2021
DOI: 10.3390/app11177789
|View full text |Cite
|
Sign up to set email alerts
|

Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App

Abstract: Instant messaging applications (apps) have played a vital role in online interaction, especially under COVID-19 lockdown protocols. Apps with security provisions are able to provide confidentiality through end-to-end encryption. Ill-intentioned individuals and groups use these security services to their advantage by using the apps for criminal, illicit, or fraudulent activities. During an investigation, the provision of end-to-end encryption in apps increases the complexity for digital forensics investigators.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 24 publications
0
3
0
1
Order By: Relevance
“…In the case of the KakaoTalk and NateOn applications, the encrypted database files can be recovered successfully without a user password [13]. Afzal et al proposed a method to extract user artifacts by analyzing the encrypted network traffic of signal messengers supporting end-to-end encryption [14].…”
Section: Instance Messenger Researchmentioning
confidence: 99%
“…In the case of the KakaoTalk and NateOn applications, the encrypted database files can be recovered successfully without a user password [13]. Afzal et al proposed a method to extract user artifacts by analyzing the encrypted network traffic of signal messengers supporting end-to-end encryption [14].…”
Section: Instance Messenger Researchmentioning
confidence: 99%
“…Lab 3: iOS Network Traffic Analysis and MITM Attacks The objective of this lab is to foster an understanding of network security concepts within the context of iOS applications, enabling learners to analyze network traffic and conduct MITM attacks ethically [42] to uncover security risks and data leaks. Figure 7 illustrates the lab 3 structures and expected outcomes.…”
Section: Ios Penetration Testing Labs: Objectives Structures and Expe...mentioning
confidence: 99%
“…Common features of the Signal service include texts, stickers, media messages, voice messages, audio calls, video calls, typing indicators, and more. Each communication has a security number that may be checked between the persons involved [28].…”
Section: Signalmentioning
confidence: 99%