Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/320396033

A Framework and a Process for Digital Forensic Analysis on Smart Phones


with Multiple Data Logs

Article in International Journal of Embedded Systems · January 2017


DOI: 10.1504/IJES.2018.10014929

CITATIONS READS

0 240

4 authors, including:

Elhadj Benkhelifa Loai Tawalbeh


Staffordshire University Texas A&M University San Antonio
188 PUBLICATIONS 3,661 CITATIONS 149 PUBLICATIONS 3,667 CITATIONS

SEE PROFILE SEE PROFILE

Yaser Jararweh
Jordan University of Science and Technology
424 PUBLICATIONS 11,752 CITATIONS

SEE PROFILE

All content following this page was uploaded by Loai Tawalbeh on 14 October 2017.

The user has requested enhancement of the downloaded file.


Int. J. Xxxxxx Xxxxxxx Xxxxxxx, Vol. X, No. Y, XXXX

A Framework and a Process for Digital Forensic Analysis on Smart


Phones with Multiple Data Logs

Elhadj Benkhelifa1, Benjamin E. Thomas1, Lo’ai Tawalbeh2,3, and Yaser


Jararweh3
1
Staffordshire University, Mellor Building, College Road, Stoke on Trent, ST UK
2
Computer Engineering Department, Umm Al-Qura University, Makkah, Saudi Arabia
3
College of Computer and Information Technology, Jordan University of Science and
Technology, Irbid, Jordan

Abstract: Nowadays mobile devices are considered an essential component of


our daily lives. The rapid evolution in mobile computing has becomes a
frustrating factor for law enforcement and the forensic community at large,
because of the lack of industry standard, tools and training. Smartphones are
becoming the most difficult to extract evidentiary data from. While many
commercial forensic tools have made great strides in supporting data extraction,
decoding, and analysis, some challenges remain. The smart phones not only
keep us connected but also can act as a mobile office, a social tool, and an
entertainment center. The combination of functionality, processing power, and
storage space makes smartphones a prime target for investigators. Up to our
knowledge, there is no mobile forensic analysis solution that maps data from
different sources including calls, geographical location, multimedia, and web
logs. Based on this motivation, in this paper, we aim to propose a framework
solution, which could contribute to the development of a novel and potentially a
market leading mobile forensic tool.

Keywords: Mobile Computing, Smart Phones Analysis, Framework, Digital


Forensics, Metadata, mobile phone forensics

Reference to this paper should be made as follows: Author(s) (2017) ‘paper


title ’, Int. J. Embedded Systems, Vol. X, No. Y4, pp.000–000.

Biographical notes:

Elhadj Benkhelifa (PhD, IEEE) is an Associate Professor at Staffordshire


University, Faculty Director of Mobile Fusion Applied Research Centre and
Head of Cloud Computing and Application Research Lab. Elhad is leading a
fast growing research team in pioneering research projects and has published
extensively in his areas of research. Elhadj has also founded and chaired a
number renowned conferences and is a member of a number of editorial boards.

Benjamin Thomas (BSc, MRes) has recently completed his MRes in computer
Science from Staffordshire University. Benjamin research interest falls into
digital forensics more specifically, mobile forensincs.

Lo’ai A. Tawalbeh: (SM IEEE) received his MSc and PhD degrees in Computer
Engineering from Oregon State University, USA in 2002 and 2004 respectively. Dr
Tawalbeh is a Tenure associate professor at the Computer Engineering Department at
Jordan University of Science and Technology (JUST), Jordan, and the Director of the
Cryptographic Hardware and Information Security (CHiS) lab at (JUST). From 2013
and till 2016 he was a visiting professor at Umm AlQura University, Mecca, SA. Now
he is a researcher at Koc Lab, UCSB, CA, USA. Dr Tawalbeh worked in many

Copyright © 201x Inderscience Enterprises Ltd.


240 E. Benkhelifa et al.

universities between 2005 and 2012 including: NewYork Institute of Technology


(NYIT) and DePaul’s University. He has over 70+ publications in well established
international Journals and conferences in the areas of cyber security and cryptography,
cloud and mobile cloud computing and Big data privacy. He is a co-founding chair of
many IEEE workshops/conferences about cloud/mobile cloud security such as
MCSMS, IoTNAT, and BIGDATA4HEALTH.

