scholarly journals Instant Messaging Forensic Analysis on Android Operating System

Author(s):  
Guntur Maulana Zamroni ◽  
Imam Riadi

WhatsApp (WA) is one of the Instant Messaging (IM) applications used by many people. WA and mobile devices cannot be separated from the possibility of misuse such as for criminal purposes. To handle a crime case involving a mobile device, the investigator needs to use suitable forensic tools and mobile forensic methodology so that the results can be approved and accepted by the law. This research conducted a forensic analysis of WA on unrooted Samsung C9 Pro devices using Belkasoft Evidence, Oxygen Forensic, Magnet AXIOM, and WA Key/DB Extractor. This research gives suggestion about forensic tools for conducting forensic analysis related to WA.  From the research can be seen that there is no tool that can be used to obtain all the WA artifact parameters used in the research. The combination of the Magnet AXIOM and WA Key/DB Extractor is known to get the best results and meets the WA artifact parameters.

2020 ◽  
Vol 10 (12) ◽  
pp. 4231
Author(s):  
Claudinei Morin da Silveira ◽  
Rafael T. de Sousa Jr ◽  
Robson de Oliveira Albuquerque ◽  
Georges D. Amvame Nze ◽  
Gildásio Antonio de Oliveira Júnior ◽  
...  

This paper proposes a new forensic analysis methodology that combines processes, techniques, and tools for physical and logical data acquisition from mobile devices. The proposed methodology allows an overview of the use of the In-System Programming (ISP) technique with the usage of Combination Firmware, aligned with specific collection and analysis processes. The carried out experiments show that the proposed methodology is convenient and practical and provides new possibilities for data acquisition on devices that run the Android Operating System with advanced protection mechanisms. The methodology is also feasible in devices compatible with the usage of Joint Test Action Group (JTAG) techniques and which use Embedded Multimedia Card (eMMC) or Embedded Multi-Chip Package (eMCP) as main memory. The techniques included in the methodology are effective on encrypted devices, in which the JTAG and Chip-Off techniques prove to be ineffective, especially on those that have an unauthorized access protection mechanism enabled, such as lock screen password, blocked bootloader, and Factory Reset Protection (FRP) active. Studies also demonstrate that data preservation and integrity are maintained, which is critical to a digital forensic process.


2015 ◽  
Vol 23 (5) ◽  
pp. 450-475 ◽  
Author(s):  
Himanshu Srivastava ◽  
Shashikala Tapaswi

Purpose – The purpose of this paper is to propose an approach that helps in acquisition of live data as well as data stored in the internal/external memory of android mobile device considering that the data on the device are not much altered during the extraction process. Also, the emphasis is laid on testing the validity of existing forensic tools against the data obtained manually and by using this approach. Smartphones have spurred the mobile computing technology, and Android is widely used as an Operating System in these devices. These days, users store most of their personal information like emails, images, contacts etc., on Phones/Tablets as their data would be readily accessible and thus convenient for them. Design/methodology/approach – Android Operating System is built on the Linux Kernel and scripts to extract data from Android Mobile Device with the use of Android Debugging Bridge have been written. The approach is more focused on the logical acquisition of data from devices rather than acquisition using physical methods. Findings – Live data of the Facebook application running on the device can be extracted. Also, the password of the LuksManager application (used to create an encrypted volume on the device), which is stored in the internal memory, is also extracted and identified. Research limitations/implications – The study has been conducted in an academic environment, thereby limiting external validity. Another limitation is the limited edition of some of the software forensics tools that are used. The full access to these software tools are restricted by Law enforcement and Investigation policies. The research provides a different approach which could aid in criminal investigation activities on mobile devices. Practical implications – The devices which have the latest versions of Android not only store messages and mails, but a lot of information about GPS, as well as information about popular applications like Facebook, WhatsApp, etc. This could practically help a lot in criminal investigation. Originality/value – This study is important because very few works have been done on recent versions (Jellybean and Kitkat) of Android. The proposed approach could extract large amounts of information as compared to earlier approaches with the newer versions of Android having larger memory and new features.


