Skip to main content

Amazon Kindle Fire HD Forensics

Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST,volume 132)

Abstract

This research presents two developed approaches for the forensic acquisition of an Amazon Kindle Fire HD. It describes the forensic acquisition and analysis of the Amazon Kindle Fire HD device. Two developed methods of acquisition are presented; one requiring a special cable to reflash the boot partition of the device with a forensic acquisition environment (Method A), and the other exploiting a vulnerability in the device’s Android operating system (Method B). A case study is then presented showing the various digital evidence that can be extracted from the device. The results indicate that Method A is more favorable because it utilizes a general methodology that does not exploit a vulnerability that could potentially be patched by Amazon in future software updates.

Keywords

  • Amazon Kindle Fire HD
  • Digital
  • Forensics
  • Analysis
  • Acquisition
  • Android forensics
  • Forensic flashing

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Marturana, F., Me, G., Berte, R., Tacconi, S.: A quantitative approach to triaging in mobile forensics. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 582–588, 16–18 November 2011

    Google Scholar 

  2. Mobile Security And Forensics. NIST, 23 February 2009, Cited: 1, 19, 2013. http://csrc.nist.gov/groups/SNS/mobile_security/index.html

  3. Zdziarski, J.: iPhone Forensics: Recovering Evidence. Personal Data and Corporate Assets, s.l. O’Reilly (2008)

    Google Scholar 

  4. Bader, M., Baggili, I.: iPhone 3GS forensics: Logical analysis using apple iTunes backup utility. Small Scale Digital Device Forensics J. 4(1) (2010)

    Google Scholar 

  5. Husain, M.I., Baggili, I., Sridhar, R.: A Simple Cost-Effective Framework for iPhone Forensic Analysis. In: Baggili, I. (ed.) ICDF2C 2010. LNICST, vol. 53, pp. 27–37. Springer, Heidelberg (2011)

    CrossRef  Google Scholar 

  6. Iqbal, B., Iqbal, A., Al Obaidli, H.: A novel method of iDevice(iPhone,iPad,iPod) forensics without jailbreaking. In: International Conference on Innovations in Information Technology (IIT), pp. 238–243, Abu Dhabi, Al Ain. IEEE (2012). doi:10.1109/INNOVATIONS.2012.6207740

  7. Hoog, A.: Android forensics: investigation, analysis and mobile security for Google Android. Syngress (2011)

    Google Scholar 

  8. Vidas, T., Zhang, C., Christin, N.: Toward a general collection methodology for Android devices. Digital Invest. 8, S14–S24 (2011). doi:10.1016/j.diin.2011.05.003

    CrossRef  Google Scholar 

  9. Allyn S.: Amazon kindle forensics. A Safe Blog, 9 June 2011, Cited: 1, 19, 2013. www.blog.asafewebsite.com/2011/06/amazon-kindle-forensics.html

  10. Thompson, M.: Introduction to kindle forensics. Practical Digital Forensics. 5 September 2011, Cited: 1, 19, 2013. http://practicaldigitalforensics.blogspot.com/2011/09/introduction-to-kindle-forensics.html

  11. Eric H.: A cursory look at kindle forensics. In: A Fistful of Dongles. 13 April 2010, Cited: 1, 19, 2013. www.ericjhuber.com/2010/04/cursory-look-at-kindle-forensics.html

  12. Kindle 3G Wireless Reading Device - forensically speaking. Computer Forensics and IR - what’s new? 3 October 2010, Cited: 1, 19, 2013. newinforensics.blogspot.com/2010/10/kindle-3g-wireless-reading-device.html

  13. Forensic Imaging of the Amazon Kindle. MacForensicsLab, Cited: 1, 19, 2013. http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=document_general_info&cPath=5_18&products_id=338&zeni%ED%AF%80%ED%B2%AB

  14. Hannay, P., Kindle forensics: Acquisition and analysis. In: Proceedings of the ADFSL 2011 Conference on Digital Forensics, Security and Law (2011)

    Google Scholar 

  15. Iqbal, B., Iqbal, A., Guimaraes, M., Khan, K., Al Obaidli, H.: Amazon kindle fire from a digital forensics perspective. In: 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 323–329, 10–12 October 2012. doi:10.1109/CyberC.2012.61

  16. Oxygen Forensic Suite 2012 Adds Support for Amazon Kindle Fire HD, PRweb, 23 October 2012, Cited: 1, 19, 2013. http://www.prweb.com/releases/kindle-fire-hd/forensic-tools/prweb10040657.htm50442462&pf_rd_i=B005890

  17. qemu automated root, exploit, Cited: 14, 5, 2013. http://forum.xda-developers.com/showthread.php?t=1893838

  18. Android Debug Bridge, Developer Android. Cited: 14, 5, 2013. http://developer.android.com/tools/help/adb.html

  19. Sylve, J., Case, A., Marziale, L., Richard, G.G.: Acquisition and analysis of volatile memory from android devices. Digital Invest. 8(3–4), 175–184 (2012). doi:10.1016/j.diin.2011.10.003

    CrossRef  Google Scholar 

  20. Lessard, J., Kessler, G.C.: Android forensics: simplifying cell phone examinations. In: Small Scale Digital Device Forensics J. 4(1) September 2010

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Asif Iqbal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Iqbal, A., Alobaidli, H., Marrington, A., Baggili, I. (2014). Amazon Kindle Fire HD Forensics. In: Gladyshev, P., Marrington, A., Baggili, I. (eds) Digital Forensics and Cyber Crime. ICDF2C 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 132. Springer, Cham. https://doi.org/10.1007/978-3-319-14289-0_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14289-0_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14288-3

  • Online ISBN: 978-3-319-14289-0

  • eBook Packages: Computer ScienceComputer Science (R0)