A Forensic Evidence Recovery from Android Device Applications
DOI:
https://doi.org/10.32628/IJSRSET218321Keywords:
Mobile forensics, cell phone evidence, mobile phone forensic tool-kits, digital device forensics, and e-EvidenceAbstract
In a computerized world, indeed unlawful conduct and/or violations may be named as advanced. This world is expanding. Getting to be versatile, where the fundamental computation and communication substances are Little Scale Computerized Gadgets (SSDDs) such as standard versatile phones, individual computerized collaborators, smartphones, and tablets. The ought to recoup information, which might refer to illegal and unethical exercises gave rise to the teaching of portable forensics, which has ended up a fundamental portion of computerized forensics. The literature relevant to Smartphone forensics, as explored in this paper, focuses on the architecture of Smartphone operating systems. It also addresses the digital evidence of Smartphone applications. in this paper undertakes practical experiments to identified sources for evidence that can later be used in the judiciary system. In this research, I'll use open-source Tools that can recover deleted data from the application.
References
- Hawthorne EK, Shumba RK. Teaching Digital Forensics and Cyber Investigations Online: Our Experiences. European Scientific Journal Sept 2014; Special (2): 255-261
- http://accessdata.com/solutions/digital-forensics/forensic-toolkit-ftk
- Forensic Magazine Website, “An Introduction to Android Forensics”., Retrieved on 5 May 2015 from http://www.forensicmag.com/articles/2010/04/introduction-android-forensics
- Muhammad Faheem, N-A. Le-Khac, Tahar Kechadi, “Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial Tool”, Journal of Information Security, 2014.
- Martin, A., “Mobile Device Forensic”, SANS Forensics White paper, Retrieved on 10 April, 2015 from http://digital-forensics.sans.org/community/papers/gcfa/mobile-device-forensics_3553
- Jeff Lessard, Gary C. Kessler, “Android Forensics: Simplifying Cell Phone Examinations”, Scale Digital Evidence Forensics Journal Vol.4, September 2010.
- http://digital-forensics.sans.org/community/downloads
- Android Developers Website. Retrieved on 14 April 2015 from http://developer.android.com/index.html
- Azhar, M.H.B. and Barton, T.E.A. (2017) ‘Forensic analysis of secure ephemeral messaging applications on android platforms’, in International Conference on Global Security, Safety, and Sustainability, January, pp.27–41, Springer, Cham.
- The Sleuth Kit, Retrieved on 5 March 2015 from http://www.sleuthkit.org/sleuthkit/,
- Hawthorne EK, Shumba RK. Teaching Digital Forensics and Cyber Investigations Online: Our Experiences. European Scientific Journal Sept 2014; Special (2): 255-261
- https://www.guidancesoftware.com/products/Pages/encase- forensic/overview.aspx?cmpid=nav
- http://www.securityisfun.net/2014/06/booting-up-evidence-e01-image-using.html
- Choo, K.R. (2013) ‘Cloud and mobile forensics: own cloud as a case study’, Digital Investigation, Vol. 10, No. 4, pp.287–299.
- Tassone, C.F., Martini, B. and Choo, K.K.R. (2017) ‘Visualizing digital forensic datasets: a proof of concept’, Journal of Forensic Sciences, Vol. 62, No. 5, pp.1197–1204.
- Mohammad Iftekhar Husain and Ramalingam Sridhar. I forensics: forensic analysis of instant messaging on smartphones. In Digital forensics and cyber-crime, pages 9–18. Springer, 2009.
- Cosimo Anglano. Forensic analysis of WhatsApp messenger on android smartphones. Digital Investigation, 11(3):201 – 213, 2014. Special Issue: Embedded Forensics.
- Aditya Mahajan, MS Dahiya, and HP Sanghvi. Forensic analysis of instant messenger applications on android devices. arXiv preprint arXiv:1304.4915, 2013.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.