ResearchSpace

Playing hide-and-seek: detecting the manipulation of android timestamps

Show simple item record

dc.contributor.author Pieterse, Heloise
dc.contributor.author Olivier, M
dc.contributor.author Van Heerden, Renier P
dc.date.accessioned 2016-08-22T11:30:02Z
dc.date.available 2016-08-22T11:30:02Z
dc.date.issued 2015-08
dc.identifier.citation Pieterse, H. Olivier, M. and Van Heerden, R. 2015. Playing hide-and-seek: detecting the manipulation of android timestamps. In:ISSA 2015:14th International Information Security for South Africa Conference, Rosebank, Johannesburg, South Africa, 12-13 August 2015 en_US
dc.identifier.isbn 978-1-4799-7754-3
dc.identifier.isbn 978-1-4799-7755-0
dc.identifier.uri 10.1109/ISSA.2015.7335065
dc.identifier.uri http://hdl.handle.net/10204/8722
dc.identifier.uri https://ieeexplore.ieee.org/abstract/document/7335065/
dc.identifier.uri https://doi.org/10.1109/ISSA.2015.7335065
dc.description ISSA 2015:14th International Information Security for South Africa Conference, Rosebank, Johannesburg, South Afirica, 12-13 August 2015. Due to copyright restrictions, the attached PDF file only contains the abstract of the full text item. For access to the full text item, please consult the publisher's website en_US
dc.description.abstract Mobile technology continues to evolve in the 21st century, providing users with improved capabilities and advance functionality. The current leader of this evolution is Android, a mobile operating system that continuously elevates existing features and offers new exciting applications. Such improvements allowed Android to gain popularity worldwide. A combination of Android’s advance technology and increasing popularity allow smartphones supporting this operating system to become a rich source of trace evidence. Traces found on Android smartphones form a significant part of digital investigations, especially when the user of the smartphone is involved in criminal activities. A key component of these traces is the date and time, often formed as timestamps. These timestamps allow the examiner to relate the traces found on Android smartphones to some real event that took place. Knowing when events occurred in digital investigations is of great importance to the overall success of the investigation. This paper introduces a new solution, called the Authenticity Framework for Android Timestamps (AFAT) that establishes the authenticity of timestamps found on Android smartphones. Currently the framework determines the authenticity of timestamps found in SQLite databases by following two individual methods. The first method identifies the presence of certain changes in the Android file system, which are indications of the manipulation of the SQLite databases. The second method subsequently focuses on the individual SQLite databases and the identification of inconsistencies in these databases. The presence of specific file system changes as well as inconsistencies in the associated SQLite databases indicates that authenticity of the timestamps might be compromised. The results presented in the paper provide preliminary evidence that the suggested approach, Authenticity Framework for Android Timestamps, shows potential. en_US
dc.language.iso en en_US
dc.publisher IEEE en_US
dc.relation.ispartofseries Workflow;15823
dc.subject Digital Forensics en_US
dc.subject Mobile Forensics en_US
dc.subject Smartphones en_US
dc.subject Android en_US
dc.subject Authenticity Framework for Android Timestamps en_US
dc.subject AFAT en_US
dc.title Playing hide-and-seek: detecting the manipulation of android timestamps en_US
dc.type Conference Presentation en_US
dc.identifier.apacitation Pieterse, H., Olivier, M., & Van Heerden, R. P. (2015). Playing hide-and-seek: detecting the manipulation of android timestamps. IEEE. http://hdl.handle.net/10204/8722 en_ZA
dc.identifier.chicagocitation Pieterse, Heloise, M Olivier, and Renier P Van Heerden. "Playing hide-and-seek: detecting the manipulation of android timestamps." (2015): http://hdl.handle.net/10204/8722 en_ZA
dc.identifier.vancouvercitation Pieterse H, Olivier M, Van Heerden RP, Playing hide-and-seek: detecting the manipulation of android timestamps; IEEE; 2015. http://hdl.handle.net/10204/8722 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Pieterse, Heloise AU - Olivier, M AU - Van Heerden, Renier P AB - Mobile technology continues to evolve in the 21st century, providing users with improved capabilities and advance functionality. The current leader of this evolution is Android, a mobile operating system that continuously elevates existing features and offers new exciting applications. Such improvements allowed Android to gain popularity worldwide. A combination of Android’s advance technology and increasing popularity allow smartphones supporting this operating system to become a rich source of trace evidence. Traces found on Android smartphones form a significant part of digital investigations, especially when the user of the smartphone is involved in criminal activities. A key component of these traces is the date and time, often formed as timestamps. These timestamps allow the examiner to relate the traces found on Android smartphones to some real event that took place. Knowing when events occurred in digital investigations is of great importance to the overall success of the investigation. This paper introduces a new solution, called the Authenticity Framework for Android Timestamps (AFAT) that establishes the authenticity of timestamps found on Android smartphones. Currently the framework determines the authenticity of timestamps found in SQLite databases by following two individual methods. The first method identifies the presence of certain changes in the Android file system, which are indications of the manipulation of the SQLite databases. The second method subsequently focuses on the individual SQLite databases and the identification of inconsistencies in these databases. The presence of specific file system changes as well as inconsistencies in the associated SQLite databases indicates that authenticity of the timestamps might be compromised. The results presented in the paper provide preliminary evidence that the suggested approach, Authenticity Framework for Android Timestamps, shows potential. DA - 2015-08 DB - ResearchSpace DP - CSIR KW - Digital Forensics KW - Mobile Forensics KW - Smartphones KW - Android KW - Authenticity Framework for Android Timestamps KW - AFAT LK - https://researchspace.csir.co.za PY - 2015 SM - 978-1-4799-7754-3 SM - 978-1-4799-7755-0 T1 - Playing hide-and-seek: detecting the manipulation of android timestamps TI - Playing hide-and-seek: detecting the manipulation of android timestamps UR - http://hdl.handle.net/10204/8722 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record