Yaser Jararweh received his Ph.D. in Computer Engineering from the


University of Arizona in 2010. He is currently an associate professor of
computer sciences at Jordan University of Science and Technology. He has co-
authored several technical papers in established journals and conferences in
fields related to cloud computing, HPC, SDN, security and Big Data. He is co-
chairing many IEEE events such as ICICS, FMEC, SDS, MCSMS, IoTNAT,
CCSNA, OSNT,, SNAMS, BDSN, IoTSMS, ISCW, and many others.

1 Introduction forensic tools have made great strides in supporting


data extraction, decoding, and analysis, some
Digital forensics is the process used to investigate
challenges remain. In this paper, we proposed a new
electronic data in order to produce forensically sound
framework for mobile devices analysis that tackles
evidence. Such investigations are not exclusively
many of the challenges of the current available frame
limited to electronic devices; digital forensics also
works for mobile devices analysis.
involves network and internet investigations
(Amstrong, 2003). Digital forensic practice consists of
The use of phones in crime was widely recognized for
forensic processes (acquisition and preservation,
some years, but the forensic study of mobile devices is
analysis and presentation) which are guided by
a relatively new field, dating from the early 2000s. A
principles and guidelines. Mobile devices have
proliferation of phones (particularly smartphones) on
become an essential component of our daily lives.
the consumer market caused a demand for forensic
These devices keep us connected and act as so much
examination of the devices, which could not be met by
more than the cell phones and portable music players
existing computer forensics techniques (Disklabs,
of the 1990's. It is common today for a smartphone to
2013). As a result of these challenges, a wide variety
act as a mobile office, social tool, and an entertainment
of tools exist to extract evidence from mobile devices;
center all rolled into one (William, 2011) (Benkhelifa
no one tool or method can acquire all the evidence
et al 2015). Today’s smartphones come with storage
from all devices. It is therefore recommended that
capacity that is similar to business laptops of just a few
forensic examiners undergo extensive training in order
years ago (Ayers et al, 2005). The combination of
to understand how each tool and method acquires
functionality and storage space makes smartphones a
evidence; how it maintains standards for forensic
prime target for forensics investigators. The rapid
soundness; and how it meets legal requirements.
evolution in mobile computing is forcing towards the
Mobile phone forensics is the act of extracting data
need for standards and tools to investigate and analyze
from a mobile phone and analysing that data to be able
these mobile devices and extract useful information
to use it to help the conviction of an individual.
that help in more protection against cyber threats
Mobile phone forensic investigation tools are some of
(Daojing, et al, 2015) and improving performance in
the most cutting edge software in the computing
many aspects including power consumption
industry. Mobile phone forensics is relatively new
(Benkhelifa et al, 2016). The rapid evolution in
within the world of digital forensics and has had to
mobile computing is a frustrating factor for law
rapidly expand and change in order for it to keep up
enforcement and the forensic community at large
with modern day smartphones and the data that can be
because of the lack of industry standard, tools and
stored on them.
training. Smartphones are some of the most difficult to
extract evidentiary data from. While many commercial

