Research Article Forensic Analysis of Social Networking Applications On An Android Smartphone
Research Article Forensic Analysis of Social Networking Applications On An Android Smartphone
Research Article
Forensic Analysis of Social Networking Applications on an
Android Smartphone
Received 20 February 2021; Revised 15 March 2021; Accepted 1 July 2021; Published 23 July 2021
Copyright © 2021 Anoshia Menahil et al. This is an open access article distributed under the Creative Commons Attribution
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is
properly cited.
Smartphone users spend a substantial amount of time in browsing, emailing, and messaging through different social networking
apps. The use of social networking apps on smartphones has become a dominating part of daily lives. This momentous usage
has also resulted in a huge spike in cybercrimes such as social harassing, abusive messages, vicious threats, broadcasting of
suicidal actions, and live coverage of violent attacks. Many of such crimes are carried out through social networking apps;
therefore, the forensic analysis of allegedly involved digital devices in crime scenes and social apps installed on them can be
helpful in resolving criminal investigations. This research is aimed at performing forensic investigation of five social networking
apps, i.e., Instagram, LINE, Whisper, WeChat, and Wickr on Android smart phones. The essential motivation behind the
examination and tests is to find whether the data resides within the internal storage of the device or not after using these social
networking apps. Data extraction and analysis are carried out using three tools, i.e., Magnet AXIOM, XRY, and Autopsy. From
the results of these experiments, a considerable amount of essential data was successfully extracted from the examined
smartphone. This useful data can easily be recovered by forensic analysts for future examination of any crime situation. Finally,
we analyzed the tools on the basis of their ability to extract digital evidences from the device and their performance are
examined with respect to NIST standards.
100% 67%
60%
80% 53%
60%
40%
20%
0%
Table 1: Continued.
for forensic analysis. The artifacts suggested by our study wifi, Bluetooth, etc. It is too difficult to preserve data without
can be helpful in forensic investigation of cybercrimes on altering it so it is important to record and document every
SNAs. single detail during the whole process.
The rest of the paper is organized in 6 sections. Section 1 According to the National Institute of Standards and
presents the preliminary concepts and definitions used in this Technology (NIST), the forensic process [26] includes a 4-
paper. Section 2 presents the literature related to mobile app step procedure, i.e., preservation, acquisition, analysis, and
forensics on different operating systems (OSs). In Section 3, presentation. Figure 2 describes the NIST forensic process.
the methodology of the research is explained. Section 4
covers the artifacts recovered from all five apps using Magnet 2.2.1. NIST Standards on Smartphone Extraction Tools. NIST
AXIOM, Autopsy, and XRY. Section 5 discusses the results releases some parameters and methods to calculate the per-
gathered from three tools and evaluates the tools according formance of forensic tools based on the outcomes of the
to total artifacts recovered, NIST parameters [19, 20], and assessment plan conducted by NIST. Every assertion creates
additional parameters derived during this research to judge at least one experiment comprising of a test convention and
the tool’s capabilities. Conclusions and future work are pre- the normal test outcomes. The test convention indicates
sented in Section 6. point-by-point techniques for setting up the test, executing
the test, and estimating the test outcomes [19]. NIST claims
2. Preliminary Concepts that in forensic cases, expanding the quantity of cell phones
every year creates problems. Hence, to quantify the capability
This section presents a brief overview of preliminary con- of forensic tools available, a method is required. NIST offers
cepts that are going to be used/referred throughout this 42 parameters and methods based on the results of each test
article. plan to assess the performance of forensic devices.
The objective of the computer forensic tool testing
2.1. Android Operating System. Currently, Android OS is the (CFTT) venture at the NIST is to build up an approach for
most commonly used OS in mobile phones with an 88% testing forensic tools. This is done by establishing unique
share in the worldwide smartphone industry. It is therefore and common rules governing the requirements of the tools.
essential to explore Android using various methodologies NIST records the estimation parameters of the forensic tools
and methods [21]. For forensic investigators, the folder struc- on two composed reports entitled “smartphone tool specifi-
ture of an Android phone can be an extremely interesting cation” [19] and “smartphone tool test assertions and test
region. So, they should understand where the information/e- plan” [20]. The estimation parameters are partitioned into
vidence can be found. It is therefore helpful to understand the two parts: core and optional. Specifications for smartphone
structure of data storage [22]. devices are in two parts. Smartphone tool core requirements
A unique Id (Uid) is assigned to each app in Android. ([SPT-CR-01] to [SPT-CR-06]) are the requirements that
Each app runs in a separate process so as no application will be met by all the acquisition tools. Smartphone tool
can access the data of other app. A unique app id for a specific optional requirements ([SPT-RO-01] to [SPT-RO-15])
app is stored in the app package. Phone application can store require that all tools shall comply with the requirements that
app data in many ways [23]. Through app forensic analysis, the stated feature or choices that tool offers. Test assertions
an investigator can comprehend the usage of the app and find are developed using these requirements. Test assertions are
the user data. App analysis is important because nearly all of defined as general proclamations of conditions that can be
them use typical function, i.e., messages, calls, contacts, and tested after a test has been carried out.
internet surfing [24]. This data can tell a lot about the user
as to when they were in a specific location or to whom they 2.3. Digital Investigation Tools. There are tools that are
have communicated and their future planning, etc. designed to acquire and analyze the digital image from the
mobile devices. Competency of the forensic acquisition and
2.2. Digital Evidence and Forensic Process. In 2006, Carrier analysis of these tools can differ from one another so it is
and Spafford [25] defined a digital evidence as the data that important for the analyst to have the knowledge of different
approve or disapprove the hypothesis made about the digital tool expertise levels. The output comparison and verification
events. Forensic investigation is done by collecting, preserv- between tools can help the examiner to choose the tool he
ing, and analyzing the evidence to present in the court of needs to use for the case. We have used the following three
law. Mobile phones continuously transmit the data through tools in our analysis.
Wireless Communications and Mobile Computing 5
Start
Yes
Acquisition
(physical)
Magnet
XRY
AXIOM
Analysis
NIST standards
Tool
Research parameters
evaluation
Defined by researcher
End
Figure 3: Research methodology: a detailed flow chart of actions performed during forensic analysis.
