Paper 24 A Study of Mobile Forensic Tools
Paper 24 A Study of Mobile Forensic Tools
net/publication/328650918
CITATIONS READS
7 1,324
3 authors:
Ammar Fauzan
Universitas Nahdatul Ulama Sumatera Utara
3 PUBLICATIONS 20 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
DDoS Attacks Classification Using Numeric Attribute-Based Gaussian Naive Bayes View project
All content following this page was uploaded by Ammar Fauzan on 02 November 2018.
Abstract—The limitation of forensic tool and the mobile National Institute of Standard Technology (NIST)
device’s operating system are two problems for researchers in considers that forensic tools might have a degree of error and
mobile forensics field. Nevertheless, some kinds of forensic tools need to be evaluated by the test against different mobile
testing in several devices might be helpful in an investigation. devices [4]. Experiments conducted with mobile device
Therefore, the evaluation of forensic tool is one gate to reach the forensic tools can indicate the capability of the tools. The
goal of a digital forensics study. Mobile forensics as one of the forensic tools should produce valid results based on the fact in
digital forensics branch that focusing on data recovery process terms of data objects that are acceptable in the court.
on mobile devices has some problems in the analytical ability
because of the different features of forensic tools. In this II. LITERATURE REVIEW
research, the researchers present studies and techniques on tools
ability and evaluated them based on digital evidence of LINE A. Related Work
analysis. The experiment was combined VV methods and NIST In [5] the researchers conducted a comparative evaluation
standard forensic methods to produce a model of forensic tool of forensic tools for WhatsApp analysis on Android-based
evaluation steps. As the result of the experiment, Oxygen smartphones. The author choose WhatsApp because of its
Forensic has 61.90% of index number and MOBILedit Forensic
easiness for expanding the user base. When installing it, one
has the highest index number at 76.19% in messenger application
can virtually reach all contacts in his/her address book on the
analysis. This research has successfully assessed the performance
of forensic tools.
phone who have installed the same apps [6]. The researcher
evaluating performance and ability of some forensic tools, i.e.
Keywords—Forensic; investigation; mobile; evaluation; WhatsApp DB/Key Extractor, Belkasoft Evidence, and
performance Oxygen Forensic. The evaluation using the NIST forensic tool
parameter and additional parameters from the researcher. The
I. INTRODUCTION author did at least four steps to conduct this evaluation, i.e
Cybercrime is escalating and the race against simulation, forensic analysis, analysis result, and conclusion.
cybercriminals is never ending since the internet established. In [7] the authors want to emphasize on the forensic
The huge number of mobile phone users nowadays add the investigation process and to compare mobile forensic tools
new problem of this issue. As a result of this many users, in used in this research by using a framework developed by
addition to the traditional usage of mobile phones including National Institute of Standard and Technology (NIST). The
making phone calls and texting in SMS, now mobile phones authors used four forensic tools to examine one Android
are also used for making video calls and chatting in the instant device. The performance of forensic tools was rated
messenger. quantitatively. There is no strong reason in this work and the
The development of Android smartphone technology has previous reference why the forensic process has to use NIST
an impact on the fast-growing number of applications method or the specific tools.
developed for Android. Even though, cybercrime can happen According to [8] the researchers suggest the decision
in Android smartphone. The investigator has to be able to method theories trough performance and relevance parameter
solve the crime case with a mobile forensic method to find a while doing a hypothesis testing on forensic method and tools
digital evidence. Digital evidence is fragile, volatile and selection. This paper is inspired by the freedom of choice
vulnerable if it is not handled properly [1], especially in the necessitates theory. The freedom choice theory is a sense of
mobile device. Mobile forensic is a science field that studies responsibility that asks for separation between true and false.
the process of digital evidence recovery using the appropriate Sometimes the selecting process for choosing the right
way from a mobile device [2] which usually doing in a digital forensics tool is complex with major consequences. The
forensic investigation by the police. Digital forensic author suggest the project to evaluate the performance of more
investigation is the phenomenon that solves the digitally tools against a broader set of mobile devices will help in the
committed crime and explores the culprit legally [3]. It is selection of the most appropriate forensics tool. In the
important for examiners and investigators to have the previous work, the National Institute for Standards and
knowledge about mobile forensic methods and the tools.