Table 1. Problem area comparison between PCs and handheld/ mobile devices
secondary or volatile memory, and Read Only
Memory (ROM), or primary memory. A mobile
device only has one, RAM, unless a SIM card is
There are many differences between computers and present then the SIM card functions as ROM”11. More
mobile phone. Mobile phones run off lots of different evaluation techniques and tools for mobile forensics
types of operating systems depending on the make and can be found in (Micro Systemation, 2013), (Murphy,
model of the phone and each operating system works 2011) and (Oxygen Forensics Suite, 2013).
differently. The main mobile phone operating systems
are Android (Rastogi et. al., 2016), IOS and Windows, The next section covers the related work including the
but there are others and also many different versions of description of the most known mobile forensic
the operating systems that get upgraded on a regular analysers. Then Section 3 will provide an evaluation
basis. On the other hand computer operating systems and comparison of these analysers, identifying the
don’t change as much and there are also fewer main gap, which will be addressed by the contribution
operating systems to choose from. The main operating of this paper. Section 4 evaluates the most relevant
systems are frameworks from literature related to mobile forensic
Windows, Mac OS and Linux. There are different analysis. Section 5 covers in details the proposed
versions of each of these operating systems but they framework to address the identified gap in existing
do not get updated as often as the mobile phone frameworks and tools. Section 6 is the conclusion.
operating systems. This is also the case for the mobile
hardware, which keeps changing. Due to the varying
software and hardware on mobile phones, analysis 2. Related Work
tools will also need constant updating to cope with
these changes. Table 1 shows Forensic tool attributes Mobile phone forensics is extremely important in the
for PCs and mobile/handheld devices (Finocchiaro, modern world. Due to the way that mobile phones
2008) (Forensic Pathways, 2012). have improved what they can do over the last 10 years
they are now more or less mini computers that can be
Yates argues that there is great difficulty in performing taken anywhere. Mobile phones can know hold almost
digital forensics on mobile devices due to lack of tools all types of file on them meaning that carrying illegal
that can keep up with the proliferation of variants of data is much easier. Due to how data can be
devices and operating systems. Compared to PCs, transferred to and from mobile phone devices, other
modern mobile phones run off more diverse operating data can be extracted from mobile phone devices than
systems depending on the make and model of the from that of computers, including texts, calls and
phone. Mobile phones’ operating systems tend to many other kinds of data. Now that mobile phones
upgrade more often than those of the PCs; similarly, have satellite location built in to them this means that
mobile phones’ hardware changes at a faster pace. as long as it is turned on data about the location of a
Yates also emphasises on the physical constructional person can be extracted using certain mobile phone
differences as being pertinent. “Computers have two analysers.
types of memory: Random Access Memory (RAM), or
242 E. Benkhelifa et al.

The use of phones in crime was widely recognized for raw data from the physical storage device. Physic
some years, but the forensic study of mobile devices is extracted allows the investigator to recover deleted
a relatively new field, dating from the early 2000s. A data from the device to gather more evidence. The
proliferation of phones (particularly smartphones) on physical extraction is a two stage process, these are the
the consumer market caused a demand for forensic `dump` and the `decode`. The dump stage is where the
examination of the devices, which could not be met by raw data is recovered from the device and the decode
existing computer forensics techniques (Amstrong, stage is where XRY can automatically reconstruct the
2012). As a result of these challenges, a wide variety raw data into a readable format. For example,
of tools exist to extract evidence from mobile devices; extracting deleted SMS messages without needing to
no one tool or method can acquire all the evidence manually carve the data. Physical extraction is mainly
from all devices. It is therefore recommended that used when mobile devices do not have SIM cards or
forensic examiners, undergo extensive training in have security locks of the phones. Some of the key
order to understand how each tool and method features of using XRY are:
acquires evidence; how it maintains standards for
forensic soundness; and how it meets legal  XRY specialises in recovering and restoring
requirements. Paraben Corporation published an deleted data.
extensive comparison chart for most credible mobile  Works with all mobile devices including mobile
forensic software solutions available in the market, phones, smartphones, GPS navigation and tablet
which yet confirms the authors knowledge that there computers.
exist no mobile forensic solution that extracts and  Allows SIM card cloning.
maps data from calls (incoming and outgoing) together  Decoding of recovered data into a readable format
with pictures, geographical location and web logs. without data carving.
This is therefore the main motivation behind the
research presented in this paper, where the authors 2.2 Oxygen Forensic Suite
propose a framework solution, which could contribute
to the development of a novel and potentially a market Oxygen Forensic Suite is a software package that
leading mobile forensic tool (Pan, 2008). allows users to extract and analyse data from mobile
devices. Oxygen Forensic Suite is able to extract data
There are not many tools for forensic phone analysis from mobile phones, smartphones, satellite navigation
available in the market. The available tools do treat systems and certain tablet computers. Oxygen
very similar tasks but in different ways. This section Forensic Suite is compatible with more than 6300
reviews and compare the most known, used and cited mobile devices, all of the main brand mobile devices
Mobile Phone Forensic Analyzers. This will be used to are included and most of the phones that have a
help identify the gaps within the market. Chinese chip in them are also covered. Oxygen
Forensic Suite can extract more than just the basic
information from mobile devices. This means that
more data can be extracted, meaning that more
2.1 Micro Sestemation XRY potential evidence is secured. Oxygen Forensic Suite
can also recover deleted SMS’s from the mobile
devices. Depending on the mobile model Examples of
XRY (Micro Systemation, 2012) is a software package
that allows secure forensic extraction of data from a this data are; SIM card data, Speed dial lists, Missed,
variety of mobile devices including mobile phones, dialed and incoming calls, SMS timestamp
smartphones, satellite navigation systems, 3G information, Geographical coordinates, Java
application, GPRS (General Packet Radio Service),
modems, portable music players and the latest tablet
devices. XRY allows users to decide between physical Wi-Fi activity. (Oxygen Forensic Suite, 2013).
and logical extraction. These two methods can extract Oxygen Forensic Suite allows for easy analysing and
the same data but extra data through physical report creation. This allows all data to be easily seen in
extraction. Logical extraction from the mobile device an order to enable quick and easy examination. Some
of the key features of using Oxygen Forensic Suite are:
will be presented to the investigator in a logical and
ordered method that allows the data to be easily sorted
and find the evidence required. Logical extraction also  More than 6300 mobile devices are compatible.
allows for easier report creation.  Supports a large amount of phone manufacturers
and models.
Physical extraction works by by-passing the operating  Allows recovery of deleted SMSs.
system of the mobile phone to be able to extract the  Allows geographic coordinates to be extracted.
 Allows Wi-Fi activity extraction.  Logical and physical data extraction.
 User password extraction.
2.3 Cellebrite Mobile Forensics UFED Touch  Advanced data parsers.
Ultimate  Google earth plotting feature.

