Remember Me
Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:

OpenAIRE is about to release its new face with lots of new content and services.
During September, you may notice downtime in services, while some functionalities (e.g. user registration, login, validation, claiming) will be temporarily disabled.
We apologize for the inconvenience, please stay tuned!
For further information please contact helpdesk[at]openaire.eu

fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Azhar, M. H. B.; Barton, T. (2017)
Publisher: Springer
Languages: English
Types: Part of book or chapter of book
Subjects: QA76.75
Secure messaging applications have been used for the purposes of major crime, creating the need for forensic research into the area. This paper forensically analyses two secure messaging applications, Wickr and Telegram, to recover artefacts from and then to compare them to reveal the differences between the applications. The artefacts were created on Android platforms by\ud using the secure features of the applications, such as ephemeral messaging, the channel function and encrypted conversations. The results of the experiments documented in this paper give insight into the organisation of the data structures by both Wickr and Telegram, as well as the exploration of mobile digital forensics techniques to recover artefacts removed by the ephemeral functions.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • 1. Google Play, https://play.google.com/store?hl=en_GB, [Accessed: September 2016]
    • 2. Almasy, S., Meilhan P., Bittermann, J.: Paris Massacre: At least 128 killed in gunfire and blasts, French officials say, http://edition.cnn.com/2015/11/13/world/paris-shooting/, (2015), [Accessed: September 2016]
    • 3. Madi, M., Ryder, S., Macfarlane, J., Beach, A., Park, V.:As it happened: Charlie Hebdo attack, http://www.bbc.co.uk/news/live/world-europe-30710777, (2016), [Accessed: September 2016]
    • 4. Roussinous, A.: The social media Accounts of British Jihadis in Syria just got a lot more distressing, http://www.vice.com/en_uk/read/british-jihadis-beheading-prisoners-syria-isisterrorism, (2014), [Accessed: September 2016]
    • 5. Torok, R., http://theconversation.com/how-social-media-was-key-to-islamic-states-attackson-paris-50743, (2015), [Accessed: 20th July 2016]
    • 6. Vidino, L., Hughes, S.: ISIS in America: From retweets to Raqqa, http://www.stratcomcoe.org/download/file/fid/2828, (2015), [Accessed: September 2016]
    • 7. Apple App Store, http://www.apple.com/uk/itunes/, [Accessed: September 2016]
    • 8. Perklin, M., https://www.defcon.org/images/defcon-20/dc-20-presentations/Perklin/DEF CON-20-Perklin-AntiForensics.pdf, (2012)
    • 9. Wickr Official Website, https://www.wickr.com, [Accessed: September 2016].
    • 10. Telegram Official Website, https://telegram.org, [Accessed: September 2016].
    • 11. Anderson, M.:The demographics of device ownership, http://www.pewinternet.org/2015/10/29/the-demographics-of-device-ownership/, (2015), [Accessed: September 2016]
    • 12. SnapChat, http:// mwpartners.com/snapchat-is-now-the-third-most-popular-social-networkamong-millennials/, (2014), [Accessed: September 2016]
    • 13. Barot, T., Oren, E.: Guide to Chat Apps, http://towcenter.org/research/guide-to-chat-apps/, (2015), [Accessed: September 2016]
    • 14. Amir, W.: Viber to Put Full End-to-End Encryption on Their Messaging App, https://www.hackread.com/viber-end-to-end-encryption-on-messaging-app/ (2016), [Accessed: September 2016]
    • 15. Mathur, N.: Facebook Messenger joins WhatApp in end-to-end encryption, http://www.livemint.com/Consumer/llIJ9Est0ZZIYfmvRSsTZP/Facebook-Messenger-joins-WhatsApp-inendtoend-encryption.html , (2016), [Accessed: September 2016]
    • 16. Mutawa, N. A., Baggili, I., Marrington, A.: Forensic Analysis of Social Networking Applications on Mobile Devices. Digital Investigation, vol. 9, pp. 24-33, (2012)
    • 17. Wu, C., Vance, C., Boggs, R., Fenger, T.: Forensic Analysis of Data Transience Applications in iOS and Android, http://www.marshall.edu/forensics/files/Wu-Poster. pdf, (2013), [Accessed: September 2016]
    • 18. Walnycky, D., Baggili, I.,Marrington, A., Moore, J., Breitinger, F. :Network and device forensic analysis of Android social-messaging applications. Digital Investigation, vol. 14, pp. 77-84, (2015)
    • 19. Mehrotra, T., Mehtre, B. M.:Forensic analysis of Wickr application on android devices. IEEE International Conference on Computing Intelligence and Computing Research, pp. 1- 6, (2013)
    • 20. Satrya, G. B., Daely, P. T., Nugroho, M. A.: Digital Forensic Analysis of Telegram Messenger on Android Devices. 10th International Conference on Information and Communication Technology and System, Indonesia, (2016)
    • 21. ADB tool, https://developer.android.com/studio/command-line/adb.html, [Accessed: September 2016]
    • 22. Linux Man Page, http://linux.die.net/man/1/dd, [Accessed: September 2016]
    • 23. Memory Dump, https://play.google.com/store/apps/details?id=com.cert.memdump&hl=en, [Accessed: September 2016]
    • 24. Dex2Jar tool, https://github.com/pxb1988/dex2jar, [Accessed: September 2016]
    • 25. Java Decompiler tool, http://jd.benow.ca, [Accessed: September 2016]
    • 26. SleuthKit tool, http://www.sleuthkit.org, [Accessed: September 2016]
    • 27. Telegram Channel, https://telegram.org/blog/channels, (2015), [Accessed: September 2016]
    • 28. Cuthbertson, A., http://www.ibtimes.co.uk/isis-telegram-channel-doubles-followers-9000- less-1-week-1523665, (2015), [Accessed: September 2016]
    • 29. DB Browser for SQLite Official Website, http://sqlitebroswer.org, [Accessed: September 2016]
    • 30. X-Ways Forensics: WinHex, https://www.x-ways.net/winhex/index-m.html, [Accessed: September 2016]
    • 31. Sedory, D. B.: Drive Offset and Sector Conversions, http://thestarman.pcministry.com/asm/mbr/DriveOffsets.htm, (2012), [Accessed: September 2016]
    • 32. Oxygen Forensics Official Website, http://www.oxygen-forensic.com, [Accessed: September 2016]
    • 33. Shortall, A., Azhar, M. A. H. B.: Forensic acquisitions of WhatsApp data on popular mobile platforms. Sixth International Conference on Emerging Security Technologies (EST), IEEE Press, Technische Universitaet Braunschweig, Germany, pp.13-17, (2015)
    • 34. Samsung Galaxy Mini Official Web Page, http://www.samsung.com/uk/consumer/mobiledevices/smartphones/galaxy-s/GT-I9195ZKABTU, [Accessed: September 2016]
    • 35. Allwinner A13 User Manual, http://linux-sunxi.org/A13, [Accessed: September 2016]
    • 36. Woods, V., Meulen, R. V. D.: Gartner Says Worldwide Smartphone Sales Grew 3.9 Percent in First Quarter of 2016, http://www.gartner.com/newsroom/id/3323017, (2016), [Accessed: September 2016]
  • No related research data.
  • No similar publications.
  • BioEntity Site Name

Share - Bookmark

Cite this article

Cookies make it easier for us to provide you with our services. With the usage of our services you permit us to use cookies.
More information Ok