Skip to main content

Advertisement

Log in

The disclosure of an Android smartphone’s digital footprint respecting the Instant Messaging utilizing Skype and MSN

  • Published:
Electronic Commerce Research Aims and scope Submit manuscript

Abstract

As Android Operating System (OS) for mobile computing devices become one of the major trends, the utilization of smartphones set the record for global users and they are taking advantages of the contemporary Instant Messaging (IM) as a convenient tool to communicate with global users in real time because of its competitive rate, high availability, robust reliability, and agile mobility. Undoubtedly, as IM has gradually become one of the channels to commit the cybercrime, the digital evidence collection, analysis, and preservation of the non-volatile data from the Random Access Memory (RAM) of the computing device in terms of cyber trails that were unknowingly left on the crime scene. Hence, this research conducts the design of the experiments to fulfill the essence of contribution of the paper. The Skype Chat and MSN are the popular IM tools, which are widely utilized in contemporary digital era. This paper provides a generic paradigm for the digital forensics specialists and law enforcement agencies to ponder if similar situations are faced.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig.�1
Fig.�2
Fig.�3
Fig.�4
Fig.�5
Fig.�6
Fig.�7
Fig.�8
Fig.�9
Fig.�10
Fig.�11
Fig.�12
Fig.�13

Similar content being viewed by others

References

  1. Portokalidis, G., Homburg, P., Anagnostakis, K., & Bos, H. (2010). Paranoid android: versatile protection for smartphones. In Proceedings of the 26th annual computer security applications conference (ACSAC’10), New York (pp. 347–356).

    Google Scholar 

  2. Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., & Glezer, C. (2010). Google android: a comprehensive security assessment. IEEE Security & Privacy, 8, 35–44.

    Article  Google Scholar 

  3. Aviv, A. J., Gibson, K., Mossop, E., Blaze, M., & Smith, J. M. (2010). Smudge attacks on smartphone touch screens. In Proceedings of the 4th USENIX conference on offensive technologies (WOOT’10), Berkeley, CA, USA (pp. 1–7).

    Google Scholar 

  4. Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., & Moller, S. (2011). On the need for deferent security methods on mobile phones. In Proceedings of the 13th international conference on human computer interaction with mobile devices and services (Mobile HCI ’11), New York (pp. 465–473).

    Chapter  Google Scholar 

  5. Conti, M., Zachia-Zlatea, I., & Crispo, B. (2011). Mind how you answer me! Transparently authenticating the user of a smartphone when answering or placing a call. In Proceedings of the 6th ACM symposium on information, computer and communications security (ASIACCS ’11), New York (pp. 249–259).

    Chapter  Google Scholar 

  6. De Luca, A., Hang, A., Brudy, F., Lindner, C., & Hussmann, H. (2012). Touch me once and I know it’s you! Implicit authentication based on touch screen patterns. In Proceedings of the 2012 ACM annual conference on human factors in computing systems (CHI ’12), New York (pp. 987–996).

    Chapter  Google Scholar 

  7. Derawi, M. O., Nickel, C., Bours, P., & Busch, C. (2010). Unobtrusive user-authentication on mobile phones using biometric gait recognition. In Proceedings of the 2010 sixth international conference on intelligent information hiding and multimedia signal processing (IIH-MSP ’10), USA (pp. 306–311).

    Chapter  Google Scholar 

  8. Zahid, S., Shahzad, M., Khayam, S., & Farooq, M. (2009). Keystroke-based user identification on smartphones. In E. Kirda, S. Jha, & D. Balzarotti (Eds.), Lecture notes in computer science: Vol5758. Recent advances in intrusion detection (pp. 224–243). Berlin: Springer.

    Chapter  Google Scholar 

  9. Portokalidis, G., Homburg, P., Anagnostakis, K., & Bos, H. (2010). Paranoid android: zero-day protection for smartphones using the cloud. In Annual computer security applications conference (ACSAC ’10), Austin (pp. 347–356).

    Google Scholar 

  10. Weng, Y. H., Sun, F. S., & Grigsby, J. D. (2012). Geo tools: an android phone application in geology. Computers & Geosciences, 44, 24–30.

    Article  Google Scholar 

  11. Thing, V., Ng, K., & Chang, E. (2010). Live memory forensics of mobile phones. Digital Investigation, 7, 74–82.

    Article  Google Scholar 

  12. Burguera, I., Zurutuza, U., & Nadjm-Tehrani, S. (2011). Crowdroid: behavior-based malware detection system for android. In Proceedings of the ACM workshop on security and privacy in mobile devices (SPSM) (pp. 15–26).

    Chapter  Google Scholar 

  13. Distefano, A., Me, G., & Pace, F. (2010). Android anti-forensics through a local paradigm. Digital Investigation, 7, 83–94.

    Article  Google Scholar 

  14. Thing, V. L. L., Ng, K. Y., & Chang, E. C. (2010). Live memory forensics of mobile phones. Digital Investigation, 7, 74–82.

    Article  Google Scholar 

  15. Lessard, J., & Kessler, G. C. (2010). Android forensics: simplifying cell phone examinations. Small Scale Digital Device Forensics Journal, 4(1), 1–12.

    Google Scholar 

  16. Ahmed, R., & Dharaskar, R. V. (2008). Mobile forensics: an overview, tools, future trends and challenges from law enforcement perspective. In 6th international conference on e-governance (ICEG), emerging technologies in e-government, m-government (pp. 312–323).

    Google Scholar 

  17. Hoog, A. (2011). Android forensics investigation, analysis and mobile security for Google android. Amsterdam: Elsevier.

    Google Scholar 

  18. Ren, Y., Cheng, F., Peng, Z., Huang, X., & Song, W. (2011). A privacy policy conflict detection method for multi-owner privacy data protection. Electronic Commerce Research, 11, 103–121.

    Article  Google Scholar 

  19. Kshetri, N. (2013). Cybercrime and cyber-security issues associated with China: some economic and institutional considerations. Electronic Commerce Research, 13, 41–69.

    Article  Google Scholar 

  20. Nurmilaakso, J. M. (2009). ICT solutions and labor productivity: evidence from firm-level data. Electronic Commerce Research, 9, 173–181.

    Article  Google Scholar 

  21. Zarmpou, T., Saprikis, V., Markos, A., & Vlachopoulou, M. (2012). Modeling users’ acceptance of mobile services. Electronic Commerce Research, 12, 225–248.

    Article Google Scholar

Download references

Acknowledgements

The author would like to acknowledge the funding support of NSC (National Science Council) of Taiwan concerning the grant of Project NSC 101-2221-E-142-009.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chi-Hsiang Lo.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chu, HC., Lo, CH. & Chao, HC. The disclosure of an Android smartphone’s digital footprint respecting the Instant Messaging utilizing Skype and MSN . Electron Commer Res 13, 399–410 (2013). https://doi.org/10.1007/s10660-013-9116-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10660-013-9116-1

Keywords

Navigation