UFED Touch Ultimate is an all in one software and 2.5 Forensic Phone Analyser – FPA
hardware package that enables logical and physical
extraction of data from mobile devices. UFED Touch Forensics phone analyzer (Forensic Pathways, 2012) is
Ultimate allows decoding of data, analysing of data a piece of software that allows for mapping of calls
and reporting on the data. UFED Touch Ultimate is that have been made and received from a mobile
compatible with feature phones, smart phones, phone. Forensic phone analyser works by using taking
portable GPS units, tablet computer and any chipsets extracted data and ordering it to allow to faster and
that have been manufactured in China. The UFED more effective reporting a querying. Forensic phone
Touch Ultimate allows the investigator to extract the analyser takes the data and can map all of the phone
file systems from the mobile devices; this means that calls that have been made and received from a mobile
how the data is stored on the mobile device can be phone and output the data in a visual representation.
seen meaning more data can be identified, this Forensic phone analyser can connect phones together
includes any deleted data that has been found in the through the phone number of the mobile phone, this
file systems. UFED Touch Ultimate also allows for allows for individuals and phone numbers to be
password extraction, this means passwords do not connected together. This proves that the phones have
have to be cracked in-order to access files that are had call made or received between them .Forensic
protected. (Cellebrite, 2013). Some of the main phone analyser works by taking data that has been
features of the UFED Touch Ultimate are: extracted using a separate mobile phone analysing
tools and imports the data. Example of the phone
 Cellebrite is an all in one unit meaning that it is analysers that are supported are XRY and Cellebrite.
portable. Examples of data that is used within the mapping;
 It has a UFED reader built in that allows phone hard drive, SIM cards, SMS messages,
authorized personnel to share information with Contacts, Images, Communication. Forensic phone
others. analyser advertises a list of key features of the
 Comes with all the cables that will be needed to software include:
connect to every phone.
 File system and password extraction.  Converts/cleans the data into common format
 Aggregates data from many different sources
2.4 Paraben Device Seisure  Cross reference calls, texts and address books
 Enables the data to be search and queried
 Reveals links, associations, relationships within
Paraben Device Seizure is a Windows based mobile
the data
device analyser. Paraben Device Seizure allows logical
and physical extraction of mobile devices. Paraben  Common and/or legitimate numbers can be
Device Seizure is compatible with most CDMA ignored
(Code Division Multiple Access) phones, Android  Enables statistical analyse of the data
phones and some GPS devices. Paraben Device Seizer  Enables automated reporting of results
allows password extraction to be able to see all of the
data that is on the device. This allows a fuller 3. Evaluation of Existing Mobile Phone Forensic
investigation to be carried out. Paraben Device Seizure Analysers
also has an integrated Google earth function, this
allows the GPS coordinates to be plotted to endure a The evaluation is done by creating a set of metrics to
visual representation of where the phone has been enable a fair evaluation of the chosen tools. Using
throughout the world. The advanced data parser metrics to critically evaluate mobile forensic tools
function allows for all the data that is extracted to be against one another will increase the understanding of
shown in a readable format making it easier to analyse the tools themselves, allowing for a greater in-depth
the data and then present it in a readable format for the knowledge of what the mobile forensic tools are
report creation. (Paraben Corporation, 2013). Some of capable of doing. The metrics are also used to allow
the main features of Paraben Device Seizure are: the evaluator to be able to have a visual representation
of the data that the mobile forensic tools can give. This
allows for a faster and more effective way of seeing
244 E. Benkhelifa et al.

