إقفز إلى قائمة التنقل الرئيسية إقفز إلى المحتوى الرئيسي إقفز إلى نهاية الموقع

قائمة المشرف

Articles

مجلد 2 عدد 1 (2024): International Journal of Information & Digital Security

Forensic Analysis of Health and Fitness Applications on Android

  • Nasser Jarallah Al-Ghamdi
  • Mousa Al-Akhras
  • Fuad Alhosban
مقدم
January 10, 2025
منشور
2025-01-10

الملخص

The field of computer forensics focuses on retrieving, analyzing, and presenting computer-based data to be used as evidence in legal proceedings. With the proliferation of digital evidence in civil litigation, legal systems worldwide have adapted to accommodate these new forms of evidence. This research delves into the forensic analysis of health and fitness applications on Android devices, which are now critical targets for forensic investigations due to the sensitive data they store, such as contacts, messages, images, and location information. Given the widespread use of over 250,000 health and fitness applications, there is an urgent need to evaluate their security and privacy measures. The objective of this study is to identify the potential forensic artifacts available within these applications and assess their implications for user privacy and security. By employing rigorous forensic methodologies, we analyze various popular health and fitness apps to understand how securely they store user data and how this data can be extracted and utilized in forensic investigations. Our findings highlight the importance of choosing secure applications that protect user privacy, a crucial consideration for users and developers alike.

