attacks on Mobile Devices and Their Forensics: A Survey

  • Unique Paper ID: 188057
  • PageNo: 600-604
  • Abstract:
  • Mobile devices have evolved from simple communication tools into indispensable platforms for banking, e-commerce, entertainment, and enterprise applications. Their ubiquity and always-connected nature make them attractive targets for attackers. Adversaries exploit vulnerabilities in operating systems, applications, networks, and even user behavior to compromise confidentiality, integrity, and availability of data. The rapid evolution of attack vectors demands equally advanced forensic techniques to preserve, acquire, and analyze digital evidence in a legally admissible manner. This survey provides a comprehensive overview of mobile attack taxonomies, forensic investigation methodologies, and tools. It highlights challenges including encryption, cloud storage, and device heterogeneity. Additionally, the paper reviews recent research contributions and outlines emerging trends such as artificial intelligence, blockchain for evidence integrity, and privacy-preserving forensic frameworks. By synthesizing literature and practices, this survey aims to assist both researchers and practitioners in understanding the dynamic landscape of mobile security and digital forensics.

Copyright & License

Copyright © 2026 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

BibTeX

@article{188057,
        author = {Shruti Gosavi and Dr. Anup Girdhar},
        title = {Attacks on Mobile Devices and Their Forensics: A Survey},
        journal = {International Journal of Innovative Research in Technology},
        year = {2025},
        volume = {12},
        number = {7},
        pages = {600-604},
        issn = {2349-6002},
        url = {https://ijirt.org/article?manuscript=188057},
        abstract = {Mobile devices have evolved from simple communication tools into indispensable platforms for banking, e-commerce, entertainment, and enterprise applications. Their ubiquity and always-connected nature make them attractive targets for attackers. Adversaries exploit vulnerabilities in operating systems, applications, networks, and even user behavior to compromise confidentiality, integrity, and availability of data. The rapid evolution of attack vectors demands equally advanced forensic techniques to preserve, acquire, and analyze digital evidence in a legally admissible manner. This survey provides a comprehensive overview of mobile attack taxonomies, forensic investigation methodologies, and tools. It highlights challenges including encryption, cloud storage, and device heterogeneity. Additionally, the paper reviews recent research contributions and outlines emerging trends such as artificial intelligence, blockchain for evidence integrity, and privacy-preserving forensic frameworks. By synthesizing literature and practices, this survey aims to assist both researchers and practitioners in understanding the dynamic landscape of mobile security and digital forensics.},
        keywords = {Mobile Security, Mobile Forensics, Cyber Attacks, Malware, Digital Evidence, Cloud Forensics, Blockchain, Artificial Intelligence},
        month = {December},
        }

Cite This Article

Gosavi, S., & Girdhar, D. A. (2025). Attacks on Mobile Devices and Their Forensics: A Survey. International Journal of Innovative Research in Technology (IJIRT). https://doi.org/doi.org/10.64643/IJIRTV12I7-188057-459

Related Articles