201 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 9, No. 10, 2018
Technology (NIST) conducted an evaluation of the forensics Experiment in the past concentrated on the trustworthiness of
tools as an independent third party. digital evidence that is the product of the process and not the
validity of the tools. Recently, there is an attempt to formalize
In reference [9] the researcher doing "Validation the theory of digital forensics and dissertation about definitive
approach" since the tools were of propitiatory nature and there research that focuses on the model the process has already
was no access to their documentation and source code. This started to appear. There is also research on validation of the
paper presents the findings with respect to the reliability of the investigation results forensic (that is the reliability of the
tools only. The authors evaluate XRY and UFED forensic tool evidence), only a few on the reliability of tools that produces
in the light of NIST Smartphone Tool Specification which the evidence. The researcher have to consider that when the
consists of a number of specifications with their associated examiner/investigator want to conduct an analysis, they need
Test Assertions and Conformance Indicators. to use a method along with forensically tested tools [15]. Each
Performance can be measured from historical data or from tools can be validated and verified on its merits and the
the results of carefully designed experiments. Historical data examiner can focus on the results required rather than the
included performance evaluation results by both the vendors domain of all possible functions and all possible
and a trusted third party. The problems, however, were that: specifications.
(i) vendor evaluation lacked trust and (ii) trusted third party's
C. Mobile Device Forensic Tools Evaluation
evaluation used different mobile devices to evaluate the
forensic tools. The tools were not evaluated on equal grounds Mobile device forensic tools evaluation is consist of the
and thus the results cannot be generalized for comparing their validation and verification process. Validation is the
performance. confirmation by examination and the provision of objective
evidence that a tool, technique or procedure functions
Every digital forensic method has different stages in each correctly and as intended, while verification is the
handling of the digital evidence found, so in the handling of confirmation of a validation with laboratories tools,
various evidence, it requires different digital forensic models techniques, and procedures [14]. It is important for a forensic
[10]. In many references, digital forensics process at least can examiner to know how reliable and accurate a tool is before
be divided into four steps as in Fig. 1, collection, preservation, being used. The researcher have used the evaluation to gauge
analysis, and presentation [11]. The naming four stage of and verify the reliability and accuracy of two most prominent
digital forensic model is very flexible to be changed as needed mobile forensic tools such as MOBILedit Forensic and
for investigation. Sometimes at the end of the process called Oxygen Forensics based on the Smart Phone Tools
"reporting" instead of presentation and at the beginning begins Specifications by NIST [16]. The parameters for tool
with the identification process before collection/preservation. evaluation are depend on the needs of researchers, but they are
not far from the issue background.
III. RESEARCH METHODOLOGY
A. Evaluation Method
This article is inspired by many previous works of forensic
tool evaluation, one of them is validation verification (VV)
methodology that was proposed by Guo, Slay, and Beckett
Fig. 1. Digital Forensic Process. [17]. The first step in evaluation is listing the forensic tools
function. From the documentation of both tools; Oxygen
Having knowledge of the digital forensic process is Forensic and MOBILedit Forensic, their function as seen as in
important, same as forensic tools that have a vital role in the Table 1.
whole forensic process. Examiners must understand the
capabilities of a forensic tool with insights from good TABLE I. FORENSIC TOOLS FUNCTIONS
references of tool testing. But, most of the mobile forensic tool
testing and evaluations are done by the vendors. Mobile Oxygen Forensic MOBILedit Forensic
forensic tools developed in the forensic world are rarely
validated independently and scientifically. Moreover, forensic Device Identification Device identification
tools are used almost in all the stage of mobile forensics
Application data extraction for
process. Data Extraction
Android and iOS
B. Digital Forensics Problem
Messenger Application Analysis Application Analysis
There are many proprietary forensic tools have been
developed. As a result, a wide variety of tools exist to extract Data Report Data Report
evidence from mobile devices, no one tool or method can
acquire all the evidence from all devices [12]. The software Case Management -
applications for mobile forensics available today are not 100%
forensically sound [13]. The complexity formally representing - Deleted data retrieval
all the science need to start with a literature and discussions
with industry leaders from diverse backgrounds [14].