2.3.1. Magnet AXIOM. AXIOM is a complete digital investi- 2.3.2. Autopsy. Autopsy is an open source digital investiga-
gation tool developed by Magnet Forensics. It is used to tion platform that is commonly used by law enforcement
recover digital evidence from different sources, i.e., com- and forensic examiners to analyze the digital image in order
puters, smartphones, third-party images, and cloud. This to get the evidence from it. In this research, we are using
platform contains two apps to acquire and analyze data. Autopsy as a second analyzing tool to make certain of all
The AXIOM process is used to acquire and process the data the evidence recovered from the acquired images [17].
acquired from the smartphone, and AXIOM Examine per-
forms the examination and analysis over the acquire data. 2.3.3. XRY. XRY is a digital investigation platform. It is an
For the purpose of this research, we have used the fully func- instinctive and competent software app that runs on the
tional trial version [16]. Windows OS. It allows an examiner to extract high-quality
6 Wireless Communications and Mobile Computing
(i)Create an account
(ii)Set up profile
(iii)Add friends
(iv) Upload status and pictures
(v) Liked and commented friend’s statuses
(vi) Send and receive message
(audio/video/text/stickers)
(vii) Video calling
data securely from different digital devices and platforms. Table 3: Forensic tool description.
Acquisition and analysis can be performed through this tool.
It allows an examiner to extract logical or physical data Sr. Forensic tools Version Description
according to the case [18]. 1 Magnet AXIOM 4.0 Proprietary
2 Autopsy 4.14.0 Open source
2.4. Root for Physical Acquisition. Forensic examination 3 XRY 8.2 Proprietary
requires a detailed recovery of artifacts for thorough analysis,
even though rooting is not needed for physical acquirement
in some cases where patch is offered by the acquisition tool Table 4: Proposed categories for artifacts.
such as XRY, Cellebrite, and Magnet AXIOM. On the other
hand, rooting the device helps in eliminating the limitations Categories Artifacts
that the cell carriers or system OEMs have imposed. A rooted DB Databases recovered
interface offers effective user data extraction and access to Text messages
internal directories for the device. The partitions and system Images incoming
folders are kept hidden with no access for a nonrooted Media/text Images outgoing, videos incoming,
phone. However, many Android smartphone manufacturers exchanged videos outgoing, audio incoming
permit to legally root your devices [27]. Moreover, integrity Audio outgoing, GIFs/emojis incoming
of user data from rooted Android devices during data acqui- GIFs/emojis outgoing
sition is a main concern as forensic analyst extract valuable
Stories, posts uploaded
data from Android phones by rooting [27]. Furthermore,
authors in [28] prove that rooting of Android devices has Posts liked/reply
Timeline
legal validity and the evidence extracted as a result of the Group information
rooting process is effective and credible evidence of convic- Timing of posts/status
tion in criminal proceedings. Friend list
Profile picture, date of birth
3. Related Work: Application Forensics Email address
ID
Some research work has been done in the field of mobile Account/user
Location
application forensics. Some of the analysis is done on the information
device general activities, event logs, and device logs [29, 30], Name
whereas others emphasized on the installed applications on Phone number
the device. Andriotis et al. [31] related the usage of smart- Profile images
phone with numerous crimes like confidential information Phone app activity
sharing on public mediums, uploading images over the cloud Calls Audio calls, video calls
and child pornography etc. [32]. Information was collected Private chats
from phone log files, wifi logs, event logs, Bluetooth logs,
Timestamps Stories/posts/statuses upload
and databases containing the browsing history. Snapchat
was analyzed in [33] by Infosecurity Group and by Aji et al. Friends added
[34] on two smartphones using Android and iOS. They
acquired the data from the smartphone’s internal memory include send and receive messages, contact lists, and time-
through 3 extraction techniques: physical, logical, and file stamps was found through manual search. Mathavan and
system. Extraction was performed with UFED Cellebrite. Meeran [37] performed forensic analysis on WhatsApp.
Chatting file, images, and videos were detected from XML The internal memory of an Android phone was analyzed to
records found on the iOS smartphone; however, the Android find out the artifacts such as send/receive messages, images,
device data was not permanently deleted but hidden with videos, logs, and contact information. Walnycky et al. [38]
nomedia extension.˙ selected 20 social messaging apps based on the number of
In [35], Mehrotra et al. aimed to authenticate the foun- downloads and keyword results from Google Play Store. Net-
der’s claim that the Android application Wicker enables the work traffic was captured and saved by using Wireshark and
user to exchange self-destructive messages and files. They examined through NetworkMiner and NetWitness Investiga-
examined both rooted and not rooted Android phone data tor. This research concluded that four apps, i.e., Snapchat,
acquired through Titanium Backup Android app v6.1.1 and Tinder, Wicker, and BBM are secure as they encrypt network
Helium Backup Android app. No artifacts or trace of data traffic through HTTPS encryption using an SSL certificate.
exchange was found. Mahajan et. al [36] analyzed the arti- Anglano et al. [39] analyzed ChatSecure on Android
facts of two apps, WhatsApp and Viber. Data was extracted phones. UFED Physical Analyzer was used to analyze data.
through UFED from 3 versions of Android OS. Both the apps ChatSecure database was decrypted through LiME. Messages
were examined through UFED Analyzer. The chat list, chat and media shared during conversation were been recovered,
messages, and sessions along with timestamps were found whereas the deleted data was not recovered. Adebayo et al.
in the WhatsApp “msgstoredb” file, and contact information [40] analyzed Kik app installed on three Android mobile
was found in the “wadb” file. For Viber, all information that devices. The device backup was created with Titanium
8 Wireless Communications and Mobile Computing
(a) (b)
(c) (d)
Backup, and the SQLite DB browser was used to analyze the tions of artifacts were discussed in this research. In [52], the
recovered databases. In another study, Instagram was ana- security mechanisms of WhatsApp, Viber, Tango, Voupi, For-
lyzed by Ryu et al. [41] on iPhone 6s using EditPlus3 Plist, fone, HeyTell, EasyTalk, and WowTalk were discussed when
iBackupBot iPhone Backup Extractor, iBackup Viewer, and they were installed on Android v2.3 and iOS v2.3. In [53–
iPhone Tracker DB. User information, activity history, and 55], LINE Messenger, BlackBerry Messenger, and IMO Mes-
application settings were recovered from the iPhone backup senger app were analyzed respectively on Android phones
file. Umar et al. [42] analyzed WhatsApp for digital evidence. and iPhone. The content shared between two parties through
The application was installed on Samsung Galaxy S4 GT- private conversation was discussed. Twitter, POF Dating,
I9500 Android version 5.0.1, and acquisition was done Snapchat, Fling, and Pinterest were analyzed in [56] installed
through ADB. For analysis, two tools were used: WhatsApp on Android v5. Message content and account information
key/DB Extractor and Belkasoft Evidence. Text messages, were discussed. Forensic analysis of Snapchat and Burner
images, videos, and documents were recovered. From the was done in [57] on both iOS and Android smartphones.
results generated by tools, Belkasoft was concluded as best Table 1 summarizes some previous studies on forensic anal-
among the two. Telegram app was analyzed in [43, 44] on ysis on mobile apps.
different versions of Android phones and Windows phones
[45]. Android gave messages and cache info after exploring 4. Methodology
DBs. No package related to the app was found on the Win-
dows phone. The overall methodology adopted in research comprises four
In a few other studies [44, 46], KaKaoTalk was analyzed steps. These steps are illustrated in Figure 3.
on Android phones. The Kakao encrypted database was
decrypted to gain access to messages and contact information 4.1. Scenario Building. In the first stage, investigation scenar-
in the researches. Facebook, Skype, Viber, Windows Live ios are set up by performing common user activities on apps.
