Tag Archives: Mobile

Mobile App Analysis Part 5

Introduction The Mobile Application Forensics team is beginning to wind down on application analysis, and have started working on their final report. So far, both the iOS team and Android team worked on Open Whisper Systems’s Signal, an end-to-end encryption chat app, and Bumble, a new mobile dating app. The iOS team then did analysis […]

Continue reading

Mobile App Analysis Part 4

Introduction The Mobile Application Forensics team has begun to wrap up analysis on their second mobile app, Bumble, and are getting ready to move onto their next set of mobile apps, Facebook Lite for Android and the Weather Channel App for iOS. During analysis, both the iOS and Android team found important digital artifacts left […]

Continue reading

Mobile App Analysis Part 3

Introduction The Mobile Application Forensics team is wrapping up analysis on Signal by Open Whisper Systems, and is starting data generation on the new mobile dating app, Bumble. The iOS team, unfortunately, did not find many artifacts left by Signal. The Android team had better luck, and found some interesting artifacts as seen below. Signal […]

Continue reading
Nexus LG smartphone and Apple iPad

Mobile App Analysis Part 2

Introduction  Over the last few weeks, the Mobile Application Forensics team has been working on researching and analyzing Open Whisper’s Signal on the iPhone and Android device. We split into two teams to divide and conquer the application on two different mobile operating systems. The Android team tackled a Nexus 5x and the iOS team […]

Continue reading
Mobile App Analysis

Mobile App Analysis Introduction

Introduction TO MOBILE APP ANALYSIS The LCDI continues its Mobile Application Forensics research this semester with a new set of exciting apps to crack open. Last semester’s Mobile App team looked into Pokemon GO, MapMyRun, Tinder, and Voxer across iOS and Android mobile devices. We’ll now shift our focus towards Open Whisper Systems Signal, Passkeep, […]

Continue reading

Mobile App Forensics: Final Blog Update

Introduction: The LCDI’s Mobile App Forensics team is wrapping up the academic semester, but that doesn’t mean we’ve run out of things to show you. Over the past fifteen weeks, we have analyzed five applications in the Android and iOS marketplaces. With both some major successes and disappointing failures, we as a team are confident […]

Continue reading

Mobile Device Management- Samsung Knox

Intro To Samsung Knox For this project, we decided to look into mobile device managers (MDMs). These are applications that companies can utilize in order to monitor company-issued mobile devices or manage ‘bring your own device’ (BYOD) programs. As a group we researched various MDMs and respectively chose particular managers we wanted to research. This […]

Continue reading
Mobile Device Management MaaS360

Mobile Device Management- MaaS360

Introduction This project will focus on the various features and forensic value of Mobile Device Managers (MDM). These are applications that companies commonly use to monitor and control multiple devices. These applications are increasing in popularity among company provided devices or bring your own device (BYOD). After completing research on multiple MDMs, the Mobile Device […]

Continue reading
mobile forensics iPhone, Samsung Galaxy, and BlackBerry Smartphones

Investigating Mobile Forensics

why mobile forensics? Digital forensic investigations pertain to all computers and digital devices, which means that wearable technology, laptops, mobile phones and other smart devices must be taken into consideration. Each device has its own importance, but arguably the most important piece of technology today is the mobile device due to consumer popularity. Thus, mobile […]

Continue reading
mobile apps skype, facebook, twitter, LinkedIn, Angry Birds, New York Times, and others logos

Mobile Apps Forensics Update

Intro Our team was able to make significant progress on our project in the past few weeks. Since our last post, we have been able to successfully get an image of the iPhone 5 that we used for data generation and have completed our analysis of the applications Yik Yak and Periscope. Next we will […]

Continue reading