•  
  •  
 

Abstract

Vault Applications are used to store potentially sensitive information on a smartphone; and are available on Android and iOS. The purpose of using these applications could be used to hide potential evidence or illicit photos. After comparing five different iOS photo vaults, each vault left evidence and photos behind. However, of the three forensic toolkits used, each produced different results in their scans of the phone. The media left behind was due to the photo vaults not protecting their information as claimed, and using basic obfuscation techniques in place of security controls. Future research will look at how newer security controls are implemented, and if they are easily discoverable as well.

References

REFERENCES Abdulla Alghafli, K., Jones, A. & Martin, T. A., 2012. Forensics data acquisition methods for mobile phones. Proceedings of International Conference for Internet Technology and Secured Transactions, December.pp. 265-269. Adams, C., Whitledge, A. & Shenoi, S., 2008. Legal issues pertaining to the use of cell phone data. Advances in Digital Forensics, Volume IV, pp. 231-243. Al-Zarouni, M., 2006. Mobile Handset Forensic Evidence: a challenge for Law Enforcement. Australian Digital Forensics Conference. Awan, F. A., 2015. Forensic examination of social networking applications on smartphones. Proceedings of the 2015 Conference on Information Assurance and Cyber Security , December.Issue 36-43. Duncan, M., & Karabiyik, U., 2018. Detection and Recovery of Anti-Forensic (VAULT) Applications on Android Devices. Proceedings of the 2018 Annual ADFSL Conference on Digital Forensics, Security and Law Garfinkel, S. L., 2010. Digital forensics research: The next 10 years. Digital Investigation, Volume 7, pp. S64-S73. Hoog, A. & Strzempka, K., 2015. iPhone and iOS forensics: Investigation, analysis and mobile security for Apple iPhone, iPad and iOS devices. Husain, M. I. & Sridhar, R., 2009. iForensics: forensic analysis of instant messaging on smart phones. International Conference on Digital Forensics and Cyber Crime, September.pp. 9-18. Iqbal, B., Iqbal, A. & Al Obaidli, H., 2012. A novel method of iDevice (iPhone, iPad, iPod) forensics without jailbreaking. 2012 International Conference on Innovations in Information Technology, March.pp. 238-243. Jansen, W. & Ayers, R., 2007. Guidelines on cell phone forensics. National Institute of Science and Technology Special Publication, Volume 800, pp. 101-110. Levinson, A., Stackpole, B. & Johnson, D., 2011. Third party application forensics on apple mobile devices. 44th Hawaii International Conference on System Sciences, January.pp. 1-9. Lovejoy, B., 2017. ‘Nude’ app uses CoreML to automatically detect & protect intimate photos on an iPhone. [Online] Available at: https://www.9to5mac.com/ [Accessed March 2018]. Marturana, F., Me, G., Berte, R. & Tacconi, S., 2011. A quantitative approach to triaging in mobile forensics. Proceedings of the 2011 IEEE 10th International Conference Trust, Security and Privacy in Computing and Communications , November.pp. 582-588. Mutawa, N. A., Baggili, I. & Marrington, A., 2012. Forensic analysis of social networking applications on mobile devices. Digital Investigation, pp. S24-S33. Newton, C., 2018. Nude is a next-generation photo vault that uses AI to hide your sensitive photos. [Online] Available at: https://www.theverge.com/ Norouzizadeh Dezfouli, F., Dehghantanha, A., Eterovic-Soric, B. & Choo, K. K., 2016. Investigating Social Networking applications on smartphones detecting Facebook, Twitter, LinkedIn and Google+ artefacts on Android and iOS platforms. Australian journal of forensic sciences, 48(4), pp. 469-488. Oriwoh, E., Jazani, D., Epiphaniou, G. & Sant, P., 2013. Internet of things forensics: Challenges and approaches. Proceedings of the 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing, October.pp. 608-615. Palmer, G., 2001. A road map for digital forensic research.. Proceedings of the 2001 Digital Forensic Research Conference, August. Palmer, G. L., 2002. Forensic analysis in the digital world. International Journal of Digital Evidence, Volume 1, pp. 1-6. SANS, 2019. FOR585: Advanced smartphone forensics. [Online] Available at: https://digital-forensics.sans.org/ [Accessed 05 December 2017]. Tassone, C., Martini, B., Choo, K. K. R. & Slay, J., 2013. Mobile device forensics: A snapshot. Trends and Issues in Crime and Criminal Justice, Issue 460, pp. 1-7. Yang, T. Y., Dehghantanha, A., Choo, K. K. R. & Muda, Z., 2016. Windows instant messaging app forensics: Facebook and Skype as case studies. PloS one, 11(3). Zdziarski, J. A., 2008. iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets. Zhang, X., Baggili, I. & Breitinger, F., 2017. Breaking into the vault: Privacy, securiy and forensic analysis of Android vault applications. Computers & Security, Volume 70, pp. 516-531.

DOI

https://doi.org/10.15394/jdfsl.2022.1773

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.