Messenger, and WhatsApp were analyzed in [50] on iPhone. Apps are installed on the phone from Google Play Store.
The backup contains all the information related to these apps Accounts are created for each app and activities, i.e., picture-
even after uninstallation. In [51], Facebook, WhatsApp, Hike, s/videos uploaded, comments, scrolling over newsfeed,
Viber, and Imo were analyzed on an Android phone. Loca- stories uploaded, messages (text/audio/video/images) sent
Wireless Communications and Mobile Computing 9
(a) (b)
(c) (d)
or received, and video calling (LINE), are performed for the app-related data. The same information is recovered by all
application according to their capabilities. The scenario three tools. Cache stores all the activity information and ima-
followed in this research is explained in Figure 4. ges/videos seen by the user while using the app and is recov-
ered by all three tools.
4.2. Acquisition. Data from phone memory is acquired
through two different tools Magnet AXIOM (process) and 4.4. Tool Evaluation. Tools are evaluated on the basis of their
XRY. Data from phone memory is acquired in three stages. capability to recover digital artifacts from every said app,
NIST standards on smartphone extraction tools [19] and
(i) Application is installed and working some additional parameters from the investigator after con-
ducting research. The result of this research can be used as
(ii) Application is installed and data has been deleted a recommendation to investigators to handle the cases asso-
(iii) Application and data both have been deleted ciated with these apps.
In order to analyze the data generated by these apps
In the first stage, all the data remains on the phone as the (Figure 4), the internal storage of the smartphone is exam-
app is working. In the next stage, some data is deleted by the ined after every experiment. The information generated by
analyst, and in the last stage, all data is deleted and the app is apps is stored in the inner phone memory that is ordinarily
uninstalled from the phone. Data is acquired from the device out of reach to users. Therefore, appropriate tools and tech-
in a controlled environment in order to ensure the integrity niques should be adopted so as to obtain and access this part
of the data. In order to get maximum data from the internal of the memory. The hardware used in the research is a Sam-
memory of the device, data is acquired through the physical sung smartphone, USB cable, and computer for the retrieval
acquisition of the device after rooting. and analysis of data. The description of experimental tools is
provided in Table 2. Forensic tools that are used during the
4.3. Analysis. In the analysis phase, every app is analyzed by experiments are described in Table 3.
the content of the app folder located in the data/data direc- Artifacts recovered have been categorized into six fields
tory. The analysis generally involves data found in the spe- in this research. The main categories are DB (databases),
cific app’s file folder and database folder but not limited to media/text exchange, timeline, account/user information,
them. Another folder found in the data/data/app_folder calls, and timestamps. The DB category contains the artifacts
named “Shared Preference” contains some .xml files having recovered from the databases present in the app folder. The
10 Wireless Communications and Mobile Computing
(a) (b)
(c) (d)
(a) (b)
(c) (d)
(a) (b)
(c) (d)
(e) (f)
artifacts recovered are related to the exchange of media (ima- might perform on these apps. Figure 4 states the activities
ges/video/audio/emoji/GIFs) and text between two parties performed on each app. Physical data of the device is
which reside in the media/text exchange category. The time- acquired through two propriety tools, i.e., Magnet AXIOM
line category have artifacts related to the information of and XRY. Before starting the acquisition, the phone is
user’s timeline, i.e., his stories/posts/likes/replies/statuses. rooted through the installation of TWRP Recovery and
Artifacts for the user’s account (profile picture/DoB/email Flash SuperSu in the recovery mode. After getting the
address/ID/name/phone numbers/app activity) reside in Super User privileges, full image extraction is performed
account/user information category. The category calls con- through Magnet AXIOM and physical acquisition is done
tains the artifacts related to information of audio/video calls by XRY.
done or received by the user. The category timestamps com- The finding of the apps from the acquired image is
prises the artifacts related to the timings of different activities described in this section. All the activities that are performed
performed by the user. The summary of categories has been by the apps and the relevant data that is stored in the internal
stated in Table 4. memory of the phone is examined. The examination is done
by viewing the acquired image through the tools (Magnet
AXIOM and XRY) and is analyzed against the defined cases
5. Forensic Analysis of all the SNAs one by one in detail.
In order to execute the forensic analysis, apps are down- 5.1. Forensic Analysis of Apps through Magnet AXIOM. This
loaded from Google Play Store and a set of activities is per- section discusses the artifacts recovered from the applications
formed on apps following certain test cases that any user using Magnet AXIOM.
12 Wireless Communications and Mobile Computing
(a) (b)
(c) (d)
5.1.1. Instagram. The artifacts recovered from Instagram ognized by the contact table. The id of the caller would be
through Magnet AXIOM are described in Figure 5 under matched from the m_id in the contact table. So, the caller
three conditions: before data deletion, after deleting some can be verified. LINE gives an end-to-end encryption for
data, and after app uninstallation. Firstly, the app is analyzed data. The public key for every contact is stored in e2ee.db
while no data has been deleted from the device. Figure 5(a) in an encrypted format. After deletion, some messages and
shows that the messages sent and received are recovered with media shared through private messages were not recov-
message time, type, sender, and receiver information. ered. Only a few contacts were recovered. No data related
Figure 5(b) shows that the stories uploaded by the user on to the LINE application was recovered after app uninstal-
its Instagram account are recovered. An image is taken again lation. The detailed analysis of LINE is shown in Figure 6.
after deleting some data, i.e., images, text messages, and ima- Figure 6(a) shows that LINE contacts, m_ids (unique IDs
ges/video uploaded on the Instagram account. Figure 5(c) for every contact), messages, and calls shared between
shows that 80 percent of text messages are successfully recov- both parties with timestamps are recovered from the data-
ered and only textual information of images and video calls is base (naver_line.db) store in the app package. Messages
recovered such as the name of other party and timestamps. recovered with the sender/receiver and message type with
After app uninstallation, no data is recovered related to the timestamps are shown in Figure 6(b). Figures 6(c) and
Instagram app analyzed by Magnet AXIOM. 6(d) show the recovery of media files (videos) and audio
image, respectively, transferred during the chat session
5.1.2. LINE. As we examined naver line.db, there are 32 tables with timestamps.
from which only 6 tables are of interest from the forensic
point of view. The contact table has the relation with call_his- 5.1.3. Whisper. The forensic analysis of Whisper resulted in
tory.db as the user that was making the call can only be rec- some data being retrieved. The retrieved data contains
Wireless Communications and Mobile Computing 13
(a) (b)
(c) (d)
(e) (f)
(a)
(b)
(c) (d)
information of user accounts, content created or liked by the is shown in Figure 7. Figure 7(a) shows the retrieved text
user, groups he/she follows, private messages shared with messages shared between the user with its friends with time-
friends, location information and other activities. After stamps and location information. Textual information of
deletion, all the text messages were recovered and a textual images received by the user is recovered as shown in
preview of media shared through private messages was Figure 7(b). Figure 7(c) shows the retrieved information
recovered. After app uninstallation, no data related to the about the posts uploaded by or replied by the user with time-
Whisper app was recovered. The detailed analysis of Whisper stamps, hearts, and location information. Figure 7(d) shows
Wireless Communications and Mobile Computing 15
(a) (b)
(c) (d)
(e) (f)
(g) (h)
the posts shared while the user was online with timestamps, that the video sent by the user is recovered from the cache
Whisper content, and location information. folder.
