We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Call for Paper
December Edition
IJCA solicits high quality original research papers for the upcoming December edition of the journal. The last date of research paper submission is 20 November 2024

Submit your paper
Know more
Reseach Article

Skype Forensics in Android Devices

by Mohammed I. Al-saleh, Yahya A. Forihat
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 78 - Number 7
Year of Publication: 2013
Authors: Mohammed I. Al-saleh, Yahya A. Forihat
10.5120/13504-1253

Mohammed I. Al-saleh, Yahya A. Forihat . Skype Forensics in Android Devices. International Journal of Computer Applications. 78, 7 ( September 2013), 38-44. DOI=10.5120/13504-1253

@article{ 10.5120/13504-1253,
author = { Mohammed I. Al-saleh, Yahya A. Forihat },
title = { Skype Forensics in Android Devices },
journal = { International Journal of Computer Applications },
issue_date = { September 2013 },
volume = { 78 },
number = { 7 },
month = { September },
year = { 2013 },
issn = { 0975-8887 },
pages = { 38-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume78/number7/13504-1253/ },
doi = { 10.5120/13504-1253 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:51:01.350153+05:30
%A Mohammed I. Al-saleh
%A Yahya A. Forihat
%T Skype Forensics in Android Devices
%J International Journal of Computer Applications
%@ 0975-8887
%V 78
%N 7
%P 38-44
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The discipline of smartphone forensics has recently got more at- tention because of the tremendous growth in the smartphones market. Smartphones, to some extent, have similar capabilities to that of PCs. They can store large amount of data and diver- gent categories of information. Among other mobile platforms, Android-based devices are getting more popularity. Variety of mo- bile Applications (Apps) are increasingly developed to mainly extend the functionally of the phones. The usage of Voice over IP (VoIP) Apps has explosively increased for their wide avail- ability and cheap prices. As Skype is one of the most popular VoIP Apps, in this paper we investigate the artifacts of Skype calls and chats in the Android devices. We inspect both the RAM and NAND flash memories in different scenarios and time dura- tions. Even though Skype provides secure communications over the Internet, this paper shows that Skype call and chat evidences can be truly found in the devices. To the best of our knowl- edge, we are the first to investigate Skype in the Android devices.

References
  1. Mohammed I. Al-Saleh and Ziad A. Al-Sharif. Utilizing data lifetime of tcp buffers in digital forensics: Empirical study. Digital Investigation, 9(2):119 – 124, 2012.
  2. Pete Broadwell, Matt Harren, and Naveen Sastry. Scrash: a system for generating secure crash information. In Proceed- ings of the 12th conference on USENIX Security Symposium- Volume 12, SSYM'03, pages 19–19, Berkeley, CA, USA, 2003. USENIX Association.
  3. Jim Chow, Ben Pfaff, Tal Garfinkel, Kevin Christopher, and Mendel Rosenblum. Understanding data lifetime via whole system simulation. In Proc. 13th USENIX Security Sympo- sium, August 2004.
  4. Jim Chow, Ben Pfaff, Tal Garfinkel, and Mendel Rosenblum. Shredding your garbage: reducing data lifetime through se- cure deallocation. In Proceedings of the 14th conference on USENIX Security Symposium - Volume 14, SSYM'05, pages 22–22, Berkeley, CA, USA, 2005. USENIX Association.
  5. Dawson Engler, David Yu Chen, Seth Hallem, Andy Chou, and Benjamin Chelf. Bugs as deviant behavior: a general ap- proach to inferring errors in systems code. In Proceedings of the eighteenth ACM symposium on Operating systems prin- ciples, SOSP '01, pages 57–72, New York, NY, USA, 2001. ACM.
  6. Tal Garfinkel, Ben Pfaff, Jim Chow, and Mendel Rosenblum. Data lifetime is a systems problem. In Proceedings of the 11th workshop on ACM SIGOPS European workshop, EW 11, New York, NY, USA, 2004. ACM.
  7. Andrew Hoog. Android Forensics: Investigation, Analysis and Mobile Security for Google Android. Syngress Publish- ing, 1st edition, 2011.
  8. Hajime Inoue, Frank Adelstein, and Robert A Joyce. Visu- alization in testing a volatile memory forensic tool. Digital Investigation, 8(Supplement):S42–S51, 2011.
  9. M. Jahanirad, A. L. N. Yahya, and R. M. Noor. Security mea- sures for VoIP application: A state of the art review. Scientific Research and Essays, 6(23):4950–4959, 2011.
  10. Sebastian Schrittwieser, Peter Fru¨ hwirt, Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Markus Huber, and Edgar Weippl. Guess Who's Texting You? Evaluating the Se- curity of Smartphone Messaging Applications. In Proceed- ings of the 19th Annual Network & Distributed System Secu- rity Symposium, February 2012.
  11. Andreas Schuster. The impact of microsoft windows pool al- location strategies on memory forensics. Digital Investiga- tion, 5, Supplement(0):S58 – S64, 2008. The Proceedings of the Eighth Annual DFRWS Conference.
  12. Matthew Simon and Jill Slay. Recovery of skype application activity data from physical memory. In ARES, pages 283–288, 2010.
  13. Jill Slay and Matthew Simon. Voice over ip forensics. In Proceedings of the 1st international conference on Foren- sic applications and techniques in telecommunications, in- formation, and multimedia and workshop, e-Forensics '08, pages 10:1–10:6, ICST, Brussels, Belgium, Belgium, 2008. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering).
  14. Jason Solomon, Ewa Huebner, Derek Bem, and Magdalena Sze?ynska. User data persistence in physical memory. Digital Investigation, 4(2):68 – 72, 2007.
  15. Joe Sylve, Andrew Case, Lodovico Marziale, and Golden G. Richard III. Acquisition and analysis of volatile memory from android devices. Digital Investigation, 8(3-4):175–184, 2012.
  16. Vrizlynn L. L. Thing, Kian-Yong Ng, and Ee-Chien Chang. Live memory forensics of mobile phones. Digital Investiga- tion, 7, Supplement(0):S74 – S82, 2010. The Proceedings of the Tenth Annual DFRWS Conference.
  17. Timothy Vidas, Chengye Zhang, and Nicolas Christin. To- ward a general collection methodology for android devices. Digit. Investig. , 8:S14–S24, August 2011.
  18. Aaron Walters and Nick L Petroni. Volatools : Integrating volatile memory forensics into the digital investigation pro- cess. Digital Investigation, pages 1–18, 2007.
  19. Svein Yngvar Willassen. Forensic analysis of mobile phone internal memory. In Mark Pollitt and Sujeet Shenoi, editors, IFIP Int. Conf. Digital Forensics, pages 191–204. Springer, 2005.
  20. Maynard Yates, II. Practical investigations of digital foren- sics tools for mobile devices. In 2010 Information Security Curriculum Development Conference, InfoSecCD '10, pages 156–162, New York, NY, USA, 2010. ACM.
  21. Amjad Zareen and Shamim Baig. Mobile phone forensics: Challenges, analysis and tools classification. In Proceedings of the 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE '10, pages 47–55, Washington, DC, USA, 2010. IEEE Computer Society.
Index Terms

Computer Science
Information Sciences

Keywords

Skype Android RAM Artifacts NAND Artifacts Digital Evi- dence.