the data that has been evaluated. These metrics were Table 2 shows that most attributes for extracting data
chosen by evaluating the main mobile phone analysing from mobile phones are possible, but via using
tools that are available in the market place and listing multiple evaluation tools, which is time consuming,
the main features that the tools advertise. costly and requires expert users of all these evaluation
tools. Also, by using more than one analysis tool, on
This was done by choosing some of the features that the same smart phone for different data logs, the
all of the tools have but mainly looking at the unique possibility of inaccuracy in the analysis could be high.
features of each tool. Some metrics were then thought Table 2 also shows a gap in the market for mobile
up that have not been brought up bought up through forensic analysis tools, which can also map the
reading the literature. These metrics came from analysis of geographical location, password extraction
knowledge and background reading within the area. and 4G connectivity.
The metrics were chosen due to them covering a large
area of the capabilities of the mobile phone analysing
tools that are available on the market, also some of
these areas are not covered by all of the mobile phone
analysing tools allowing for the gaps within the market
to open up and become visible.

Table 2 - Evaluation for the market analysis

allows for quicker examination of the data from a


Tracking the exact or approximate geographical mobile phone, meaning that time is not used up having
location of mobile devices which could be used in a to manually decipher the cipher text to make it in to a
crime or during a crime, is very valuable as part of the readable password for the examiner to be able to use.
investigation, especially when it is mapped to other
date logs on the same mobile phone. Being able to connect to the internet anywhere at any
time can bring up some valuable data in the context of
Password extraction covers not just the extraction of mobile phone forensics. Being able to connect to a
the password but also decode the cipher text into a faster network means that more data will be able to be
readable password for an examiner to understand. Not transferred to a mobile device wirelessly, allowing
many of the mobile phone analysers allow the user to potential criminals to take advantage of this. No
conduct this, meaning that any data that has a mobile phone analyser advertises that their product is
password on it cannot be seen and therefore cannot be or is not compatible with 4G connectivity.
used as evidence against an individual unless the
defendant releases the password. Password extraction
4. Evaluation of Relevant Frameworks mobile phone forensics. There is extra supporting
information about each stage in the framework,
The most relevant three frameworks found in literature however, these stages are lacking details as well as an
are discussed in this section, these are: in depth knowledge of the different forensic tools that
are available along with knowing how to use all of the
1. Evidence extraction framework (Murphy, functions available. The stage that will need further
2011) development in the proposed framework is the
2. framework for the investigation of email data analysis stage. The framework needs to outline the
(Haggerty et al, 2011) stages that will need to be carried out during the
3. SFIPM (Smartphone Forensic Investigation analysis stage of an investigation in more depth in
order to allow the user to know what data is being
Process Model) (Geol, Tyagi, & Agarwal,
investigated, enabling a better outcome of the
2012) investigation.

