Social Networks IM Forensics: Encryption Analysis

@article{Barghouthy2013SocialNI,
  title={Social Networks IM Forensics: Encryption Analysis},
  author={Nedaa Al Barghouthy and Huwida E. Said},
  journal={J. Commun.},
  year={2013},
  volume={8},
  pages={708-715}
}
Abstract—In most regards, the twenty-first century may not bring revolutionary changes in electronic messaging technology in terms of applications or protocols. Security issues that have long been a concern in messaging application are finally being solved using a variety of products. Web-based messaging systems are rapidly evolving the text-based conversation. The users have the right to protect their privacy from the eavesdropper, or other parties which interferes the privacy of the users… Expand
Survey of Instant Messaging Applications Encryption Methods
TLDR
In this study, instant messaging applications encryption methods are comparatively presented and key requirements of a secure instant messaging application should provide are highlighted. Expand
Discord Forensics: The Logs Keep Growing
TLDR
This paper investigates the desktop application for Discord on Windows 10 in terms of forensic merit and cybersecurity and shows that plaintext copies of typed message drafts can be recovered along with cached pictures that were sent/received. Expand
Enhanced Instant Message Security and Privacy Protection Scheme for Mobile Social Network Systems
TLDR
The comparison results of the proposed scheme with other schemes and the results of an experiment show that it is a comprehensive secure scheme with high security and good practicability. Expand
Forensic analysis of the backup database file in KakaoTalk messenger
TLDR
It is demonstrated that the backup database file for chat messages in KakaoTalk can be leaked to unauthorized users and a secure key generation technique should be designed to improve resistance against offline password guessing attacks by using a random secret number to generate the encryption key. Expand
Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems: Case study with KakaoTalk, NateOn and QQ messenger
TLDR
Analysis of the locations and file formats of personal data files in three instant messaging applications (KakaoTalk, NateOn, and QQ) which are the most popularly used in China and South Korea finds that their encrypted database files can be recovered without requiring user password. Expand
Forensic Analysis of the ChatSecure Instant Messaging Application on Android Smartphones
TLDR
It is shown that ChatSecure stores local copies of both exchanged messages and files into two distinct, AES-256 encrypted databases, and a technique able to decrypt them when the secret passphrase, chosen by the user as the initial step of the encryption process, is known. Expand
Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies
TLDR
This research contributes to an in-depth understanding of the types of terrestrial artefacts that are likely to remain after the use of instant messaging services and application software on a contemporary Windows operating system. Expand
Forensic Analysis of Third-party Mobile Application
TLDR
The research seeks to fill an existing gap concerning the establishment of the location and types of recoverable data after the uninstallation of the Facebook application from a smartphone device. Expand
Forensics Analysis of Android Mobile VoIP Apps
TLDR
This chapter presents analysis of forensically valuable remnants of three popular Mobile VoIP apps on Google Play store, namely: Viber, Skype, and WhatsApp Messenger, in order to figure out to what extent these apps reveal forensical valuable information about the users activities. Expand
Forensic analysis of Telegram Messenger on Android smartphones
TLDR
The proposed methodology is able to identify all the artifacts generated by Telegram Messenger, to decode and interpret each one of them, and to correlate them in order to infer various types of information that cannot be obtained by considering each one in isolation. Expand
...
1
2
3
4
...

References

SHOWING 1-10 OF 34 REFERENCES
Encryption for Peer-to-Peer Social Networks
  • Oleksandr Bodriagov, S. Buchegger
  • Computer Science
  • 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing
  • 2011
TLDR
This paper explores the requirements of encryption for P2P social networks in detail and proposes to use broadcast encryption schemes with high performance encryption/decryption regardless of the number of identities/groups for an efficient encryption-based access control in the P1P environment. Expand
Live Data Mining Concerning Social Networking Forensics Based on a Facebook Session Through Aggregation of Social Data
TLDR
This work focuses on live data acquisition within the RAM of the desktop PC with emphasis on some distinct strings that could be found in order to reconstruct the previous Facebook session, which plays an extremely precious role for the associate digital forensics investigators to incubate additional thoughtful decisions concerning the discovery of breadcrumb digital evidences in this unparalleled cybercrime incidents era. Expand
A secure private instant messenger
TLDR
The result indicates this architecture and hash algorithm able to improve level of data security. Expand
Forensic artifacts of Facebook's instant messaging service
TLDR
The paper describes experiments in which Facebook Chat conversations in Latin and Arabic character sets were conducted using three major web browsers, and then forensically retrieved, and highlights how Facebook Chat artifacts of Arabic conversations can be difficult to locate with keyword search functions. Expand
A Symmetric Key Cryptographic Algorithm
TLDR
This paper describes an new symmetric key algorithm which uses basic additive cipher and some new component to encrypt the information and provides both algorithms for encryptions and decryption. Expand
Forensic analysis of private browsing artifacts
The paper investigates the effectiveness of the privacy mode feature in three widely used Web browsers, and outlines how to investigate when these browsers have been used to perform a criminal orExpand
Why Private Browsing Modes Do Not Deliver Real Privacy
TLDR
The browser vendors have adopted a very narrow threat model of attacks from which they will protect users, and the private browsing modes primarily protect users from a local adversary, who sits down at a user’s computer, and attempts to look through their browsing history. Expand
The forensic investigation of android private browsing sessions using orweb
TLDR
The researchers conducted experiments to examine if digital evidence could be reconstructed when the Orweb browser is used as a tool to hide web browsing activates on an Android smartphone and found that without rooting the device, no private web browsing traces through Orweb were found. Expand
Network Forensic on Encrypted Peer-to-Peer VoIP Traffics and the Detection, Blocking, and Prioritization of Skype Traffics
  • C. Leung, Yuen-Yan Chan
  • Computer Science
  • 16th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2007)
  • 2007
TLDR
This work adopts the view of Skype as a backdoor and a forensic approach to analyze it, and identifies a transport layer communication framework for Skype, which is a hybrid between payload and non-payload inspections, with improved accuracy and version sustainability over the traditional payload-only approaches. Expand
Selective encryption algorithm implementation for video call on Skype client
  • A. Ramdan, R. Munir
  • Computer Science
  • 2012 7th International Conference on Telecommunication Systems, Services, and Applications (TSSA)
  • 2012
TLDR
This paper proposed a Skype client application made especially for video calling to implement a selective encryption algorithm in video calling, especially via Skype, implemented in C++ programming language using Skypekit API from Skype. Expand
...
1
2
3
4
...