(a) (b)
(c) (d)
(e) (f)
Figure 11(c). Profile pictures of all the friends have also been with the timestamp being stored. The column titled pid has
recovered as shown in Figure 11(d). Figure 11(e) shows that the receiver user id and the column sid contains the user id
voice messages were recovered with timestamps. The video of the sender. Figure 12(b) shows that Whisper posted on
shared through chat was recovered in .jpeg image format as the timeline were recovered. Figure 12(c) shows that Whisper
shown in Figure 11(f). posted by the people while the user was active is recovered
with timestamps and locations. Figure 12(d) shows that
5.2.3. Whisper. Artifacts recovered from the c.db database’s c images received during chat is recovered.
table are the information of private conversation of the user.
After deletion, images received while private chatting; Whis- 5.2.4. WeChat. WeChat artifacts recovered through Autopsy
per post; event information recovered with the sender name, are stated in this section. The detailed analysis is shown in
location, age, gender, and content that has been sent; and Figure 13. Figure 13(a) shows the messages recovered from
some messages with sender and receiver ids and timestamps the FTS5IndexMessage_content table when it was open in
are recovered after deletion. No artifact was recovered after the SQLite browser. Figure 13(b) shows that the audio mes-
app uninstallation. The detailed analysis is shown in sages shared during private chat are recovered with time-
Figure 12. Figure 12(a) shows the list of every conversation stamps. Figure 13(c) shows that the images received during
18 Wireless Communications and Mobile Computing
(a) (b)
(c) (d)
(e) (f)
(g) (h)
(a) (b)
(c) (d)
(e)
(f)
(g) (h)
(a) (b)
(c) (d)
(e) (f)
(g) (h)
chat are recovered. Figure 13(d) shows that the phone information of videos is recovered after app uninstallation.
number against which the account was created is recovered Figure 13(h) shows that images shared and uploaded by the
in plain text. Textual information of the video shared is user are recovered after app uninstall.
recovered after deletion as shown in Figure 13(e).
Figure 13(f) shows that images received through private chat 5.2.5. Wickr. From analyzing the image from Autopsy, the
are recovered after deletion. Figure 13(g) shows that textual textual information of the video file is recovered from the
Wireless Communications and Mobile Computing 21
Table 5: Comparison of tools on the basis of digital artifacts recovered from SNAs. The (✓) symbol defines that artifact is recovered from the
tool, (●) is the symbol for textual information/audio-video not playable, and (▲) defines partially recovered.
Table 7: Location and Artifacts Recovered from Instagram before Data Deletion.
Table 7: Continued.
cache folder. Wickrdb is encrypted database and all the file recovered from naver_line.db as shown in Figure 15(b).
folder is encrypted. No information regarding communica- Figure 15(c) shows that e2ee.db stores private and public keys
tion has been recovered from Wickr. encrypted with a unique id and timestamp. Images uploaded
by the user on LINE’s timeline were also recovered as shown
5.3. Forensic Analysis of Applications through XRY. This sec- in Figure 15(d). The profile picture of friends was recovered as
tion discusses the artifacts recovered from the applications shown in Figure 15(e). The video uploaded on the timeline by
using XRY. the user was recovered as shown in Figure 15(f). Messages that
have been deleted with the content information (text, video,
5.3.1. Instagram. The image has also been taken from XRY and audio) with sender and receiver ids and timestamps are
from all the said cases. After the app uninstalls, the app name recovered as shown in Figure 15(g). Figure 15(h) shows that
was recovered with information that the app deleted on what call history details were recovered after deletion from call_his-
time and date on the data/data folder. The detailed analysis is tory.db images and videos that were uploaded by a user on the
shown in Figure 14. Figure 14(a) shows that the database timeline are also recovered after deletion.
direct.db contains the messages and sent images.
Figure 14(b) shows that the thread information of the chat 5.3.3. Whisper. Whisper app analyzed by XRY recovered the
through DM is recovered. Figure 14(c) shows the cache data stated artifacts for all cases. The detailed analysis is shown in
stored in the cache folder of the app package. Figure 14(d) Figure 16. Figure 16(a) shows the c.db that contains all the
shows that Cache images are recovered in XRY after a cache messages that are transmitted between the user and the other
clears. After deletion, XRY recovered the messages deleted users with their ids and timestamps. w.db contains the list of
within 24 hrs with text/media information (type, time- all those people that have posted at the time of the user’s con-
stamps) as shown in Figure 14(e). Remnants of the video nectivity and group user joined as shown in Figure 16(b).
uploaded on the account are recovered after deletion as Posts uploaded by the user are recovered as shown in
shown in Figure 14(f). Figure 16(c). Images sent by the user were recovered as
shown in Figure 16(d). Figure 16(e) shows the cache folder
5.3.2. LINE. The LINE package is analyzed before any data containing the posts viewed by a user with timestamps.
was deleted using XRY. After LINE uninstallation, the app Deleted chats are recovered from c.db with the sender and
existence proof is present in location data/data which con- receiver names and timestamps as shown in Figure 16(f).
tains the application name jp.naver.line.android, date, and The deleted group’s information was recovered. The images
time of app deletion. The detailed analysis is shown in sent by the user and then deleted are recovered. The file with
Figure 15. Figure 15(a) shows that the files shared through the name whisper is recovered after app uninstallation.
private chat have been recovered. Contact details, chat
record, and information shared between two parties includ- 5.3.4. WeChat. Artifacts recovered from WeChat through
ing text messages, media, and call info with timestamps were XRY is stated below. The first analysis has been done before
Wireless Communications and Mobile Computing 25
Table 8: Location and artifacts recovered from LINE and Whisper before data deletion.
Table 9: Location and artifacts recovered from WeChat and Wickr before data deletion.
Table 10: Artifacts recovered from Magnet AXIOM after data deletion and app uninstallation.
