基于android的即时通讯应用程序的取证分析

I. Riadi, Arizona Firdonsyah
{"title":"基于android的即时通讯应用程序的取证分析","authors":"I. Riadi, Arizona Firdonsyah","doi":"10.1109/TSSA.2018.8708798","DOIUrl":null,"url":null,"abstract":"The rapid development of Android technology has an impact on the increasing number of devices that use Android as operating system. Applications developed for the Android platform are also very diverse, including instant messaging applications. Short Message Service, Blackberry Messenger, Line, and WhatsApp are multi-platform instant messaging applications with lots of users, so the possibility of digital crime that occurs by digital crime perpetrators has also increased significantly. The process of investigating digital crime cases require digital evidence to solve it. The process of obtaining digital evidence requires a forensic investigation technique against the physical evidence that has been obtained using certain methods. This research focuses on forensic steps to obtain digital evidence from Instant Messaging application on Android smartphones and smartwatches using widely used mobile forensic software, namely, Andriller, Oxygen Forensic Suite, WhatsApp DB / Key Extractor, and Metasploit using a framework developed by the National Institute of Standard Technology (NIST). The results of this research are presented in the form of a comparison table of artifact extraction success rate from each tool. The conclusions obtained from this research are: forensic measures carried out based on the NIST Mobile Forensics framework can be applied to the digital evidence retrieval process Instant Messaging applications on smartphones and Android smartwatches with Oxygen Forensic Suite has the highest successful rate at 57.14% on BBM and WhatsApp artifact extraction and 42.85 on Smartwatch’s SMS and LINE Messenger artifact extraction. WhatsApp DB/ Key Extractor has the highest successful rate at 42.85 on Smartphone’s WhatsApp artifact extraction but has weakness in Smartwatch’s SMS, BBM, and LINE Messenger artifact extraction and Metasploit has the lowest success ratio.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Forensic Analysis of Android-based Instant Messaging Application\",\"authors\":\"I. Riadi, Arizona Firdonsyah\",\"doi\":\"10.1109/TSSA.2018.8708798\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The rapid development of Android technology has an impact on the increasing number of devices that use Android as operating system. Applications developed for the Android platform are also very diverse, including instant messaging applications. Short Message Service, Blackberry Messenger, Line, and WhatsApp are multi-platform instant messaging applications with lots of users, so the possibility of digital crime that occurs by digital crime perpetrators has also increased significantly. The process of investigating digital crime cases require digital evidence to solve it. The process of obtaining digital evidence requires a forensic investigation technique against the physical evidence that has been obtained using certain methods. This research focuses on forensic steps to obtain digital evidence from Instant Messaging application on Android smartphones and smartwatches using widely used mobile forensic software, namely, Andriller, Oxygen Forensic Suite, WhatsApp DB / Key Extractor, and Metasploit using a framework developed by the National Institute of Standard Technology (NIST). The results of this research are presented in the form of a comparison table of artifact extraction success rate from each tool. The conclusions obtained from this research are: forensic measures carried out based on the NIST Mobile Forensics framework can be applied to the digital evidence retrieval process Instant Messaging applications on smartphones and Android smartwatches with Oxygen Forensic Suite has the highest successful rate at 57.14% on BBM and WhatsApp artifact extraction and 42.85 on Smartwatch’s SMS and LINE Messenger artifact extraction. WhatsApp DB/ Key Extractor has the highest successful rate at 42.85 on Smartphone’s WhatsApp artifact extraction but has weakness in Smartwatch’s SMS, BBM, and LINE Messenger artifact extraction and Metasploit has the lowest success ratio.\",\"PeriodicalId\":159795,\"journal\":{\"name\":\"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TSSA.2018.8708798\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TSSA.2018.8708798","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

随着Android技术的飞速发展,越来越多的设备使用Android作为操作系统。为Android平台开发的应用程序也非常多样化,包括即时消息应用程序。短消息服务,黑莓信使,Line, WhatsApp是多平台的即时通讯应用程序,拥有大量的用户,因此数字犯罪犯罪者发生数字犯罪的可能性也大大增加。调查数字犯罪案件的过程需要数字证据来解决。在获取数字证据的过程中,需要对使用一定方法获得的物证进行法医调查技术。本研究的重点是取证步骤,从Android智能手机和智能手表上的即时通讯应用程序中获取数字证据,使用广泛使用的移动取证软件,即Andriller, Oxygen forensic Suite, WhatsApp DB / Key Extractor和Metasploit,使用国家标准技术研究所(NIST)开发的框架。本研究的结果以每个工具的工件提取成功率比较表的形式呈现。本研究得出的结论是:基于NIST移动取证框架开展的取证措施可以应用于数字证据检索过程。在智能手机和Android智能手表上的即时通讯应用中,使用Oxygen forensic Suite的BBM和WhatsApp伪迹提取成功率最高,为57.14%,在智能手表的SMS和LINE Messenger伪迹提取成功率最高,为42.85。WhatsApp DB/ Key Extractor在智能手机的WhatsApp神器提取方面的成功率最高,为42.85,但在智能手表的SMS, BBM和LINE Messenger神器提取方面存在弱点,Metasploit的成功率最低。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Forensic Analysis of Android-based Instant Messaging Application
The rapid development of Android technology has an impact on the increasing number of devices that use Android as operating system. Applications developed for the Android platform are also very diverse, including instant messaging applications. Short Message Service, Blackberry Messenger, Line, and WhatsApp are multi-platform instant messaging applications with lots of users, so the possibility of digital crime that occurs by digital crime perpetrators has also increased significantly. The process of investigating digital crime cases require digital evidence to solve it. The process of obtaining digital evidence requires a forensic investigation technique against the physical evidence that has been obtained using certain methods. This research focuses on forensic steps to obtain digital evidence from Instant Messaging application on Android smartphones and smartwatches using widely used mobile forensic software, namely, Andriller, Oxygen Forensic Suite, WhatsApp DB / Key Extractor, and Metasploit using a framework developed by the National Institute of Standard Technology (NIST). The results of this research are presented in the form of a comparison table of artifact extraction success rate from each tool. The conclusions obtained from this research are: forensic measures carried out based on the NIST Mobile Forensics framework can be applied to the digital evidence retrieval process Instant Messaging applications on smartphones and Android smartwatches with Oxygen Forensic Suite has the highest successful rate at 57.14% on BBM and WhatsApp artifact extraction and 42.85 on Smartwatch’s SMS and LINE Messenger artifact extraction. WhatsApp DB/ Key Extractor has the highest successful rate at 42.85 on Smartphone’s WhatsApp artifact extraction but has weakness in Smartwatch’s SMS, BBM, and LINE Messenger artifact extraction and Metasploit has the lowest success ratio.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Error Pointing Correction System Implemented in the Air Balloon Communication System Thin Clients as Memoryless Computer for Reducing Digital Divide in East Indonesia Design and Implementation of WebRTC-Based Video Conference System in Odroid Board Leveraging SDN for Handover in Distributed Mobility Management of 5G Network Assessment of IT Governance of Bakti Internet Access Program Based on the COBIT5 Framework : Case Study: Balai Latihan Kerja Kendari
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1