Author(s):  
Venus W. Samawi

These days, peoples expected to move around carrying their mobile devices, talking to friends, completing their work, accessing emails etc. His/her pictures, work, study, even relationship (friends, and family) all is in the mobile device. Therefore, mobile devices (especially smart phones) become an ideal target for different attacks. Mobile computing also becomes important in enterprises and organizations. Therefore, it is important to illustrate the state of art on vulnerabilities and threats on mobile device. This chapter is addressed to explain mobile computing concept, features, architecture, operating systems, and risks to mobile devices. Mobile operating system structureand characteristicsare demonstrated. The author also illustrates mobile security issues, and type of threats to mobile devices. Finally, features and security models of two popular smartphone operating systems, Android and iOS, are illustrated. It was found that the security models of these two smartphones is immature and do not meet the enterprises security policies.


2019 ◽  
Vol 13 (1) ◽  
pp. 162-177
Author(s):  
Yamir Alexander Arévalo Ortega ◽  
Sonia Rocio Corredor Vargas ◽  
Gustavo Adolfo Higuera Castro

Currently, the use of mobile terminals is becoming a necessity for a high number of people around the world which has driven the development of devices with Android operating system; In addition to this, the same indiscriminate access to resources of internet and weak local and international regulations on the use, they have become vulnerable to attacks on the network - injection of malware, ransomware-, among many others. Therefore, this article reviews the hacking tools for the forensic investigation of mobile terminals, proposing from the documentary research a forensic information acquisition model to determine tangible and significant evidences as a probative material.


2018 ◽  
Vol 1 (1) ◽  
pp. 28-30
Author(s):  
Ika Sari

  The ability of the android opening system on the mobile device is getting the day has provided a range of benefits to the application developer. Text to speech is one of android technologi whose benefits are widely used to help a job. In principle, the system TTS (Text To Speech) is a system that can do the conversion from text to speech. In this study, the author intends to design and produce a media application as a tool for learning English, especially in SDN 107400 by utilizing technology to speech as its text. Applications will be aimed at students using smartphone media, especially smartphone with android operating system. The application of text to speech will be used as tools in understanding of various materials as well as the conversations that have been provided applications. With this feature expected in learning English, especially in everyday conversation can be easily done and understood why text to speech will provide an understanding of its users directly via voice.


Author(s):  
S PRABHAKARAN ◽  
DHANESHWARI KUMARI ◽  
RIA AHUJA

Android Application for measuring human body temperature is a new age mobile thermometer. This kind of application already exists but requires manual feeding temperature. In our project, we propose an application which will measure the body temperature automatically while the user is operating the mobile device. It has an in-built function which can trigger alert messages whenever the temperature becomes critical more than normal human body temperature. The display segment of the device is made up of capacitive touch screen, which can act upon the bioelectricity produced by human body with each and every touch. This application requires Android Operating System Version 2.2. It will also diagnose the other diseases the user might have depending upon the symptoms entered.


2011 ◽  
Vol 58-60 ◽  
pp. 2027-2032 ◽  
Author(s):  
Qing Jian Wei ◽  
Jin Ning ◽  
Xi Zhong Lou ◽  
Ren Zhi Ma ◽  
Jia Xu

A mobile remote data monitoring center based on Android operating system is developed for the water environment monitoring system via wireless sensor network (WSN). The monitoring center collects the sensors data from the WSN based on C/S mode. The SQLite is adopted in database module to achieve high memory speed and efficient operation management. Dynamic graphical displays are accomplished to show the topology of the WSN, the state of the nodes and the real-time and historical water environment parameters of the sensor nodes. The experiments show that the software of water environment remote monitoring system, based on mobile devices of Android operating system, can conveniently satisfy the requirements of data collecting and monitoring for water environment monitoring system based on WSN.


2015 ◽  
Vol 772 ◽  
pp. 591-596
Author(s):  
Adrian Iulian Dumitru ◽  
Gheorghe Leonte Mogan ◽  
Lucian Jalbă

Bearing in mind the accessibility and portability of smartphones, they can become a driver assistant of any vehicle without taking into account the vehicle used. Thus, this is an inexpensive and mobile device, accessible to a wide range of platforms being able to analyze and advise the driver of situations that might endanger the safety in traffic. The application proposed in this paper aims to create a comprehensive database for multiple drivers that calibrates and updates its monitored parameters according to the selected profile. The Android operating system was used to create the application. This type of driver assistant is meant only to warn the driver, not to take control of the vehicle.


Sign in / Sign up

Export Citation Format

Share Document