The Significance of Different Backup Applications in Retrieving Social Networking Forensic Artifacts From Android-Based Mobile Devices

被引:0
作者
Al Mushcab, Reema [1 ]
Gladyshev, Pavel [1 ]
机构
[1] Univ Coll Dublin, Sch Comp Sci & Informat, Dublin, Ireland
来源
2015 SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND CYBER FORENSICS (INFOSEC) | 2015年
关键词
Android; Instagram; Path; forensic; backup;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The characteristics of mobile devices are becoming increasingly like those of modern-day computers in terms of speed, memory, functionality, and external storage capabilities. These factors, in addition to the widespread availability of Internet access create an environment where social networking applications thrive. This paper focuses on conducting forensic analysis on two popular social networking applications: Instagram and Path on an Android-based HTC One M8 mobile phone. The analysis consisted of rooting the mobile device, installing Instagram and Path on the device, performing common user activities via each application, acquiring several logical images of the device, and then finally conducting manual forensic analysis on each acquired image. Since Android does not have a unified backup utility, the logical acquisition was performed using 4 different Android backup applications (MyBackup Pro, Titanium Backup, Helium Backup, and Apps Backup & Restore). The test results have shown that a large portion of the conducted activities is indeed stored on the device's internal memory. However, the extent of the recovered information ultimately depended on which backup application was used to create the logical image of the Android device.
引用
收藏
页码:66 / 71
页数:6
相关论文
共 17 条
[1]  
Agomuoh Fionna., INT BUSINESS TIMES
[2]  
Al Mushcab R., 2015, 3 INT WORKS IN PRESS
[3]   Forensic analysis of social networking applications on mobile devices [J].
Al Mutawa, Noora ;
Baggili, Ibrahim ;
Marrington, Andrew .
DIGITAL INVESTIGATION, 2012, 9 :S24-S33
[4]  
Al-Zarouni M., 2006, AUSTR DIG FOR C
[5]  
[Anonymous], INT J COMPUTER APPL
[6]  
Cogen D., THE UNLOCKER
[7]  
Elenkov N., 2012, ANDROID EXPLORATIONS
[8]  
Guiding Tech, 2014, GT EXPL WHAT AR ANDR
[9]  
Holt M., 2014, FLORIDA BAR J, V88
[10]  
Hoog A., 2011, Android Forensics, P1