202 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 9, No. 10, 2018
203 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 9, No. 10, 2018
The evaluation methodology can be modified according to Both devices are quite good in the device identification
the needs and the expected results. The method above is one function. Although Oxygen forensics has its lack, at least it
method that can be applied in evaluation tool research. can recognize the device's manufacturer name. These results
may be different on the other devices.
IV. RESULT AND ANALYSIS
B. Data Extraction
The evaluation is ended with the documentation process.
This documentation can be either a report or a presentation file Data extraction on both devices is desirable, as this is
to show to the examiner and investigator. The results of the much needed in a long-period investigation. Data extraction
evaluation process that is conducted by applying VV methods on Oxygen Forensics is quite successful because it is able to
are as follows: create backup files from data acquisition devices, as shown in
Fig. 6.
A. Device Identification
While in MOBILedit, as seen in Fig. 7, data extraction to
The device identification is the first step that must be done generate backup data is not as good as expected, because the
by any forensic tool. The collection of information about the data extraction data that we get was corupted and error.
device is very useful in the report on the final process. Oxygen
forensic is able to identify the device that the researcher use, Both forensic tools have different ways of extracting data.
Sony C6602 or known as Sony Xperia Z, as can be seen in MOBILedit is not success in performing its functions.
Fig. 4. But, Oxygen forensics is not able to recognize the However, Oxygen can be used in investigations over a long
IMEI number or the serial number of this device. period of time, so the examiner can analyze the digital
evidence more deeply. The difference of the forensic tools
While in MOBILedit forensic the device identification result can be aspect that can be considered by the examiner.
result is as expected. Metadata from the device like serial
number, IMEI, IMSI, ICCID, Root status. All of the important
metadata can be revealed and documented as in Fig. 5.
MOBILedit forensic is quite successful in identification
mobiledit mobile device.
204 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 9, No. 10, 2018
205 | P a g e
www.ijacsa.thesai.org
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 9, No. 10, 2018
[8] S. Saleem, O. Popov, and I. Baggili, “A method and a case study for the [13] K. Curran, A. Robinson, S. Peacocke, and S. Cassidy, “Mobile Phone
selection of the best available tool for mobile device forensics using Forensic Analysis,” Int. J. Digit. Crime Forensics, vol. 2, no. 2, pp.
decision analysis,” Digit. Investig., 2016. 1941–6210, 2010.
[9] A. K. Kubi, S. Saleem, and O. Popov, “Evaluation of some tools for [14] J. Beckett and J. Slay, “Digital forensics: Validation and verification in a
extracting e-evidence from mobile devices,” 2011 5th Int. Conf. Appl. dynamic work environment,” Proc. Annu. Hawaii Int. Conf. Syst. Sci.,
Inf. Commun. Technol. AICT 2011, no. 10, 2011. no. February 2014, 2007.
[10] R. Ruuhwan, I. Riadi, and Y. Prayudi, “Evaluation of integrated digital [15] R. Umar, I. Riadi, and G. M. Zamroni, “Mobile Forensic Tools
forensics investigation framework for the investigation of smartphones Evaluation for Digital Crime Investigation,” Int. J. Adv. Sci. Eng. Inf.
using soft system methodology,” Int. J. Electr. Comput. Eng., 2017. Technol., vol. 8, no. June, pp. 949–955, 2018.
[11] N. Widiyasono, I. Riadi, and A. Luthfi, “Investigation on the services of [16] National Institute of Standards and Technology, “Mobile Device Tool
private cloud computing by using ADAM Method,” Int. J. Electr. Specification Version 2.0,” 2016.
Comput. Eng., vol. 6, no. 5, pp. 2387–2395, 2016. [17] Y. Guo, J. Slay, and J. Beckett, “Validation and verification of computer
[12] E. Benkhelifa, B. E. Thomas, L. Tawalbeh, and Y. Jararweh, forensic software tools-Searching Function,” Digit. Investig., vol. 6, no.
“Framework for Mobile Devices Analysis,” Procedia Comput. Sci., vol. SUPPL., 2009.
83, pp. 1188–1193, 2016.
206 | P a g e
www.ijacsa.thesai.org
View publication stats