Network and Device Forensic Analysis of Android Social-Messaging Applications

Network and Device Forensic Analysis of Android Social-Messaging Applications

Digital Investigation 14 (2015) S77eS84 Contents lists available at ScienceDirect Digital Investigation journal homepage: www.elsevier.com/locate/diin DFRWS 2015 USA Network and device forensic analysis of Android social-messaging applications * Daniel Walnycky a, Ibrahim Baggili a, , Andrew Marrington b, Jason Moore a, Frank Breitinger a a University of New Haven Cyber Forensics Research and Education Group (UNHcFREG), ECECS Department, Tagliatela College of Engineering, USA b Zayed University, Advanced Cyber Forensics Research Laboratory, College of Technological Innovation, United Arab Emirates abstract Keywords: In this research we forensically acquire and analyze the device-stored data and network Network forensics traffic of 20 popular instant messaging applications for Android. We were able to recon- Android forensics struct some or the entire message content from 16 of the 20 applications tested, which Instant messaging reflects poorly on the security and privacy measures employed by these applications but Privacy of messaging applications may be construed positively for evidence collection purposes by digital forensic practi- Application security testing Datapp tioners. This work shows which features of these instant messaging applications leave evidentiary traces allowing for suspect data to be reconstructed or partially reconstructed, and whether network forensics or device forensics permits the reconstruction of that activity. We show that in most cases we were able to reconstruct or intercept data such as: passwords, screenshots taken by applications, pictures, videos, audio sent, messages sent, sketches, profile pictures and more. © 2015 The Authors. Published by Elsevier Ltd on behalf of DFRWS. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/). Introduction unsurprising that such instant messaging applications have become extremely popular, as a result of which, it is Digital evidence from smartphone instant messaging reasonable to expect that more and more cases will involve applications is potentially useful in many types of criminal messages originally sent via such applications. investigation and court proceedings. Text messages have In this work we perform an experimental forensic study been an important component of the evidence presented in on twenty social-messaging applications for the Android numerous high profile cases in recent years, such as Ashby mobile phone operating system. The sum total of the users v. Commonwealth of Australia (Ashby v Commonwealth of of the tested applications exceeds 1 billion. Our study il- Australia (No 4), 2012) and The State v. Oscar Pistorius (Sv lustrates the potential for acquiring digital evidence from Oscar Pistorius (CC113/2013), 2014). In the latter, the mes- the mobile device, data in transit, and data stored on servers. sages concerned were not sent via Short Message Service The remainder of this paper is organized as follows. In (SMS) but by the instant messaging application WhatsApp. the “Related work” section, we discuss related work from Applications like WhatsApp offer users a free or very low the digital forensics and security literature. In the cost alternative to SMS for text messaging purposes, and “Methodology” we discuss the research methodology and frequently offer other additional features. It is therefore experimental setup. In the “Experimental results” section we provide an overview of our results, which we discuss in the “Discussion”. We propose future work in “Future work” * Corresponding author. and conclude in “Conclusion”. E-mail address: [email protected] (I. Baggili). http://dx.doi.org/10.1016/j.diin.2015.05.009 1742-2876/© 2015 The Authors. Published by Elsevier Ltd on behalf of DFRWS. This is an open access article under the CC BY-NC-ND license (http:// creativecommons.org/licenses/by-nc-nd/4.0/). S78 D. Walnycky et al. / Digital Investigation 14 (2015) S77eS84 Related work significant quantities of digital evidence (Lessard & Kessler, 2010) and is still employed in many studies in the literature Smartphones are typically kept in close physical prox- (Barmpatsalou et al., 2013; Al Mutawa et al., Aug. 2012; imity to their owners as compared to other potential Grover, 2013). sources of digital evidence, like computers. This enhances Mobile applications for popular instant messaging or the potential value of digital evidence found on smart- social networking platforms have been the subject of phones e suspects may interact with them continuously numerous studies in digital forensics literature. Early work throughout the day and may take them to the crime scene. on instant messaging applications on smartphones, such as In addition to traces of