Forensic analysis of Wickr application on android devices
暂无分享,去创建一个
As there are many applications that are supported by smartphones, so there is an increasing interest in finding artifacts (digital evidence) created by such applications. Wickr is a free application that allows users to send self-destructing files and messages. It came out as an iOS-only app but now it is launched in “public-beta” for android devices. As claimed by the Wickr app founders, it leaves no traces behind even for forensic investigators. This research focuses on authenticating the claims above. Experiments consisting of various test cases on rooted and non-rooted android devices were performed to investigate whether the traces are left behind or not.
[1] Gary C. Kessler,et al. Android forensics: Simplifying cell phone examinations , 2010 .
[2] Nicolas Christin,et al. Toward a general collection methodology for Android devices , 2011, Digit. Investig..
[3] Aditya Mahajan,et al. Forensic Analysis of Instant Messenger Applications on Android Devices , 2013, ArXiv.
[4] Ibrahim Baggili,et al. The forensic investigation of android private browsing sessions using orweb , 2013, 2013 5th International Conference on Computer Science and Information Technology.