Table 11: Artifacts Recovered from Autopsy after Data Deletion and App Uninstall.
data deletion. No message information has been recovered as symbol for textual information/audio-video not playable,
all the databases are encrypted. The detailed analysis is and (▲) defines partially recovered. Table 6 describes the
shown in Figure 17. After the deletion of some data, no text artifacts recovered from SNAs before data deletion, after data
messages were recovered. Images and videos uploaded were deletion, and after app uninstallation according to categories
recovered after deletion. After app uninstallation, all the proposed in Table 4. The details of artifacts recovered and
media files and their information were recovered. Encrypted their location are presented in Tables 7–13. Tables 7–9 state
databases and cache files were not recovered. The profile the artifacts recovered from apps and their locations before
picture, images, and videos uploaded and shared through pri- any data is deleted from apps. Similarly, Tables 10–12 show
vate chats are all recovered. the artifact information recovered after data deletion and
after app uninstallation from every app using all three tools.
5.3.5. Wickr. No data recovery from Wickr could be managed
except from the metadata from the base.apk file. After app
uninstallation, the location data/data contain the filename 6. Results Analysis and Tool Evaluation
com.mywickr.wickr2 with the deleted status being yes.
Detailed information of artifacts that were recovered This section presents an analysis and discussion on the out-
after three scenarios is discussed in Table 5. The (✓) symbol put of forensic analysis of five SNAs. A comparison of tools
defines that artifact are recovered from the tool, (●) is the on the basis of their capabilities is also presented.
28 Wireless Communications and Mobile Computing
Table 12: Artifacts recovered from XRY after data deletion and app uninstallation.
6.1. Analysis of Apps location of the artifacts can be examined during any criminal
investigation. It was discovered that LINE manages the direc-
6.1.1. Instagram. During investigation of the internal storage tories within its app folder. LINE app stores the cache for
of the Android phone for Instagram app data, many artifacts transferred, downloaded, and uploaded files in the app cache.
are recovered that can help the investigation. The database From the examination of local memory and databases of the
folder that contains all the messages, i.e., text message, video, app, we can recover the information (message/media trans-
audio, emojis, or the link to online media that have been ferred, cache copies) within the DB table in a plain text form
transferred to or from the user is being recovered unen- with the exception of the password. All the contacts are
crypted with the information of date and time. The posts that recovered from the database folder even after deletion. We
are uploaded on the account and stories are also recovered realize that app data is stored in a different location and dif-
with date/time information. The cache folder stores all the ferent forms can be interesting in a forensic investigation.
online activity done by the user. Every post, picture, story,
or video seen by the user get recorded in the cache folder. 6.1.3. Whisper. Whisper post is originally a message sent by
The shared preference folder contains an .xml file that stored user publicly and it includes the name of the sender, message,
user’s account information in plain text format. The number date/time when it was posted, the link of the image, location,
of accounts logged in the app during specific time period are the likes (hearts) it received, and replies to these posts. The
recovered through their login nonce. The information stored name of the user is not a unique identifier in a whisper; that
in these files contain live sessions attended and last search means that the same username can be used by different users
made etc. After the messages and posts are deleted, data from and can also be changed anytime by the user. The user phone
the database is deleted but some of the messages are being does not store the images of the post in the app but these
recovered from the .db journal file. The posts have also been images are cached by the phone and stored in the device.
recovered after deletion. After the uninstallation of the app, Links of posts are also stored on the phone but not all the
only the pictures that had been uploaded by the user are images are available on these links. Post location information
recovered. If we clear the cache of our phone, photos, videos, can also be determined in Android with the longitude and
and Instagram stories cannot be recovered. latitude for each post. The heart and reply counter keeps
the info of likes on a post. Whisper messages are privately
6.1.2. LINE. Different artifacts are recovered from the LINE sent or received by the user. All the messages with time-
app. The main focus of our research is on four folders stored stamps, media type, and other party information are recov-
inside the local memory of the smartphone. By examining ered even after the deletion of some messages or the
the internal memory of the smartphone, it was determined deletion of the whole thread. Like Whisper posts, in whisper
that the app stores some artifacts on different locations in messages, the username is also not a unique identifier so it
the app folder. These artifacts are related to its activity within became difficult to confirm the exact identity of the other
the internal memory. We can understand the DB schema and party. There is no way to confirm if the message has been
can recover the critical information of LINE app activity received or read by the other person or not. Whisper stores
from the database folder. Note that the importance and the its information against the Mac address of the phone. It does
Table 13: Comparison between tools on the basis of the number of artifacts recovered.
Incoming 1 1 1 1 – – 1 1 – –
Video calls
Outgoing 1 1 1 1 – – 1 1 – –
Incoming 1 0 1 0 – – 1 0 1 0
Audio
Outgoing 1 1 1 1 – – 1 1 1 0
Incoming 10 8 10 8 20 20 10 8 5 0
Text messages
Outgoing 10 7 10 6 20 20 10 8 5 0
Incoming 5 0 5 0 2 2 4 2 2 0
Outgoing 5 3 2 0 2 2 1 0 2 0
Images
Stories 1 1 – – – – – – – –
Uploaded 4 4 4 5 5 5 2 2 – –
Incoming – – 1 0 – – 1 1 1 0
Outgoing – – 1 1 – – 1 1 1 1
Autopsy Videos
Stories 1 1 – – – – – – – –
Uploaded 1 1 1 1 – – 1 1 – –
Incoming – – 1 1 – – 1 1 – –
Audio calls
Outgoing – – 1 1 – – 1 1 – –
Incoming 1 1 1 1 – – 1 1 – –
Video calls
Outgoing 1 1 1 1 – – 1 1 – –
Incoming 1 0 1 0 – – 1 0 1 0
Audio
Outgoing 1 1 1 1 – – 1 1 1 0
29
30
Applications
Tools Instagram LINE Whisper WeChat Wickr Total recovered artifacts Index calculated Ranking
T R T R T R T R T R
Magnet AXIOM 41 37 40 26 49 49 36 27 18 1 140 76.00% 1
Autopsy 41 28 40 26 49 49 36 28 18 1 132 71.70% 2
XRY 41 24 40 24 49 43 36 30 18 0 121 65.70% 3
31
32 Wireless Communications and Mobile Computing
not have any email id or password and not any phone Table 15: Comparison of tools according to NIST standards.
