Amazon Kindle Fire HD Forensics

  • Asif Iqbal
  • Hanan Alobaidli
  • Andrew Marrington
  • Ibrahim Baggili
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 132)

Abstract

This research presents two developed approaches for the forensic acquisition of an Amazon Kindle Fire HD. It describes the forensic acquisition and analysis of the Amazon Kindle Fire HD device. Two developed methods of acquisition are presented; one requiring a special cable to reflash the boot partition of the device with a forensic acquisition environment (Method A), and the other exploiting a vulnerability in the device’s Android operating system (Method B). A case study is then presented showing the various digital evidence that can be extracted from the device. The results indicate that Method A is more favorable because it utilizes a general methodology that does not exploit a vulnerability that could potentially be patched by Amazon in future software updates.

Keywords

Amazon Kindle Fire HD Digital Forensics Analysis Acquisition Android forensics Forensic flashing 

References

  1. 1.
    Marturana, F., Me, G., Berte, R., Tacconi, S.: A quantitative approach to triaging in mobile forensics. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 582–588, 16–18 November 2011Google Scholar
  2. 2.
    Mobile Security And Forensics. NIST, 23 February 2009, Cited: 1, 19, 2013. http://csrc.nist.gov/groups/SNS/mobile_security/index.html
  3. 3.
    Zdziarski, J.: iPhone Forensics: Recovering Evidence. Personal Data and Corporate Assets, s.l. O’Reilly (2008)Google Scholar
  4. 4.
    Bader, M., Baggili, I.: iPhone 3GS forensics: Logical analysis using apple iTunes backup utility. Small Scale Digital Device Forensics J. 4(1) (2010)Google Scholar
  5. 5.
    Husain, M.I., Baggili, I., Sridhar, R.: A Simple Cost-Effective Framework for iPhone Forensic Analysis. In: Baggili, I. (ed.) ICDF2C 2010. LNICST, vol. 53, pp. 27–37. Springer, Heidelberg (2011)CrossRefGoogle Scholar
  6. 6.
    Iqbal, B., Iqbal, A., Al Obaidli, H.: A novel method of iDevice(iPhone,iPad,iPod) forensics without jailbreaking. In: International Conference on Innovations in Information Technology (IIT), pp. 238–243, Abu Dhabi, Al Ain. IEEE (2012). doi:10.1109/INNOVATIONS.2012.6207740
  7. 7.
    Hoog, A.: Android forensics: investigation, analysis and mobile security for Google Android. Syngress (2011)Google Scholar
  8. 8.
    Vidas, T., Zhang, C., Christin, N.: Toward a general collection methodology for Android devices. Digital Invest. 8, S14–S24 (2011). doi:10.1016/j.diin.2011.05.003 CrossRefGoogle Scholar
  9. 9.
    Allyn S.: Amazon kindle forensics. A Safe Blog, 9 June 2011, Cited: 1, 19, 2013. www.blog.asafewebsite.com/2011/06/amazon-kindle-forensics.html
  10. 10.
    Thompson, M.: Introduction to kindle forensics. Practical Digital Forensics. 5 September 2011, Cited: 1, 19, 2013. http://practicaldigitalforensics.blogspot.com/2011/09/introduction-to-kindle-forensics.html
  11. 11.
    Eric H.: A cursory look at kindle forensics. In: A Fistful of Dongles. 13 April 2010, Cited: 1, 19, 2013. www.ericjhuber.com/2010/04/cursory-look-at-kindle-forensics.html
  12. 12.
    Kindle 3G Wireless Reading Device - forensically speaking. Computer Forensics and IR - what’s new? 3 October 2010, Cited: 1, 19, 2013. newinforensics.blogspot.com/2010/10/kindle-3g-wireless-reading-device.html
  13. 13.
  14. 14.
    Hannay, P., Kindle forensics: Acquisition and analysis. In: Proceedings of the ADFSL 2011 Conference on Digital Forensics, Security and Law (2011)Google Scholar
  15. 15.
    Iqbal, B., Iqbal, A., Guimaraes, M., Khan, K., Al Obaidli, H.: Amazon kindle fire from a digital forensics perspective. In: 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 323–329, 10–12 October 2012. doi:10.1109/CyberC.2012.61
  16. 16.
    Oxygen Forensic Suite 2012 Adds Support for Amazon Kindle Fire HD, PRweb, 23 October 2012, Cited: 1, 19, 2013. http://www.prweb.com/releases/kindle-fire-hd/forensic-tools/prweb10040657.htm50442462&pf_rd_i=B005890
  17. 17.
    qemu automated root, exploit, Cited: 14, 5, 2013. http://forum.xda-developers.com/showthread.php?t=1893838
  18. 18.
    Android Debug Bridge, Developer Android. Cited: 14, 5, 2013. http://developer.android.com/tools/help/adb.html
  19. 19.
    Sylve, J., Case, A., Marziale, L., Richard, G.G.: Acquisition and analysis of volatile memory from android devices. Digital Invest. 8(3–4), 175–184 (2012). doi:10.1016/j.diin.2011.10.003 CrossRefGoogle Scholar
  20. 20.
    Lessard, J., Kessler, G.C.: Android forensics: simplifying cell phone examinations. In: Small Scale Digital Device Forensics J. 4(1) September 2010Google Scholar

Copyright information

© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2014

Authors and Affiliations

  • Asif Iqbal
    • 1
    • 3
  • Hanan Alobaidli
    • 1
    • 2
  • Andrew Marrington
    • 3
  • Ibrahim Baggili
    • 4
  1. 1.Athena LabsDubaiUAE
  2. 2.University of SharjahSharjahUAE
  3. 3.Zayed UniversityDubaiUAE
  4. 4.University of New HavenConnecticutUSA

Personalised recommendations