An android social app forensics adversary model
Date
2016
Authors
Azfar, A.
Choo, K.K.R.
Liu, L.
Editors
Bui, T.X.
Sprague, R.H.
Sprague, R.H.
Advisors
Journal Title
Journal ISSN
Volume Title
Type:
Conference paper
Citation
Proceedings of the ... Annual Hawaii International Conference on System Sciences. Annual Hawaii International Conference on System Sciences, 2016 / Bui, T.X., Sprague, R.H. (ed./s), vol.2016, pp.5597-5606
Statement of Responsibility
Conference Name
49th Annual Hawaii International Conference on System Sciences, HICSS 2016 (5 Jan 2016 - 8 Jan 2016 : Koloa, United States)
Abstract
Android forensics is one of the most studied topics in the mobile forensics literature, partly due to the popularity of Android devices and apps. However, there does not appear to have a formal model that captures the activities undertaken during a forensic investigation. In this paper, we adapt a widely used adversary model from the cryptographic literature to formally capture a forensic investigator's capabilities during the collection and analysis of evidentiary materials from mobile devices. We demonstrate the utility of the model using five popular Android social apps (Twitter, POF Dating, Snapchat, Fling and Pinterest). We recover various information of forensic interest, such as databases, user account information, sent-received images, profile pictures, contact lists, unviewed text messages. We are also able to determine when a notification was sent, a tweet was posted, as well as identifying the Facebook authentication token string used in the apps.
School/Discipline
Dissertation Note
Provenance
Description
Access Status
Rights
Copyright 2016 IEEE