المراجع

  1. Akarawita, I. U., Perera, A. B., & Atukorale, A. (2016). ANDROPHSY - Forensic framework for Android. 15th International Conference on Advances in ICT for Emerging Regions, ICTer 2015 - Conference Proceedings, 250–258. https://doi.org/10.1109/ICTER.2015.7377696
  2. Al-Saleh, M. I., & Forihat, Y. A. (2013). Skype Forensics in Android Devices. International Journal of Computer Applications, 78(7), 975–8887. www.android.com
  3. Alyahya, T., & Kausar, F. (2017). Snapchat Analysis to Discover Digital Forensic Artifacts on Android Smartphone. Procedia Computer Science, 109, 1035–1040. https://doi.org/10.1016/J.PROCS.2017.05.421
  4. Anobah, M., Saleem, S., & Popov, O. (2014). Testing Framework for Mobile Device Forensics Tools. Journal of Digital Forensics, Security and Law, 9(2), 18. https://doi.org/https://doi.org/10.15394/jdfsl.2014.1183
  5. Ayers, R., Brothers, S., & Jansen, W. (2014). Guidelines on mobile device forensics. National Institute of Standards and Technology . https://doi.org/10.6028/NIST.SP.800-101R1
  6. Best practices for search and seizure of electronic and digital evidence GUIDELINES FOR DIGITAL FORENSICS FIRST RESPONDERS. (2021).
  7. Boueiz, M. R. (2020). Importance of rooting in an Android data acquisition. 8th International Symposium on Digital Forensics and Security, ISDFS 2020. https://doi.org/10.1109/ISDFS49300.2020.9116445
  8. Chang, M. S., & Yen, C. P. (2019). Forensic Analysis of Social Networks Based on Instagram. International Journal of Network Security, 21(5), 850. https://doi.org/10.6633/IJNS.201909
  9. Dimitriadis, A., Ivezic, N., Kulvatunyou, B., & Mavridis, I. (2020). D4I-Digital forensics framework for reviewing and investigating cyber attacks. https://doi.org/10.1016/j.array.2019.100015
  10. Dogan, S., & Akbal, E. (2017). Analysis of mobile phones in digital forensics. 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics, MIPRO 2017 - Proceedings, 1241–1244. https://doi.org/10.23919/MIPRO.2017.7973613
  11. Easttom, C. (2019). System Forensics, Investigation, and Response.
  12. Gilbert, A., Seigfried-Spellar, K. C., & Seigfried-Spellar, K. (2022). Forensic Discoverability of iOS Vault Applications. Journal of Digital Forensics, Security and Law, 17(1), 1. https://doi.org/https://doi.org/10.15394/jdfsl.2022.1773
  13. Guo, W., Wu, S., & Wang, D. (2017). A forensics method for android devices based on the technique of temporary root. ICCSE 2017 - 12th International Conference on Computer Science and Education, 502–505. https://doi.org/10.1109/ICCSE.2017.8085543
  14. Hussain, W., Punja, S. G., & Mislan, R. P. (2008). Mobile Device Analysis. SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, 2(1). http://www.numberingplans.com/?page=analysis
  15. Jasmin Cosic ; Miroslav Baca. (2010, June). Do we have full control over integrity in digital evidence life cycle? | IEEE Conference Publication | IEEE Xplore. Proceedings of the ITI 2010, 32nd International Conference on Information Technology Interfaces. http://0y10egqdk.y.https.ieeexplore.ieee.org.seu.proxy.deepknowledge.io/document/5546413/citations?tabFilter=papers#citations
  16. Lewis, J. A., Zheng, D. E., & Carter, W. A. (2017). The Effect of Encryption on Lawful Access to Communications and Data. www.rowman.com
  17. Montasari, R., Hill, R., Carpenter, V., & Hosseinian-Far, A. (2019). The standardised digital forensic investigation process model (SDFIPM). Advanced Sciences and Technologies for Security Applications, 169–209. https://doi.org/10.1007/978-3-030-11289-9_8
  18. Ogazi-Onyemaechi, B. C., Dehghantanha, A., & Choo, K. K. R. (2017). Performance of Android Forensics Data Recovery Tools. Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 91–110. https://doi.org/10.1016/B978-0-12-805303-4.00007-1
  19. Padmanabhan, R., Lobo, K., Ghelani, M., Sujan, D., & Shirole, M. (2017). Comparative analysis of commercial and open source mobile device forensic tools. 2016 9th International Conference on Contemporary Computing, IC3 2016. https://doi.org/10.1109/IC3.2016.7880238
  20. Popescu, A. C., & Farid, H. (2004). Statistical Tools for Digital Forensics. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3200, 128–147. https://doi.org/10.1007/978-3-540-30114-1_10
  21. Quality of Life - Vision 2030. (n.d.). Retrieved March 23, 2022, from https://www.vision2030.gov.sa/v2030/vrps/qol/
  22. Shortall, A., & Azhar, M. A. H. bin. (2016). Forensic Acquisitions of WhatsApp Data on Popular Mobile Platforms. Proceedings - 2015 6th International Conference on Emerging Security Technologies, EST 2015, 13–17. https://doi.org/10.1109/EST.2015.16
  23. Skulkin, Oleg., Tindall, Donnie., & Tamma, Rohit. (2018). Learning Android Forensics Analyze Android Devices with the Latest Forensic Tools and Techniques, 2nd Edition. https://learning.oreilly.com/library/view/learning-android-forensics/9781789131017/
  24. Son, N., Lee, Y., Kim, D., James, J. I., Lee, S., & Lee, K. (2013). A study of user data integrity during acquisition of Android devices. Digital Investigation, 10, S3–S11. https://doi.org/10.1016/J.DIIN.2013.06.001
  25. statcounter. (2022). Mobile Operating System Market Share Worldwide | Statcounter Global Stats. https://gs.statcounter.com/os-market-share/mobile/worldwide
  26. Tzanou, M. (2020). Health data privacy under the GDPR : big data challenges and regulatory responses. https://www.routledge.com/Health-Data-Privacy-under-the-GDPR-Big-Data-Challenges-and-Regulatory-Responses/Tzanou/p/book/9780367077143
  27. Wilson, R., & Chi, H. (2018). A Framework for Validating Aimed Mobile Digital Forensics Evidences. https://doi.org/10.1145/3190645.3190695

التنزيلات

تنزيل البيانات غير متاح بعد.

الأعمال الأكثر قراءة لنفس المؤلف/المؤلفين