Towards a Forensic Analysis of Mobile Devices Using Android

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 721)

Abstract

The high utilization rate of mobile devices highlights the problem of vulnerability. As a result, new cybercrime techniques are created, in response to which new forensic techniques must be created, so we can deduct the importance of this paper. For some years now, there has been a significant growth in the use of mobile devices in daily life, since they allow to carry personal data in a practical, easy and comfortable way. These data are, in many cases, the target of malicious people, who, taking advantage of the vulnerabilities that these devices present, are capable of illegal actions, usually for unlawful purposes. The current research proposes, using a comparative method to allow us to formulate a forensic analysis to mobile devices with Android operating system; based on the chain of custody guidelines, compliance stages, and phases and to detect findings, nonconformities, locate vulnerabilities. Based on this process we can determine the origin of the leading causes of different types of events or crimes committed from a mobile device. Additionally, using a decision matrix, the best software for performing the forensic analysis is chosen and using Balanced Scorecard, indicators are evaluated.

Keywords

Forensic analysis Android Chain of custody Balanced scorecard Mobile forensics methodologies 

References

  1. 1.
    Yıldırım, N., Varol, A.: Android based mobile application development for web login authentication using fingerprint recognition feature. In: 2015 23th Signal Processing and Communications Applications Conference (SIU).  https://doi.org/10.1109/siu.2015.7130436
  2. 2.
    Venkateswara Rao, V., Chakravarthy, A.S.N.: Forensic analysis of Android mobile devices. In: 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE), 23–25 December 2016.  https://doi.org/10.1109/icraie.2016.7939540
  3. 3.
    Roger, M., Seigfried, K.: The future of computer forensics: a needs analysis survey. Cent. Educ. Res. Inf. Assur. Secur. 23(1), 12–16 (2004)Google Scholar
  4. 4.
    Höbarth, S.: A framework for on-device privilege escalation exploit. In: de IWSSI2011, San Francisco (2011). https://www.wibas.com/cmmi/decision-analysis-and-resolution-dar-cmmi-dev
  5. 5.
    El Confidencial: https://goo.gl/WjSVoF. Accessed 17 Mar 2017
  6. 6.
    Ting, W.: Applying the balanced score card in the team strategic performance management. In: 2011 2nd International Conference on Artificial Intelligence, Management Science and Electronic Commerce (AIMSEC), 8–10 August 2011.  https://doi.org/10.1109/aimsec.2011.6010534
  7. 7.
    OWASP: https://goo.gl/OS4fdM. Accessed 01 Feb 2017
  8. 8.
    Zander, T.: https://www.tobiaszander.de/. Accessed 08 Aug 2017
  9. 9.
    Vidas, et al.: Toward a general collection methodology for Android devices. In: The Proceedings of the Eleventh Annual DFRWS Conference, vol. 8, pp. S14–S24, Carnegie Mellon ECE/CyLab, USAGoogle Scholar
  10. 10.
    Stiparo, P., Kounelis, I.: The mobileak project: forensics methodology for mobile application privacy assessment. In: International Conference for Internet Technology and Secured Transactions. IEEEGoogle Scholar
  11. 11.
    Gómez, E, Herrera, N, Moscoso O, Guaman, P.: Propuesta de Análisis Forense para Dispostivos Móviles con Sistema Operativo Android. https://goo.gl/MSQ1Ua
  12. 12.
    NIST: National Institute of Standards and Technology, 3 April 2014. http://www.nist.gov/. Accessed 6 Apr 2014
  13. 13.
    The Process Group: Decision Analysis & Resolution, 18 February 2014. http://www.processgroup.com/
  14. 14.
    Santoku: Santoku. Obtenido de, 17 de 03 de 2017. https://santoku-linux.com/
  15. 15.
    Oxigen Forensic: Oxigen Forensic Suite. http://www.oxygen-forensic.com/es/
  16. 16.
  17. 17.
  18. 18.
    Li, B., Wang, Y.: Study on the enterprise strategic budget management mode based on balance scored card. In: 2010 International Conference on E-Business and E-Government (ICEE), 7–9 May 2010.  https://doi.org/10.1109/icee.2010.707

Copyright information

© Springer International Publishing AG 2018

Authors and Affiliations

  1. 1.Carrera de Ingeniería en Informática, Universidad Tecnológica EquinoccialQuitoEcuador
  2. 2.Universidad de AlicanteAlicanteSpain

Personalised recommendations