number needed to register into the platform. However,
there is an email registration option that is present in new Magnet
Type Features XRY Autopsy
versions of the app. The user needs to install the app and AXIOM
can start posting and messaging. A username is given by SPT-CR-01 (✓) (✓) (▲)
the app. All the whispers can be seen. Turn on the location SPT-CR-02 (✓) (X) (▲)
Core requirements
and the user can see all the whispers that have been posted SPT-CR-03 (✓) (X) (▲)
by the people near its location. If the user uninstalls the app SPT-CR-04 (✓) (✓) (✓)
and reinstalls it, it recovers its own account and all the data SPT-RO-05 (✓) (✓) (✓)
and activities that have been carried out by the user on that
SPT-RO-06 (✓) (✓) (✓)
account. But if the user uninstalls the app and restarts its
phone and reinstalls the app, its account is gone forever. Optional SPT-RO-08 (✓) (✓) (✓)
The user will be registered against another name and gets requirements SPT-RO-09 (✓) (✓) (▲)
a new account. SPT-RO-13 (✓) (✓) (▲)
SPT-RO-14 (✓) (✓) (X)
6.1.4. WeChat. From the analysis of the internal memory of SPT-CA-01 (✓) (✓) (X)
the phone, it was revealed that WeChat [14] created the SPT-CA-02 (✓) (✓) (▲)
directory Tencent [59] to store its data in the internal mem- SPT-CA-03 (✓) (X) (▲)
ory. The Tencent directory contains all the files including SPT-CA-04 (✓) (✓) (✓)
databases, caches, and media information that has been SPT-CA-05 (✓) (✓) (✓)
shared or uploaded on the timeline by the user. WeChat SPT-CA-06 (✓) (✓) (✓)
[14] cares about privacy more than most social networking SPT-CA-07 (✓) (✓) (✓)
apps because of some critical features, i.e., payments. EnMi- Core assertion
SPT-CA-24 (✓) (✓) (✓)
croMsg.db is a database within this directory which is
encrypted. It uses SQLCipher [60] to encrypt its database. SPT-CA-25 (✓) (✓) (✓)
All previous researches about WeChat describe that EnMi- SPT-CA26 (✓) (✓) (●)
croMsg.db contains messaging information of the user and SPT-CA27 (✓) (●) (●)
describes the method to decrypt this database. A script [61] SPT-CA29 (✓) (✓) (▲)
needs to run with SQLCipher to decrypt the said database. SPT-CA30 (✓) (✓) (▲)
That method is successful for the Android phone’s previous SPT-CA31 (✓) (X) (▲)
versions. For WeChat version 6 or more running on Android
SPT-AO25 (✓) (✓) (✓)
version 6.0.x or higher, the database EnMicroMsg.db is not
SPT-AO26 (✓) (✓) (✓)
decrypted through the methods described in [61, 62]. Since
lower versions of WeChat cannot be installed on Android SPT-AO27 (X) (●) (●)
versions higher than 5, so, the information within this data- Optional assertion SPT-AO31 (✓) (✓) (●)
base is not possible to recover. In [62], the previous versions SPT-AO37 (✓) (●) (✓)
of WeChat were installed on Android 4.4.2 and decrypted SPT-AO38 (✓) (●) (✓)
successfully using the same methods described in [63, 64]. SPT-AO39 (●) (●) (●)
So, it was determined that the encryption in the latest ver-
sion of WeChat in Android 6.0.1 or higher is different from
the previous version and it is not possible to recover data account and he needs to log in again with the username
from it. An index file named FTS5IndexMicroMsg.db con- and password.
tains the information about the contact and plain text mes-
sages. The Meta_messages table contains the unique ids of 6.1.5. Wickr. Wickr secures the internal information by
the user; the talker with a timestamp and message_content encrypting the local storage. Wickr’s delicate information,
table contain the content of the messages. The main issue i.e., id keys, account data, and messages, is stored in an
is that we cannot tell who sends which message to whom encrypted storage in the phone. This information in the stor-
and when. This database is also encrypted in a later version age container is decrypted only when the user is logged in the
of WeChat.Media that has been shared through messages account and can be used for any activity. When a user logs
and uploaded by the user on the timeline which is recovered off, the container is encrypted again with Klds and expelled
from the com.tencent/media/0/MicroMsg folder. It contains from the persistent memory. Klds is put away in an encoded
the jpeg images, mp4 videos, and audio file transfer during configuration with the goal that it might be recuperated upon
the chat. After data deletion, this folder contains these files the following client login. The key used to encode and decode
stored in this location. The shared preference folder con- Klds is taken from the client’s passphrase utilizing script [65].
tains critical information, i.e., username and the phone Klds is put away in an encoded configuration with the goal
number through which the account was created when the that it might be recuperated upon the following client login.
account was created. If we clear the phone cache, it was dis- The key used to encode and decode Klds is taken from the cli-
covered that the user automatically logs out from the ent’s passphrase utilizing script. Successful login for this
Wireless Communications and Mobile Computing 33
situation is equivalent to having the capacity to effectively these apps. The overall ranking of tools according to digital
unscramble Klds and get to an encrypted container material. artifacts recovery is presented in Table 14.
Those clients who wish to dependably remain signed in to
Wickr basically store the secret word-determined key in stage 6.2.1. Number of Artifacts Recovered by a Tool. All three tools
gave secure capacity. Along these lines, delicate material is are analyzed on the basis of their capability to recover digital
constantly encoded when the Wickr application is not artifacts from five SNAs. These numbers give us the valida-
dynamic [66]. The metadata about how and where Wickr tion of the performance of tools. Details of the number of
app stores its information is identified while exploring the artifacts recovered from every app using these tools are
base.apk file. By exploring the files stored within the .apk file, shown in Table 13. Tools are ranked according to the capabil-
it was determined that the information related to messages ity of artifacts to be recovered by them. The index number
with timestamps and media type is stored in a database has been calculated according to the formula stated in (1)
named wickr_db. The key through which wickr_db is as follows:
encrypted is also encrypted and stored within the phone.
The database can be decrypted only if the user will log in to ∑Nr
P= ∗ 100, ð1Þ
the account with the username and password. These phrases ðNtÞ
with a random number decrypt the key and the key decrypts
the database. It was also discovered that a database is where P is the percentage of useful extractions, Nr is the
encrypted through SQLCipher by the SQL helper class pres- number of recovered artifacts, and Nt is the total number of
ent in the WickrDbAdapter.class file. Two files sk.wic and artifacts
ds.wic are also encrypted. By analyzing the file in the .apk file The index number for every application is calculated
of Wickr app, it was discovered that the ds.wic file contains according to equation (1). The Magnet AXIOM index is cal-
the cache data of Wickr and sk.wic which contain the key culated by dividing the number of artifacts recovered (R)
of the database which is also encrypted. from all five applications through Magnet AXIOM with a
total number of artifacts (T) sent times 100, and the result
6.2. Tools Evaluation. Three tools are used in this research—- index is 76 percent. The indexes of Autopsy and XRY are also
Magnet AXIOM, Autopsy, and XRY. Magnet AXIOM and calculated in the same way. Autopsy is ranked second in as an
XRY have the capability to extract the data from the smart- image analysis tool with an index of 71.7 percent and XRY is
phone and present the artifacts in a human-understandable ranked third with an index of 65.7 percent.
format. Autopsy just analyzes the already-extracted image.
