An Android Social App Forensics Adversary Model

被引:22
作者
Azfar, Abdullah [1 ]
Choo, Kim-Kwang Raymond [1 ]
Liu, Lin [2 ]
机构
[1] Univ South Australia, Informat Assurance Res Grp, Adelaide, SA, Australia
[2] Univ South Australia, Sch Informat Technol & Math Sci, Adelaide, SA, Australia
来源
PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS 2016) | 2016年
关键词
D O I
10.1109/HICSS.2016.693
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Android forensics is one of the most studied topics in the mobile forensics literature, partly due to the popularity of Android devices and apps. However, there does not appear to have a formal model that captures the activities undertaken during a forensic investigation. In this paper, we adapt a widely used adversary model from the cryptographic literature to formally capture a forensic investigator's capabilities during the collection and analysis of evidentiary materials from mobile devices. We demonstrate the utility of the model using five popular Android social apps (Twitter, POF Dating, Snapchat, Fling and Pinterest). We recover various information of forensic interest, such as databases, user account information, sent-received images, profile pictures, contact lists, unviewed text messages. We are also able to determine when a notification was sent, a tweet was posted, as well as identifying the Facebook authentication token string used in the apps.
引用
收藏
页码:5597 / 5606
页数:10
相关论文
共 24 条
  • [1] Forensic analysis of social networking applications on mobile devices
    Al Mutawa, Noora
    Baggili, Ibrahim
    Marrington, Andrew
    [J]. DIGITAL INVESTIGATION, 2012, 9 : S24 - S33
  • [2] Forensic analysis of WhatsApp Messenger on Android smartphones
    Anglano, Cosimo
    [J]. DIGITAL INVESTIGATION, 2014, 11 (03) : 201 - 213
  • [3] [Anonymous], 2011, TR201104 TU DARMST
  • [4] [Anonymous], 2006, GUIDE INTEGRATING FO, DOI DOI 10.6028/NIST.SP.800-86
  • [5] A critical review of 7 years of Mobile Device Forensics
    Barmpatsalou, Konstantia
    Damopoulos, Dimitrios
    Kambourakis, Georgios
    Katos, Vasilios
    [J]. DIGITAL INVESTIGATION, 2013, 10 (04) : 323 - 349
  • [6] Smart phone for mobile commerce
    Chang, Yung Fu
    Chen, C. S.
    Zhou, Hao
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (04) : 740 - 747
  • [7] Chu H.C., 2012, Information Technology Convergence, Secure and Trust Computing, and Data Management, P171, DOI DOI 10.1007/978-94-007-5083-8_22
  • [8] The disclosure of an Android smartphone's digital footprint respecting the Instant Messaging utilizing Skype and MSN
    Chu, Hai-Cheng
    Lo, Chi-Hsiang
    Chao, Han-Chieh
    [J]. ELECTRONIC COMMERCE RESEARCH, 2013, 13 (03) : 399 - 410
  • [9] Dezfouli F.N., 2015, AUSTR J FORENSIC SCI
  • [10] Exfiltrating data from Android devices
    Do, Quang
    Martini, Ben
    Choo, Kim-Kwang Raymond
    [J]. COMPUTERS & SECURITY, 2015, 48 : 74 - 91