2016
DOI: 10.1007/978-3-319-51064-4_3
|View full text |Cite
|
Sign up to set email alerts
|

Forensic Analysis of Secure Ephemeral Messaging Applications on Android Platforms

Abstract: Abstract. Secure messaging applications have been used for the purposes of major crime, creating the need for forensic research into the area. This paper forensically analyses two secure messaging applications, Wickr and Telegram, to recover artefacts from and then to compare them to reveal the differences between the applications. The artefacts were created on Android platforms by using the secure features of the applications, such as ephemeral messaging, the channel function and encrypted conversations. The … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(16 citation statements)
references
References 5 publications
(15 reference statements)
0
16
0
Order By: Relevance
“…Several works have tackled recovery and digital forensics of specific messaging apps, like Telegram [9,18,24]. The techniques mainly utilise disk images to retrieve valuable evidence.…”
Section: Related Workmentioning
confidence: 99%
“…Several works have tackled recovery and digital forensics of specific messaging apps, like Telegram [9,18,24]. The techniques mainly utilise disk images to retrieve valuable evidence.…”
Section: Related Workmentioning
confidence: 99%
“…Especially, many works have been done on Whatsapp Messenger [5]- [7]. Telegram [7]- [9], Facebook, Twitter, Instagram [10]- [13] and there are still many ongoing works.…”
Section: Related Workmentioning
confidence: 99%
“…As mentioned in Section 3, a Motorola Moto G 3rd Generation running a customised version of Android, CyanogenMod (CM) version 12.1 ( CyanogenMod, 2017), was used as the test mobile platform. This operating system provide rooting, which is necessary to access portions of internal storage that are protected by the operating system's security (Azhar & Barton, 2016). With this customised operating system the root access was granted natively…”
Section: 1 Mobile Forensicsmentioning
confidence: 99%