The Evidence Extraction Framework, proposed by SFIPM (Smartphone Forensic Investigation Process
(Murphy, 2011) has been created to demonstrate the Model), proposed by (Geol et al, 2012), explains the
process for extracting evidence for a device and then entire process of a smartphone forensic investigation.
documenting it and archiving the data for use at a later SFIPM is also capable of do cell site analysis; which
date. The framework covers all of the main processes locates where smartphone was or is at a specific date
of extracting the data from a device and can be used and time (Disklabs, 2013). SFIPM addresses most of
for computers data extraction and for mobile device the gaps found in the previously described
extraction. For this paper, we focus on the mobile data frameworks, in addition to new features such as
extraction. The reason this framework has been supporting Personal Digital Assistant mode and
created is to make sure that no steps get missed out whether the memory is volatile or non-volatile
during one of the most important stages of the (Freudenrich C, 2012). However, This model needs to
investigation in order to avoid loosing any vital data. focus more on the examination and analysis sections to
The extraction process can be a long process and allow for more in-depth understanding of the overall
having a framework to be able to visually show all the investigation of mobile phones.
main processes could come in useful. The framework
has many good aspects to it such as, starting the 5. The Proposed Framework for Smartphone
extraction process from the point of intake; the Forensic Analyser
framework also states the stages of presentation and
archiving. However, the way that the framework The overall proposed framework is depicted in Figure
comes across is a mix between the extraction phase 1. The purpose of the framework is to allow the
and the investigation phase. Through the extraction investigator to be able to plot a map of where an
process documentation will need to be carried out individual (phone holder) has been travelling to and
throughout, however a report will not be carried out from with the mobile device. The framework starts off
until the investigation stage has been complete. Due to by collecting the metadata from the mobile phone, this
the wording of the framework it seems that this has not data comes from the different sections of the phone.
been taken into consideration. From this one stage the This framework considers the metadata related to
framework then moves on to presentation and photos, calls and geographical location. The metadata
archiving of the extracted data, from an extracting that the framework will collect is location (co-
point of view this does not have to be carried out as ordinates), times and dates (of the locations). This
the data will need to be in its raw form for it to be metadata in archived in a database for the duration of
investigated properly, also it would not need to be the investigation.
archived as it has not yet been examined. Also, this
framework does not give any detail of what will need The inference engine of the framework will then plot
to be carried out for each of the steps to be completed; all of the locations and number them; the numbering
this makes the framework more of a general overview of the locations allows for a look up table to be used to
of data extraction. enable the investigator to put the times and dates with
the location markers. The framework produces a map
(Haggerty et al, 2011) proposed a framework for the around the area of the locations; this map will have all
investigation of email data. The proposed framework of the locations that have been extracted from the
demonstrates how emails can be acquired, analysed mobile phone device on it. Each location will have the
and presented within computer forensics. This co-ordinates of the location next to it in brackets. This
framework can easily be adapted to work within
246 E. Benkhelifa et al.

map will also have lines connecting each of the Fig.1. High level framework architecture
locations with each other to show the movements of
the phone holder. These lines will be plotted according
to the time and dates that the phone holder was at that The process then extracts the information about the
location. The framework will then produce a table that locations that have been searched for within the
will have the location number, time and date of each application; this can show potential locations that an
location. This will act as a look-up table for the individual has been to. The process then takes all of
investigator and makes the map easy to analyse. the locations and extracts the dates and times that the
application has opened and the destinations that have
Figure 1 shows how the data travels through the been searched. This information is then stored in the
process. Within the phone, metadata from the photos, metadata database. The satellite navigation side of the
call, geographical location and web logs/content is process works in a similar way. It will extract the
first extracted and stored in the metadata database. The information about the routes that have been searched
metadata is extracted from the general data that was for. This information will allow the investigator to see
provided (this metadata is location, time and date). any potential routes that may have been looked at for
The engine then requests the data from the database; travelling. The process then extracts information about
the engine is the part of the framework where most of all the routes that have travelled. This allows the
the work happens. From the engine the reports and investigator to track the exact route that an individual
map is created, this is what the investigator will show have travelled along. The final stage is extracting the
in court. dates and times of these route searches and routes
travelled. This information is then stored in the
metadata database.
5.1 Extracting the Geographical Data

Figure 2 depicts the process of extracting the metadata


from map application and satellite navigation
application. The map application side of the process
starts off by extracting all of the locations that the
application has been used at. This data is stored on the
phone when an phone holder opens the application.

Fig.2. Extraction of Geographical Metadata

5.2 Extracting the photos Metadata

After retrieving the relevant images from the mobile


phone device; this process will then process the
images to extract the required metadata from the Fig.4. Extraction of metadata for calls
images. The first stage of extraction will be searching
for the dates and times that the images were taken, The second stage of process is to extract any
downloaded or upload on to the mobile phone. Then information about the location of the mobile phone
the process will determine any geographical data about when calls were made or received. Also, information
each photo. This will allow the plotting of the about which telegraph pole the mobile signal was
locations and the images on to the location tracking connected to at the time could be extracted. As each
map. Some images may not give data about the telegraph pole can only have a certain radius of signal
locations they were taken at but the dates and times to an area of where a mobile phone could have been.
could be connected with other dates and times and This could prove vital within an investigation.
images and locations could be put together to Though, the exact location of a person may prove
strengthen any evidence. Figure 3 depicts this process. difficult to determine from only phone calls, but
combined with other data held in the same mobile
device, location could be identified.

