The disclosure of an Android smartphone’s digital footprint respecting the Instant Messaging utilizing Skype and MSN

As Android Operating System (OS) for mobile computing devices become one of the major trends, the utilization of smartphones set the record for global users and they are taking advantages of the contemporary Instant Messaging (IM) as a convenient tool to communicate with global users in real time because of its competitive rate, high availability, robust reliability, and agile mobility. Undoubtedly, as IM has gradually become one of the channels to commit the cybercrime, the digital evidence collection, analysis, and preservation of the non-volatile data from the Random Access Memory (RAM) of the computing device in terms of cyber trails that were unknowingly left on the crime scene. Hence, this research conducts the design of the experiments to fulfill the essence of contribution of the paper. The SkypeChat and MSN are the popular IM tools, which are widely utilized in contemporary digital era. This paper provides a generic paradigm for the digital forensics specialists and law enforcement agencies to ponder if similar situations are faced.

[1]  Vrizlynn L. L. Thing,et al.  Live memory forensics of mobile phones , 2010, Digit. Investig..

[2]  Yuval Elovici,et al.  Google Android: A Comprehensive Security Assessment , 2010, IEEE Security & Privacy.

[3]  Maro Vlachopoulou,et al.  Modeling users’ acceptance of mobile services , 2012, Electronic Commerce Research.

[4]  Farkhund Iqbal,et al.  Speaker verification from partially encrypted compressed speech for forensic investigation , 2010, Digit. Investig..

[5]  Andrew Hoog Android and mobile forensics , 2011 .

[6]  Herbert Bos,et al.  Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.

[7]  Mauro Conti,et al.  Mind how you answer me!: transparently authenticating the user of a smartphone when answering or placing a call , 2011, ASIACCS '11.

[8]  Simin Nadjm-Tehrani,et al.  Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.

[9]  Gary C. Kessler,et al.  Android forensics: Simplifying cell phone examinations , 2010 .

[10]  Gianluigi Me,et al.  Android anti-forensics through a local paradigm , 2010, Digit. Investig..

[11]  Christoph Busch,et al.  Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[12]  Heinrich Hußmann,et al.  Touch me once and i know it's you!: implicit authentication based on touch screen patterns , 2012, CHI.

[13]  Muddassar Farooq,et al.  Keystroke-Based User Identification on Smart Phones , 2009, RAID.

[14]  Fu-Shing Sun,et al.  GeoTools: An android phone application in geology , 2012, Comput. Geosci..

[15]  Yi Ren,et al.  A privacy policy conflict detection method for multi-owner privacy data protection , 2011, Electron. Commer. Res..

[16]  Sebastian Möller,et al.  On the need for different security methods on mobile phones , 2011, Mobile HCI.

[17]  Juha-Miikka Nurmilaakso,et al.  ICT solutions and labor productivity: evidence from firm-level data , 2009, Electron. Commer. Res..

[18]  Herbert Bos,et al.  Paranoid Android : Zero-Day Protection for Smartphones Using the Cloud , 2010 .

[19]  Andrew Hoog Android forensics : investigation, analysis, and mobile security for Google Android / Andrew Hoog ; John McCash, technical editor. , 2011 .

[20]  Nir Kshetri,et al.  Cybercrime and cyber-security issues associated with China: some economic and institutional considerations , 2013, Electron. Commer. Res..

[21]  Adam J. Aviv,et al.  Smudge Attacks on Smartphone Touch Screens , 2010, WOOT.