Skip to main content

iForensics: Forensic Analysis of Instant Messaging on Smart Phones

  • Conference paper
Digital Forensics and Cyber Crime (ICDF2C 2009)

Abstract

Smart phones with Internet capability are growing in popularity, due to many of their useful capabilities. Among other handy features of smart phones, Instant Messaging (IM) is very popular due to the level of convenience it provides in interpersonal communications. As the usage of IM on smart phone is increasing rapidly, it is important to take measures in advance from forensic standpoint forecasting the potential use of it in cyber crimes such as the cyber stalking and cyber bullying. Although, current IM applications for smart phones are in most cases a downsized version of the one used on traditional computers, diverse structure of file systems and storage device on different smart phones pose unique challenges to forensic examiners for recovering digital evidences of a conversation under investigation. In this work, we study and report the forensic analysis of three different IMs: AIM, Yahoo! Messenger and Google Talk, (both client based and web based version) on Apple iPhone. Our results show that the forensic analysis of IMs on smart phones has significant value and needs further attention.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Apple-iPhone-Mobile phone, iPod and Internet device, http://www.apple.com/iphone/

  2. Vaughn, S.C.: MobileSyncBrowser, http://homepage.mac.com/vaughn/msync/

  3. Yahoo! Messenger for the iPhone, http://messenger.yahoo.com/platform/iphone/

  4. AIM on iPhone - Discover AOL, http://daol.aol.com/software/mac/iphone/aim

  5. Google Mobile | Talk for your iPhone, http://www.google.com/mobile/apple/talk.html

  6. Mac OS X Forensics, http://www.macosxforensics.com/index.html

  7. Richardson, W.: How To Mount Your iPhone Filesystem On Your Desktop In Ubuntu (2007), http://www.fsckin.com/2007/09/23/how-to-mount-your-iphonefilesystem-on-your-desktop-in-ubuntu/

  8. Singh, A.: MacFuse, http://code.google.com/p/macfuse/

  9. Colyer, M.: iFuse and libiphone (2009), http://matt.colyer.name/projects/iphone-linux/index.php?title=Main_Page

  10. How to Jailbreak Your iPhone in Under a Minute, http://www.appleiphonereview.com/iphone-tutorials/iphone-jailbreak/

  11. Web IM-AIM Express, http://www.aim.com/aimexpress.adp

  12. Yahoo Messenger for the Web, http://webmessenger.yahoo.com

  13. Telephia Mobile Internet Report, http://www.telephia.com/documents/InternetandDeviceReleaseJune2006v68.14.06FINAL.pdf

  14. Zdziarski, J.: iPhone Forensics. O’reilly Media, California (2008)

    Google Scholar 

  15. Punja, S.G., Mislan, R.P.: Mobile Device Analysis. Small Scale Digital Device Forensics Journal 2(1), 1–16 (2008)

    Google Scholar 

  16. Hurbanek, T.B.: Messaging: A forensic view, http://www.cscic.state.ny.us/security/conferences/security/2006/presentations/hurbanek.cfm

  17. Reust, J.: AOL Instant Messenger Trace Evidence. Digital Investigation 3(4), 238–243 (2006)

    Article  Google Scholar 

  18. Parsonage, H.: The Forensic Recovery of Instant Messages from MSN Messenger and Windows Live Messenger (2008), http://computerforensics.parsonage.co.uk/downloads/MSNandLiveMessengerArtefactsOfConversations.pdf

  19. Dickson, M.: An examination into Yahoo Messenger 7.0. Digital Investigation 3(3), 159–165 (2006)

    Article  Google Scholar 

  20. Kiley, M., Dankner, S., Rogers, M.: Forensic Analysis of Volatile Instant Messaging. Advances in Digital Forensics 4, 129–138 (2008)

    Google Scholar 

  21. Computer Investigation, Electronic Evidence - ACPO Guideline (2009), http://www.dataclinic.co.uk/computer-ACPO.htm

  22. Aesco, Radio Tactics Limited, http://www.radio-tactics.com/?pageid=phonedatabasehandle&man=Apple

  23. Device Seizure, Paraben Forensic Tools, http://www.paraben-forensics.com/cell_models.html

  24. Wolf, Sixth Legion, http://www.sixthlegion.com/

  25. Cyber stalking and online libel, http://www.abc.net.au/rn/lawreport/stories/2009/2584563.htm

  26. Berka, J.: iPhone Safari isn’t Safari 3.0, http://arstechnica.com/apple/news/2007/07/iphone-safari-isnt-safari-3-0-and-other-development-surprises.ars

  27. Apple App Store, http://www.apple.com/iphone/apps-for-iphone/

  28. PLIST, http://developer.apple.com/documentation/Darwin/Reference/ManPages/man5/plist.5.html

  29. SQLite Database Browser, http://sqlitebrowser.sourceforge.net/

  30. plist Editor for Windows, http://www.iPodRobot.com/download.htm

  31. Flash installer for iPhone, http://www.geek.com/articles/apple/developer-creates-flash-for-iphone-but-will-it-make-it-to-the-app-store-20090428/

  32. Google Talk, Off the record, http://www.google.com/talk/chathistory.html#offrecord

  33. Mac OS X, http://www.apple.com/macosx/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Husain, M.I., Sridhar, R. (2010). iForensics: Forensic Analysis of Instant Messaging on Smart Phones. In: Goel, S. (eds) Digital Forensics and Cyber Crime. ICDF2C 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 31. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11534-9_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11534-9_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11533-2

  • Online ISBN: 978-3-642-11534-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics