Mobile technology continues to evolve in the 21st century, providing users with improved capabilities and advance functionality. The current leader of this evolution is Android, a mobile operating system that continuously elevates existing features and offers new exciting applications. Such improvements allowed Android to gain popularity worldwide. A combination of Android’s advance technology and increasing popularity allow smartphones supporting this operating system to become a rich source of trace evidence. Traces found on Android smartphones form a significant part of digital investigations, especially when the user of the smartphone is involved in criminal activities. A key component of these traces is the date and time, often formed as timestamps. These timestamps allow the examiner to relate the traces found on Android smartphones to some real event that took place. Knowing when events occurred in digital investigations is of great importance to the overall success of the investigation. This paper introduces a new solution, called the Authenticity Framework for Android Timestamps (AFAT) that establishes the authenticity of timestamps found on Android smartphones. Currently the framework determines the authenticity of timestamps found in SQLite databases by following two individual methods. The first method identifies the presence of certain changes in the Android file system, which are indications of the manipulation of the SQLite databases. The second method subsequently focuses on the individual SQLite databases and the identification of inconsistencies in these databases. The presence of specific file system changes as well as inconsistencies in the associated SQLite databases indicates that authenticity of the timestamps might be compromised. The results presented in the paper provide preliminary evidence that the suggested approach, Authenticity Framework for Android Timestamps, shows potential.
Reference:
Pieterse, H. Olivier, M. and Van Heerden, R. 2015. Playing hide-and-seek: detecting the manipulation of android timestamps. In:ISSA 2015:14th International Information Security for South Africa Conference, Rosebank, Johannesburg, South Africa, 12-13 August 2015
Pieterse, H., Olivier, M., & Van Heerden, R. P. (2015). Playing hide-and-seek: detecting the manipulation of android timestamps. IEEE. http://hdl.handle.net/10204/8722
Pieterse, Heloise, M Olivier, and Renier P Van Heerden. "Playing hide-and-seek: detecting the manipulation of android timestamps." (2015): http://hdl.handle.net/10204/8722
Pieterse H, Olivier M, Van Heerden RP, Playing hide-and-seek: detecting the manipulation of android timestamps; IEEE; 2015. http://hdl.handle.net/10204/8722 .
ISSA 2015:14th International Information Security for South Africa Conference, Rosebank, Johannesburg, South Afirica, 12-13 August 2015. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website