Skip to main content

Effectiveness of Mobile Wiping Applications

  • Conference paper
  • First Online:
Future Access Enablers for Ubiquitous and Intelligent Infrastructures (FABULOUS 2021)

Abstract

Given the considerable amount of data (including sensitive and personal information) collected, stored, disseminated by mobile devices, there is a need to ensure that such devices can be securely wiped when they are misplaced, stolen or disposed. Hence, in this paper we evaluate the effectiveness of three categories of wiping applications: Factory Reset, Remote Reset, Data Wiping Applications (apps). Specifically, we study two popular wiping apps (i.e., Shreddit – Data Eraser by PalmTronix, and Secure Wipe by Pinellas CodeWorks) and install both apps on three test devices, namely: Samsung S5 (Android 6.0.1), Samsung S5 Active (OS version 6.0.1), and an iPhone 6S (iOS 13.2.2). We then study the extent of data that can be recovered, from the three categories of wiping, using two popular commercial mobile forensic software, namely: Mobile Phone Examiner Plus (MPE+) from Accessdata, and MOBILedit from Compelson labs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Jones, B.H., Chin, A.: On the efficacy of smartphone security: a critical analysis of modifications in business students’ practices over time. Int. J. Inf. Manag. 35(5), 561–571 (2015). https://doi.org/10.1016/j.ijinfomgt.2015.06.003. Accessed 17 Oct 2019

  2. Allam, S., Flowerday, S., Flowerday, E.: Smartphone information security awareness: a victim of operational pressures. Comput. Secur. 42, 56–65 (2014). https://doi.org/10.1016/j.cose.2014.01.005. Accessed 17 Oct 2019

  3. Cardwell, G.: Residual Network Data Structures in Android Devices, Masters, Naval Postgraduate School (2011)

    Google Scholar 

  4. Yao, M., Chuang, M., Hsu, C.: The kano model analysis of features for mobile security applications. Comput. Secur. 78, 336–346 (2018). https://doi.org/10.1016/j.cose.2018.07.008. Accessed 17 Oct 2019

  5. Blancco Technology Group: Analysis of Data Remanence After Factory Reset, and Sophisticated Attacks on Memory Chips. Blancco Technology Group (2019)

    Google Scholar 

  6. Bransfield-Garth, S.: Mobile phone calls as a business risk. Network Secur. 2010(9), 4–11 (2010). https://doi.org/10.1016/s1353-4858(10)70114-8. Accessed 17 Oct 2019

  7. Korenis, P., Billick, S.: Forensic Implications: adolescent sexting and cyberbullying. Psychiatric Quart. 85(1), 97–101 (2013). https://doi.org/10.1007/s11126-013-9277-z. Accessed 17 Oct 2019

  8. Ehatisham-ul-Haq, M., Azam, M., Naeem, U., Rѐhman, S., Khalid, A.: Identifying smartphone users based on their activity patterns via mobile sensing. Procedia Comput. Sci. 113, 202–209 (2017). https://doi.org/10.1016/j.procs.2017.08.349. Accessed 17 Oct 2019

  9. Narayanan, S.V.: Myths and fallacies of “Personally Identifiable Information”. Commun. ACM 53(6), 24 (2010). https://doi.org/10.1145/1743546.1743558. Accessed 17 Oct 2019

  10. Wilbanks, L.: The impact of personally identifiable information. IT Professional 9(4), 62–64 (2007). https://doi.org/10.1109/mitp.2007.77. Accessed 17 Oct 2019

  11. Gámez-Guadix, M., Mateos-Pérez, E.: Longitudinal and reciprocal relationships between sexting, online sexual solicitations, and cyberbullying among minors. Comput. Hum. Behav. 94, 70–76 (2019). https://doi.org/10.1016/j.chb.2019.01.004.. Accessed 17 Oct 2019

  12. Barker, Cosmo Survey: 9 out of 10 Millennial Women Take Naked Photos. Cosmopolitan (2014). https://www.cosmopolitan.com/sex-love/advice/a30675/ninety-percent-millennial-women-take-nude-photos-cosmo-survey/. Accessed 17 Oct 2019

  13. Milne, G., Pettinico, G., Hajjat, F., Markos, E.: Information sensitivity typology: mapping the degree and type of risk consumers perceive in personal data sharing. J. Consumer Affairs 51(1), 133–161 (2016). https://doi.org/10.1111/joca.12111. Accessed 17 Oct 2019

  14. Tankard, C.: The security issues of the Internet of Things. Comput. Fraud Secur. 201(9), 11–14 (2015) https://doi.org/10.1016/s1361-3723(15)30084-1. Accessed 17 Oct 2019

  15. Yang, L., Wei, T., Zhang, F., Ma, J.: SADUS: secure data deletion in user space for mobile devices. Comput. Secur. 77, 612–626 (2018). https://doi.org/10.1016/j.cose.2018.05.013.Accessed 17 Oct 2019

  16. Reardon, J., Basin, D., Capkun, S.: SoK: secure data deletion. In: 2013 IEEE Symposium on Security and Privacy (2013). https://doi.org/10.1109/sp.2013.28. Accessed 17 Oct 2019

