Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter and Telegram as Case Studies

@inproceedings{Yusoff2017NetworkTF,
  title={Network Traffic Forensics on Firefox Mobile OS: Facebook, Twitter and Telegram as Case Studies},
  author={Mohd Najwadi Yusoff and Ali Dehghantanha and Ramlan Mahmod},
  booktitle={Contemporary Digital Forensic Investigations of Cloud and Mobile Applications},
  year={2017}
}

Figures and Tables from this paper

Encrypted Network Traffic Analysis of Secure Instant Messaging Application: A Case Study of Signal Messenger App

This study aims to provide a network forensic strategy to identify the potential artifacts from the encrypted network traffic of the prominent social messenger app Signal (on Android version 9) which can then be used as supportive evidence for forensic investigation.

CloudMe forensics: A case of big data forensic investigation

In this research, CloudMe, a popular cloud storage service, is studied and the types and locations of the artefacts relating to the installation and uninstallation of CloudMe client application, logging in and out, and file synchronization events from the computer desktop and mobile clients are described.

RESIDUAL FACEBOOK DATA ANALYSIS IN BROWSERS

This paper examines the potential to recover artifacts of forensic interest after three popular browsers, namely: Mozilla Firefox, Google Chrome and Internet Explorer, have been used to access Facebook.

Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study

This paper seeks to determine the data remnants of forensic value from Syncany private cloud storage service, a popular storage engine for big data platforms, and demonstrates the types and the locations of the artifacts that can be forensically recovered.

What’s on the Horizon? An In-Depth Forensic Analysis of Android and iOS Applications

A detailed forensic investigation of both Android and iOS OSs is conducted to elucidate their structures for investigators, identify pertinent forensic artifacts, highlight any privacy and security concerns in popular applications present on both OSs, and validate the forensic investigation on the selected tools for reproducibility and verification purposes.

Big Data Forensics: Hadoop Distributed File Systems as a Case Study

This HDFS research provides a thorough understanding of the types of forensically relevant artefacts that are likely to be found during a forensic investigation, and aims to detect remnants of malicious users’ activities within the HDFS environment.

CloudMe Forensics: A Case of Big-Data Investigation

U SIR is a digi t al collec tion of t h e r e s e a r c h ou t p u t of t h e U nive r si ty of S alford. Whe r e copyrigh t p e r mi t s, full t ex t m a t e ri al h eld in t h e r e posi to ry is m

Channel retrieval: finding relevant broadcasters on Telegram

The channel retrieval problem which aims to find a sorted list of related channels to a user query is introduced and it is shown that using a semantic approach for query expansion can enhance channel retrieval performance.

Browser Analysis of Residual Facebook Data

The potential to recover artifacts of forensic interest after three popular browsers, namely: Mozilla Firefox, Google Chrome and Internet Explorer are used to access Facebook is examined.

References

SHOWING 1-10 OF 24 REFERENCES

Advances of mobile forensic procedures in Firefox OS

An overview and methodology of mobile forensic procedures in forensically sound manner for Firefox OS is presented, designed to allow smartphones to communicate directly with HTML5 applications using JavaScript and newly introduced WebAPI.

Mobile forensic data acquisition in Firefox OS

This paper will present an approach for mobile forensic data acquisition in a forensically sound manner from a Firefox OS running device that will largely use the UNIX dd command to create a forensic image from the Firefox OSrunning device.

An approach for forensic investigation in Firefox OS

F forensic analysis for Firefox OS is urgently needed in order to investigate any criminal intentions and an approach and methodology in forensically sound manner is presented.

Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies

This research contributes to an in-depth understanding of the types of terrestrial artefacts that are likely to remain after the use of instant messaging services and application software on a contemporary Windows operating system.

Performance measurement for mobile forensic data acquisition in Firefox OS

This paper will present an approach for mobile forensic data acquisition in a forensically sound manner from a Firefox OS running device that will largely use the UNIX dd command to create a forensic image from the Firefox OSrunning device.

Cloud storage forensics: MEGA as a case study

A range of artefacts arising from user activities, such as login, uploading, downloading, deletion, and the sharing of files, which could be forensically recovered are identified, as well as findings such as modification of files’ timestamps.

Forensic investigation of OneDrive, Box, GoogleDrive and Dropbox applications on Android and iOS devices

This paper examines four popular cloud client apps, namely OneDrive, Box, GoogleDrive, and Dropbox, on both Android and iOS platforms and identifies artefacts of forensic interest, such as information generated during login, uploading, downloading, deletion, and the sharing of files.

Cloud Storage Forensic: hubiC as a Case-Study

Investigation of hubiC as one of popular cloud platforms running on Microsoft Windows 8.1 is presented and artefacts pertaining different usage ofhubiC namely upload, download, installation and uninstallation on Microsoftwindows8.1 are presented.

A data-centric model for smartphone security

A data-centric model to protect all the vulnerabilities and prevent application and malware threats is suggested and is able to ensure confidentiality, integrity and availability of data stored on mobile devices.

BitTorrent Sync: First Impressions and Digital Forensic Implications