5.4 Process for Metadata Plotting

Figure 5 illustrates the proposed process for metadata


plotting. All of the data that will be required for the
investigation is retrieved from the metadata database
as shown in Figure 1, and then send the information to
the reporting stage of framework 1. The first stage of
this framework is to plot all of the locations that are
stored within the database; this allows for the
visualisation of the locations that the mobile phone has
been in. From this point the investigator can go two
Fig.3. Extracting metadata from Photos ways. The first way is to create the table that lists all of
the location numbers and, times and dates (to the
5.3 Extracting Metadata for calls corresponding location); this is now the reference
sheet for this investigation and can be used within the
Figure 4 shows the process of extracting the metadata report. The second direction is to define each day’s
of phone calls. The data that will be needed will location with a different colour, this helps to identify
include both incoming calls and outgoing calls. The the movements for each day. This then moves on to
first stage of the process is to extract the dates and plotting lines of movement between each point. These
times that the phone calls took place; the time will be lines will be done by firstly date but also time and will
when the phone call was dialled or answered. allow the investigator to plot the movement of the
Similarly, this information can be used to match dates device throughout each day. From this step there are
and times with known locations that have already been two directions that can be taken. The first direction is
determined. to review how many times a location has been visited.
This will be done by adding up the total amount of
times a location has been visited. This can help tie the
individual to a location that is frequently visited.
248 E. Benkhelifa et al.

Fig.5. Process for Plotting of the metadata


Using this information the investigator can track the Figure 6 has three main layers to it. The first layer will
duration of time between each check-in. This tells the look at the query to define whether or not the
investigator how frequently that location is visited and information will be required. For example, the first
could lead to good intelligence to follow up on at a question could be, do calls need mapping? If the
later date. The final part of this framework is answer is yes then the metadata will be collected from
calculating the most popular routes travelled by an the database and inserted into a table. If the answer is
individual. This will show which journeys are taken no then that stage will be missed out and move on to
the most and could show some routes known to police the next function. If that metadata needs to be mapped
or could bring to light some new routes regularly taken then each stage will be completed, however if the
by gangs. metadata is not needed then the framework will move
to the next function.
When the process comes to the final function, it will
5.5 Process for Metadata mapping
either end or complete. If the answer to the final
question is no the process will need to find out if any
Figure 6 shows how the metadata will be used within data is located within the table, if there is then final
the engine stage. Before this stage can take place the layer will be continued. If there is no metadata in the
metadata will have to be queried so that this table then a new query will be made. If the answer is
framework will know what data needs to be extracted yes then the same steps will happen, except after the
from the database? The query will consist of the user final stage the process will display a table showing all
ticking which functions (type of data e.g. calls, photos) of the metadata that has been found in the database.
need to be plotted and also what dates and times want This information will go to the next step that will be
to be looked at. These dates and times can cover one matching the metadata in order to see whether any of
day or the entirety of the mobile phone’s life time. the dates, times or locations match one another. The
This will allow the plotted data to cover the desired data from the inference engine will also be pushed to
time frame. metadata plotting function, depicted in Figure 5, where
the metadata will be mapped onto a map.
Int. J. Xxxxxx Xxxxxxx Xxxxxxx, Vol. X, No. Y, XXXX

Fig.6. The inference engine process

6. Conclusion typical smartphone, nowadays. More areas could be


brought into it such as general media/entertainment
Mobile device and smart phones are playing very applications and SMS’s, for instance. Figure 7 shows
important roles in our lives. They are used to do a other areas where more data from one mobile device
variety of tasks from playing games to internet could be combined in any one forensic investigation.
shopping. The need for a comprehensive tool that is This framework could be expanded to allow for
able to collect data and link it together in smart phones multiple mobile phone investigations simultaneously
is the main motivation behind this paper. We proposed to uncover any patterns or insights into the
a framework that gathers data from different sources investigation.
and map it together. This framework can be developed Mobile Cloud Computing is an emerging technology,
as a dedicated forensic tool for smart phones, which is which is expected to revolutionize the way we use
currently not available in the market. The proposed smartphones and deal with data. This technology will
framework focuses on mapping metadata from introduce many more challenges in the context of
location, calls, images and web applications mobile forensics (Yi and Mao, 2013) (Tawalbeh et al.
2016), and (Lo’ai et al).