the suspect's communications, a Husain and Sridhar's study on the iPhone (Husain & suspect's phone may contain evidence pertaining to their Sridhar, 2010), examined platforms which were originally location, and with the advent of the smartphone, they may released for the Personal Computer (PC) either as a stand- contain the same rich variety of digital evidence which alone application or via the web. Computer forensic tech- might be found on computer systems (Lessard & Kessler, niques are described in the literature for the examination of 2010). Mobile phones and their applications may be artifacts from AOL Instant Messenger (AIM) (Reust, 2006; involved in a huge variety of criminal cases, including fraud, Dickson, 2006a), Yahoo! Messenger (Dickson, 2006b), theft, money laundering, illicit distribution of copyrighted other installed instant messaging applications (Dickson, material or child pornographic images, or even distribution 2006c; Dickson, 2007), web clients for popular instant of malware in cybercrime cases (Taylor et al., 2012). messaging applications (Kiley et al., 2008), and instant Even before modern smartphones, SMS text messages messaging features of social networking websites such as stored in the GSM SIM card were an important target for Facebook (Al Mutawa et al., 2011). forensic examiners (Willassen, 2003). With modern As these instant messaging platforms from the PC world smartphones, mobile applications providing messaging migrated to the smartphone with their own mobile appli- capability may supplement or even supplant SMS, meaning cations, so did the digital forensics community move on to that there may be multiple message repositories on the investigate activity traces left by these applications on phone for examiners to retrieve (Husain & Sridhar, 2010). mobile devices (Husain & Sridhar, 2010; Al Mutawa et al., The majority of new smartphones are shipped with the Aug. 2012). In addition to these imports from the PC, Android operating system. There have been many different instant messaging and social networking applications were approaches to forensic acquisition of secondary storage of developed primarily for the smartphone. Android devices in the literature since 2009, encompassing An example of a mobile messaging application is What- both logical and physical acquisition, with some techniques sApp. Anglano analyzed WhatsApp on software-emulated requiring more potential modification to the Android de- Android devices in recent work providing forensic exam- vice under examination than others (Barmpatsalou et al., iners with information about what data is stored on the 2013). Android device by the WhatsApp application, facilitating Generally speaking, logical acquisition can be per- the reconstruction of contact lists and text conversations formed on an Android device through various backup (Anglano, 2014). Most of the applications examined in this utilities, and requires no modification of the device or its work fall into the same category as WhatsApp in that they system software. Physical acquisition techniques described are first and foremost smartphone applications, not PC port- in the literature, on the other hand, often require the overs to Android. installation of a rootkit (modifying the device's system Given the popularity of smartphones, it is not surprising partition) in order to facilitate full access to the device's that they have become targets for cyber attacks. Smartphone secondary storage for acquisition through a tool like dd,as malware is a growing concern, and the sheer volume of mo- in Lessard and Kessler (Lessard & Kessler, 2010). bile applications brings with it a plethora of potential attack Since these rootkits are often of unknown provenance vectors. For example, Damopoulos et al. developed malware (in fact, they are most easily sourced from the hacking which performed DNS poisoning on the iPhone's tethering community), and since any modification to a device under (also known as personal hotspot) feature, and exposed examination ought to be minimized if not outright avoided, important user data (such as location and account creden- Vidas et al. proposed that the Android recovery partition tials) when the user employed the Siri service (Damopoulos might be more safely overwritten with a known safe et al., 2013). In their work on Android inter-application forensic boot environment to facilitate physical acquisition communication and its attendant attack vulnerabilities, of the remaining partitions (Vidas et al., Aug. 2011). By Chin et al. found 1414 vulnerabilities in the top 50 paid and doing so, the system partition is not modified by the rootkit, top 50 free applications then available for Android on what but full access to the device's secondary storage is obtained was then called the

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us