scholarly journals TraceGen: User activity emulation for digital forensic test image generation

2021 ◽  
Vol 38 ◽  
pp. 301133
Author(s):  
Xiaoyu Du ◽  
Christopher Hargreaves ◽  
John Sheppard ◽  
Mark Scanlon
Author(s):  
Matthew Patrick ◽  
Matthew D. Castle ◽  
Richard O. J. H. Stutt ◽  
Christopher A. Gilligan

2019 ◽  
Author(s):  
K Herdinai ◽  
S Urbán ◽  
Z Besenyi ◽  
L Pávics ◽  
N Zsótér ◽  
...  

2013 ◽  
Vol 45 (4) ◽  
pp. 438-445
Author(s):  
Qingbai ZHAO ◽  
Xiaofei ZHANG ◽  
Danni SUI ◽  
Zhijin ZHOU ◽  
Qicai CHEN ◽  
...  

2017 ◽  
Vol 2 (11) ◽  
pp. 8-16
Author(s):  
Moses Ashawa ◽  
Innocent Ogwuche

The fast-growing nature of instant messaging applications usage on Android mobile devices brought about a proportional increase on the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store significant amount of information in the various memory partitions when Instant Messaging (IM) applications (WhatsApp, Skype, and Facebook) are executed on them. As a result of the enormous crimes committed using instant messaging applications, and the amount of electronic based traces of evidence that can be retrieved from the suspect’s device where an investigation could convict or refute a person in the court of law and as such, mobile phones have become a vulnerable ground for digital evidence mining. This paper aims at using forensic tools to extract and analyse left artefacts digital evidence from IM applications on Android phones using android studio as the virtual machine. Digital forensic investigation methodology by Bill Nelson was applied during this research. Some of the key results obtained showed how digital forensic evidence such as call logs, contacts numbers, sent/retrieved messages, and images can be mined from simulated android phones when running these applications. These artefacts can be used in the court of law as evidence during cybercrime investigation.


Sign in / Sign up

Export Citation Format

Share Document