Contemporary Digital Forensic Investigations of Cloud and Mobile Applications 2017
DOI: 10.1016/b978-0-12-805303-4.00002-2
|View full text |Cite
|
Sign up to set email alerts
|

Forensics Analysis of Android Mobile VoIP Apps

Abstract: Voice over Internet Protocol (VoIP) applications (apps) provide convenient and low cost means for users to communicate and share information with each other in real-time. Day by day, the popularity of such apps is increasing, and people produce and share a huge amount of data, including their personal and sensitive information. This might lead to several privacy issues, such as revealing user contacts, private messages or personal photos. Therefore, having an up-to-date forensic understanding of these apps is … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 50 publications
0
10
0
Order By: Relevance
“…After uploading an app by developers to the app store, the security module of app store performs the first initial scan to confirm the normal behavior of the application [18]. Apps which pass the initial security check will be available for download in app stores [19]. Third party anti-malware applications perform their own scans after installation completion.…”
Section: Related Workmentioning
confidence: 99%
“…After uploading an app by developers to the app store, the security module of app store performs the first initial scan to confirm the normal behavior of the application [18]. Apps which pass the initial security check will be available for download in app stores [19]. Third party anti-malware applications perform their own scans after installation completion.…”
Section: Related Workmentioning
confidence: 99%
“…It is acknowledged that users of MMOG's like Minecraft will utilise third-party applications to communicate with other gamers whilst in play. Sound research has been conducted into the evidential retrieval of data from popular VoIP applications on mobile platforms [33] so it is now necessary to also explore the in-built chat facilities between various operating system platforms.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Notably, Li et al [4] and Kim et al [5] discovered multiple vulnerabilities in VoLTE's both control-and data-plane functions, and Xie et al [6] uncovered four vulnerabilities in operational Wi-Fi calling services. Regarding Android VoIP's client-side security, only the privacy risks of some VoIP apps were tested [7,8], e.g., whether their traffic are encrypted with SSL/TLS. It is thus unclear whether Android's VoIP integration at the operating system level are secure or not.…”
Section: Introductionmentioning
confidence: 99%