The tools are evaluated on the basis of three factors. 6.2.2. NIST Standard Tool Assessment Document. NIST pub-
lished an assessment plan to measure the performance of a
(i) Number of artifacts recovered by the tool tool [19, 20]. It is important to develop the method that can
standardize the tool according to its capabilities. NIST
(ii) NIST standard tool assessment document [19, 20] releases some factors and methods to calculate the perfor-
(iii) Additional parameters mance of a forensic tool based on the outcomes of the
assessment plan conducted by NIST. In Table 15, tools are
The result of this research can be used as recommenda- compared against the core requirements, optional
tions to investigators to handle the cases associated with requirements, core assertions, and optional assertions of
34 Wireless Communications and Mobile Computing
smartphone examination tools where the (✓) symbol defines New apps like Omegle, Periscope, and Azar which are becom-
that tool supports the factor, symbol (●) defines partially ing popular within teenagers need some attention from
supporting, symbol (X) defines not supporting, and symbol forensic investigators. Every tool has some weaknesses, and
(▲) defines not applying for a specific tool. According to for the better and accurate results, forensic investigators can
the NIST parameter of smartphone examination tools, use the combination of different tools in his investigation to
Magnet AXIOM did fulfill most of the requirements. get more reliable results by using the unique capability of
every single tool.
6.2.3. Additional Parameters. Finally, the performance of
tools is evaluated on the basis of some parameters that were
defined during this research and tool performance capability Data Availability
can be judged by these parameters. These six parameters are No data were used to support this study.
(i) Processing time
Conflicts of Interest
(ii) User friendliness
The authors declare that there are no conflicts of interest
(iii) Compatibility regarding the publication of this paper.
(iv) Artifacts recovery
(v) Keyword search option
Acknowledgments
(vi) Accuracy The authors of this paper are extremely thankful to the
Department of Information Security, National University of
Table 16 gives a detailed comparison of the tools accord- Sciences and Technology (NUST), Islamabad, Pakistan, for
ing to these parameters where the (✓) symbol defines the tool its support in the research.
that supports the factor, symbol (●) defines partly support-
ing, symbol (X) defines not supporting, and symbol (▲) References
defines not applicable for a specific tool. According to the
combined results of defined tool evaluation factors (no. of [1] Global social media research summarySeptember 2019 https://
artifacts a tool recovers, NIST parameter of smartphone anal- www.smartinsights.com/social-media-marketing/social-
ysis tools, and additional parameters) and on the basis of mediastrategy/new-global-social-media-research/.
overall performance, Magnet AXIOM is the number one [2] DataReportal – Global Digital Insights, 2021, March 2021
followed by XRY and Autopsy. https://datareportal.com/reports/digital-2020-october-global-
statshot.
7. Conclusions and Future Work [3] “51 critical cyberbullying statistics in 2020,” https://www
.broadbandsearch.net/blog/cyber-bullying-statistics.
Various tools are available commercially and proprietary [4] “The-Annual-Bullying-Survey-2017-1.pdf,” December 2019
through which data acquisition and forensic analysis can be https://www.ditchthelabel.org/wp-content/uploads/2017/07/
done. In this research, Magnet AXIOM and XRY are used The-Annual-Bullying-Survey-2017-1.pdf.
to acquire data from five social networking apps in three dif- [5] N. Jain and V. Shrivastava, “Cyber crime changing everything–
ferent scenarios: before any data deleted from the app, after an empirical study,” International Journal of Computer Appli-
some data deleted, and after app uninstall. The outcomes of cation, vol. 1, no. 4, 2014.
research explain that a large number of artifacts of Instagram, [6] M. Sharma and S. Kaur, “Cyber crimes becoming threat to
LINE, Whisper, and WeChat are recovered from the smart- cyber security,” IASR Xournals, vol. 2, no. 1, 2019https://
phone internal memory. Wickr, on the other hand, discloses www.academia.edu/39618017/Cyber_Crimes_Becoming_
very little information. Potential artifacts have been catego- Threat_to_Cyber_Security.
rized to utilize them to create a report. Tools are analyzed [7] U. Sharma, S. Ghisingh, and E. Ramdinmawii, “A study on the
cyber, crime and cyber criminals a global problem,” Journal:
with respect to their capabilities, NIST standards for smart-
International Journal of Web Technology, vol. 3, pp. 172–179,
phone analysis tools, and few additional parameters defined 2014.
during this study. The results of this analysis report that
[8] R. A. Grimes, What Is Personally Identifiable Information
among the three tools, Magnet AXIOM is ranked no. 1 with (PII)? How to Protect It under GDPRCSO OnlineAugust
an index no. of 76.0% followed by Autopsy at 71.5% and XRY 2019; https://www.csoonline.com/article/3215864/how-to-
at rank 3 with an index of 65.5%. According to the NIST protect-personally-identifiable-information-piiunder-gdpr
parameter of smartphone analysis tools and additional .html.
parameters on the basis of overall performance, Magnet [9] H. Saini, Y. S. Rao, and T. C. Panda, “Cyber-crimes and their
AXIOM is the number one followed by XRY and Autopsy. impacts: a review,” International Journal of Engineering
In the future, a new version of Android Smartphones can Research and Applications, vol. 2, no. 2, pp. 202–209, 2012.
be analyzed for application forensics as almost every 3 [10] H. Mahalik, R. Tamma, and S. Bommisetty, Practical Mobile
month, a new version or software update is released for Forensics, Packt Publishing Ltd, 2016.
Android. This leaves a lot of areas to further research the [11] Instagram, App Store, 2010, August 2019. https://apps.apple
apps on the latest version and analyze the security flaws. .com/us/app/instagram/id389801252.
Wireless Communications and Mobile Computing 35
[12] LINE Free Calls, Messages-Apps on Google PlayGooglecomAu- [35] T. Mehrotra and B. Mehtre, “Forensic analysis of Wickr appli-
gust 2019 https://play.google.com/store/apps/details. cation on android devices,” in 2013 IEEE International Confer-
[13] Whisper Apps on Google PlayGooglecomAugust 2019 https:// ence on Computational Intelligence and Computing Research,
play.google.com/store/apps/details. pp. 1–6, IEEE, 2013.
[14] WeChat Apps on Google PlayGooglecomAugust 2019 https:// [36] A. Mahajan, M. Dahiya, and H. Sanghvi, “Forensic analysis of
play.google.com/store/apps/details. instant messenger applications on android devices,” 2013,
[15] Wickr Me Private Messenger Apps on Google PlayGoogleco- http://arxiv.org/abs/13044915.
mAugust 2019 https://play.google.com/store/apps/details. [37] T. Mathavan and M. A. Nagoor, “Acquisition and analysis of
[16] Magnet AXIOM Digital Investigation Platform|Magnet Foren- artifacts from instant messenger on android device,” Interna-
sicsMagnet ForensicsAugust 2019 https://www tional Journal of Engineering Research & Technology, pp.