  17. Di Leom, M.: Remote Wiping in Android. University of South Australia, Masters (2015)

    Google Scholar 

  18. Kissel, R., Regenscheid, A., Scholl, M., Stine, K.: Guidelines for Media Sanitization (2014). https://doi.org/10.6028/nist.sp.800-88r1. Accessed 17 Oct 2019

  19. Simon, L., Anderson, R.: Security Analysis of Android Factory Resets. University of Cambridge (2015)

    Google Scholar 

  20. Patel, N.: Utilisation of Flash Storage Memory, no. 2018 (2018). https://doi.org/10.13140/RG.2.2.35672.34565.. Accessed 17 Oct 2019

  21. Brown, Almost ALL iPhones Are Encrypted, Almost ALL Android Smartphones Are NOT, Express.co.uk (2019). https://www.express.co.uk/life-style/science-technology/653099/iPhone-iOS-Encryption-Android-OS-Google-Smartphone. Accessed 17 Oct 2019

  22. Miller, J.: Google and Apple to Introduce Default Encryption, BBC News (2014). https://www.bbc.com/news/technology-29276955. Accessed 17 Oct 2019

  23. Gómez-Miralles, L., Arnedo-Moreno, J.: Hardening iOS devices against remote forensic investigation. Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, pp. 261–283 (2018). https://doi.org/10.1016/b978-0-12-811373-8.00012-4. Accessed 17 Oct 2019

  24. Kingsley-Hughes, Here's How to Securely Wipe Your Android Smartphone for Resale, ZDNet (2019). https://www.zdnet.com/article/heres-how-to-securely-wipe-your-android-smartphone-for-resale/. Accessed 17 Oct 2019

  25. Altuwaijri, H., Ghouzali, S.: Android data storage security: a review. J. King Saud University – Comput. Inf. Sci. (2018). https://doi.org/10.1016/j.jksuci.2018.07.004. Accessed 17 Oct 2019

  26. Meckley, T.: An Empirical Comparison of Smartphone Factory-Resets to Remote Deletion Applications. University of South Alabama, Masters (2019)

    Google Scholar 

  27. UZ, The Effectiveness of Remote Wipe as a Valid Defense for Enterprises Implementing a BYOD Policy, Masters, University of Ottawa (2019)

    Google Scholar 

  28. Pollitt, M., Shenoi, S. (eds.): DigitalForensics 2005. ITIFIP, vol. 194. Springer, Boston (2005). https://doi.org/10.1007/0-387-31163-7

    Book  Google Scholar 

  29. Barmpatsalou, K., Cruz, T., Monteiro, E., Simoes, P.: Current and future trends in mobile device forensics. ACM Comput. Surv. 51(3), 1–31 (2018). https://doi.org/10.1145/3177847. Accessed 17 Oct 2019

  30. Thomas, D.: How to delete files on android so they can't ever be recovered. Gadget Hacks (2016). https://android.gadgethacks.com/how-to/delete-files-android-so-they-cant-ever-be-recovered-0169550/. Accessed 17 Oct 2019

  31. Bilić, D.: How to delete your smartphone data securely before selling your device. WeLiveSecurity (2016). https://www.welivesecurity.com/2016/06/03/how-do-you-delete-your-data-securely-before-selling-your-cell-phone/. Accessed 17 Oct 2019

  32. Glisson, W., Storer, T., Blyth, A., Grispos, G., Campbell, M.: In-the-wild residual data research and privacy. J. Digital Forens. Secur. Law 11(1) (2016). https://doi.org/10.15394/jdfsl.2016.1371

  33. Yu, X., Wang, Z., Sun, K., Zhu, W., Gao, N., Jing, J.: Remotely wiping sensitive data on stolen smartphones. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security - ASIA CCS 2014, no. 2014, pp. 537–542 (2014). https://doi.org/10.1145/2590296.2590318.. Accessed 17 Oct 2019

  34. Di Leom, M., Choo, K., Hunt, R.: Remote wiping and secure deletion on mobile devices: a review. J. Foren. Sci. 61(6), 1473–1492 (2016). https://doi.org/10.1111/1556-4029.13203. Accessed 17 Oct 2019

  35. Apple Inc. Remotely Locating and Commanding a Mobile Device, US 2018/0337974 A1 (2018)

    Google Scholar 

  36. AirWatch LLC, Device Back and Wipe, US 2019 / 0073271 A1 (2019)

    Google Scholar 

  37. Hoffman, Why Deleted Files Can Be Recovered, and How You Can Prevent It. How-To Geek (2019). https://www.howtogeek.com/125521/htg-explains-why-deleted-files-can-be-recovered-and-how-you-can-prevent-it/. Accessed 17 Oct 2019

Download references

Acknowledgement

We would like to express our gratitude to Compelson Labs for the support and making MobilEdit available to our research. We would also like to acknowledge the contributions of Andrew Mendoza in the research of background and related work, and testing.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kim-Kwang Raymond Choo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jochims, K., Bello, A., Choo, KK.R. (2021). Effectiveness of Mobile Wiping Applications. In: Perakovic, D., Knapcikova, L. (eds) Future Access Enablers for Ubiquitous and Intelligent Infrastructures. FABULOUS 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 382. Springer, Cham. https://doi.org/10.1007/978-3-030-78459-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78459-1_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78458-4

  • Online ISBN: 978-3-030-78459-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics