An android social app forensics adversary model

Date

2016

Authors

Azfar, A.
Choo, K.K.R.
Liu, L.

Editors

Bui, T.X.
Sprague, R.H.

Advisors

Journal Title

Journal ISSN

Volume Title

Type:

Conference paper

Citation

Proceedings of the ... Annual Hawaii International Conference on System Sciences. Annual Hawaii International Conference on System Sciences, 2016 / Bui, T.X., Sprague, R.H. (ed./s), vol.2016, pp.5597-5606

Statement of Responsibility

Conference Name

49th Annual Hawaii International Conference on System Sciences, HICSS 2016 (5 Jan 2016 - 8 Jan 2016 : Koloa, United States)

Abstract

Android forensics is one of the most studied topics in the mobile forensics literature, partly due to the popularity of Android devices and apps. However, there does not appear to have a formal model that captures the activities undertaken during a forensic investigation. In this paper, we adapt a widely used adversary model from the cryptographic literature to formally capture a forensic investigator's capabilities during the collection and analysis of evidentiary materials from mobile devices. We demonstrate the utility of the model using five popular Android social apps (Twitter, POF Dating, Snapchat, Fling and Pinterest). We recover various information of forensic interest, such as databases, user account information, sent-received images, profile pictures, contact lists, unviewed text messages. We are also able to determine when a notification was sent, a tweet was posted, as well as identifying the Facebook authentication token string used in the apps.

School/Discipline

Dissertation Note

Provenance

Description

Access Status

Rights

Copyright 2016 IEEE

License

Grant ID

Call number

Persistent link to this record