.magnetforensics.com/products/magnet-axiom/. 1210–1212, 2014.
[17] AutopsySleuthkit.orgAugust 2019 https://www.sleuthkit.org/ [38] D. Walnycky, I. Baggili, A. Marrington, J. Moore, and
autopsy/. F. Breitinger, “Network and device forensic analysis of
Android social-messaging applications,” Digital Investigation,
[18] MSAB, MSAB The Pioneers of Mobile ForensicsMSABAugust
vol. 14, pp. S77–S84, 2015.
2019 https://www.msab.com/.
[39] C. Anglano, M. Canonico, and M. Guazzone, “Forensic analy-
[19] R. P. Ayers, Smart Phone Tool Specification|NIST, Computer
sis of the chatsecure instant messaging application on android
Forensic Tool Testing, 2017, August 2019. https://www.nist
smartphones,” Digital investigation, vol. 19, pp. 44–59, 2016.
.gov/publications/smart-phone-tool-specification.
[40] O. S. Adebayo, S. A. Sulaiman, O. Osho, J. Alhassan, and
[20] NIST, Smart Phone Tool Test Assertions and Test Plan, NIST,
S. Abdul-hamid, Forensic Analysis of Kik Messenger on
US Department of Commerce, 2010.
Android Devices, ResearchGate, 2017, https://www
[21] Android (Operating System), Wikipedia, 2019. .researchgate.net/publication/321268908_Forensic_Analysis_
[22] A. Hoog, Android Forensics-Investigation, Syngress, 2011. of_Kik_Messenger_on_Android_Devices.
[23] “Application sandbox|android open source project,” 2019, [41] J. H. Ryu, N. Y. Kim, B. W. Kwon, S. K. Suk, J. H. Park, and
September 2019 https://source.android.com/security/app- J. H. Park, “Analysis of a third-party application for mobile
sandbox. forensic investigation,” Journal of Information Processing Sys-
[24] B. Reaves, J. Bowers, S. A. Gorski Iii et al., “∗droid: assessment tems, vol. 14, no. 3, 2018.
and evaluation of android application analysis tools,” ACM [42] R. Umar, I. Riadi, and G. M. Zamroni, “Mobile forensic tools
Computing Surveys (CSUR), vol. 49, no. 3, pp. 1–30. evaluation for digital crime investigation,” International Jour-
[25] B. D. Carrier and E. H. Spafford, “Categories of digital investi- nal on Advanced Science, Engineering and Information Tech-
gation analysis techniques based on the computer history nology, vol. 8, no. 3, pp. 949–955, 2018.
model,” Digital Investigation, vol. 3, pp. 121–130, 2006. [43] G. B. Satrya, P. T. Daely, and M. A. Nugroho, “Digital forensic
[26] R. Ayers, S. Brothers, and W. Jansen, NIST Special Publication analysis of Telegram Messenger on Android devices,” in 2016
800-101 Guidelines on Mobile Device, Obtenido de National International Conference on Information & Communication
Institute of Standards and Technology, 2014, http://nvlpubs. Technology and Systems (ICTS), pp. 1–7, IEEE, 2016.
[27] A. Verma, “What is rooting? Is rooting my android smart- [44] G. B. Satrya, P. Daely, and S. Y. Shin, “Android forensics anal-
phone illegal? Fossbytes,” November 2017; https://fossbytes ysis: private chat on social messenger,” in 2016 Eighth Interna-
.com/what-is-rooting-meaning-android-legal. tional Conference on Ubiquitous and Future Networks
[28] T. Almehmadi and O. Batarfi, Impact of Android Phone Root- (ICUFN), pp. 430–435, IEEE, 2016.
ing on User Data Integrity in Mobile Forensics, IEEE, 2021. [45] J. Gregorio, A. Gardel, and B. Alarcos, “Forensic analysis of
[29] S. Park, S. Park, and K. Ma, “An automatic user activity anal- telegram messenger for Windows phone,” Digital Investiga-
ysis method for discovering latent requirements: usability issue tion, vol. 22, pp. 88–106, 2017.
detection on mobile applications,” Sensors, vol. 18, no. 9, [46] J. Choi, J. Park, and H. Kim, “Forensic analysis of the backup
p. 2963, 2018. database file in KakaoTalk messenger,” in 2017 IEEE Interna-
[30] F. Rebhi, Development of a Tool for Analysis and Visualization tional Conference on Big Data and Smart Computing (Big-
of Android Logs, Ecole Nationale des Sciences de l’Informa- Comp), pp. 156–161, IEEE, 2017.
tique (ENSI), Tunisie, 2013, https://hal.inria.fr/hal-00922034. [47] R. Al Mushcab and P. Gladyshev, “Forensic analysis of insta-
[31] P. Andriotis, G. Oikonomou, and T. Tryfonas, “Forensic anal- gram and path on an iPhone 5s mobile device,” in 2015 IEEE
ysis of wireless networking evidence of android smartphones,” Symposium on Computers and Communication (ISCC),
in 2012 IEEE International Workshop on Information Foren- pp. 146–151, IEEE, 2015.
sics and Security (WIFS), pp. 109–114, IEEE, 2012. [48] A. A. Abbasi, S. Saleem, and R. Zulqarnain, “Forensic investi-
[32] P. Stephenson, “A comprehensive approach to digital incident gation of smartphone cloud storage applications,” NUST Jour-
investigation,” Information Security Technical Report, vol. 8, nal of Engineering Sciences, vol. 10, no. 1, pp. 30–36, 2017.
no. 2, pp. 42–54, 2003. [49] N. Al Mutawa, I. Baggili, and A. Marrington, “Forensic analy-
[33] C. G. Nolte, Privacy in Social Networks – Economic Options for sis of social networking applications on mobile devices,” Digi-
Regulation, ResearchGate, 2017, https://www.researchgate tal Investigation, vol. 9, pp. S24–S33, 2012.
.net/publication/324517531_Privacy_in_social_networks_-_ [50] Y. C. Tso, S. J. Wang, C. T. Huang, and W. J. Wang, “iPhone
economic_options_for_regulation. social networking for evidence investigations using iTunes
[34] M. P. Aji, I. Riadi, and A. Lutfhi, “The digital forensic analysis forensics,” in Proceedings of the 6th International Conference
of Snapchat application using XML records,” Journal of Theo- on Ubiquitous information management and Communication,
retical & Applied Information Technology, vol. 95, no. 19, 2017. ACM, p. 62, 2012.
36 Wireless Communications and Mobile Computing