Copyright © 201x Inderscience Enterprises Ltd.


250 E. Benkhelifa et al.

Fig.7. Types of data that can be extracted from one mobile device for forensic investigation

Geol, A., Tyagi, A., & Agarwal, A. (2012). ‘Smartphone


ACKNOWLEDGMENT Forensic Investigation Process Model’. International Journal
of Computer Science &Security , 322-341.
This work is funded by grant number (13-INF2526-10) from
the Long-Term National Science Technology and Haggerty, J., Karran, A. J., Lamb, D. J., & Taylor, M. J.
Innovation Plan (LT-NSTIP), the King Abdul-Aziz City for (2011). ‘A framework for the forensic investigation of
Science and Technology (KACST), Kingdom of Saudi unstructured email relationship data’. International journal
Arabia. We thank the Science and Technology Unit at Umm of digital crime and forensics , 1-18.
Al-Qura University for their continued logistics support.
Micro Systemation. (2013). ‘What is XRY’. [online]
References http://www.msab.com/xry/what-is-xry (accessed June 2015)

Armstrong, C. (2003). ‘Developing a framework for Murphy, C. (2011). ‘Developing process for the
evaluating computer forensic tools’. The Evaluation in examination of cellular phone evidence. 1-12.
Crime and Justice: Trends and Methods Conference
convened by the Australian Institute of Criminology in
Oxygen Forensics Suite. (2013). ‘Oxygen Forensics Suite’.
conjunction with the Australian Bureau of Statistics.
[online] http://www.oxygen-forensic.com/en/ (accessed July
Canberra, 24-25 March 2003
2015)

Ayers, R., Jansen, W., Cilleros, N., & Daniellou, R. Pan, Y. (2008). ‘Project 1: Tools of mobile forensics’.
(2005). ‘Cell phone forensic tools: An overview an [online]
analysis’. NIST, Gaithersburg. NISTIR 7250. http://www.ericgoldman.name/media/Mobile_Forensics-
Tool_Analysis.pdf (accessed July 2015)
Benkhelifa, E., Welsh, T., Tawalbeh, L., & Jararweh, Y.
(2016). ‘Promoting Energy Modelling in Network Paraben Corporation. (2013). ‘Device seizure 6’. [online]
Simulations for Optimising Mobile Device Power http://www.paraben.com/device-seizure.html (accessed Nov
Consumption’ Springer Mobile Network and Applications. 2016)
Cellebrite, 2013. ‘UFED touch ultimate’. [Online] Rastogi, S., Bhushan, K., et. al. (2016)."Android
http://www.cellebrite.com/mobile-forensic-products/ufed- Applications Repackaging Detection Techniques for
touch-ultimate.html. (accessed Nov 2016) Smartphone Devices," Procedia Computer Science,
Elsevier, 2016
Benkhelifa, E., Welsh, T., Tawalbeh, L., & Yaser Jararweh
(May, 2016). ‘Framework for Mobile Devices Analysis’.
Tawalbeh. L., Mehmood, M., Benkhelifa, E., Song. H.
Procedia Computer Science, Elsevier. In the 7th Ambient
(2016). Mobile Cloud Computing Model and Big Data
systems and Networks conference (ANT 2016). Vol 83,
Analysis for Healthcare Applications. IEEE Access.
pp1188 – 1193.
ISSN 2169-35-36. Pages 6171-6180.
Daojing, H., Chan, S., and Guizani, M. (2015) ‘Mobile
Lo'ai, A.T., Bakheder, W. and Song, H., 2016, June. A
application security: malware threats and defenses.’ IEEE
mobile cloud computing model using the cloudlet scheme
Wireless Communications 22.1 (2015): 138-144.
for big data applications. In Connected Health:
Applications, Systems and Engineering Technologies
Disklabs. (2013). Cell Site Analysis. [online]
(CHASE), 2016 IEEE First International Conference on (pp.
http://www.mobilephoneforensics.com/cell-site-
73-77). IEEE.
analysis.php (accessed April 2015)
William, E. (2011) ‘Defending users against smartphone
Finocchiaro, C., Goldman, E., Natarajan, A., & Stanek, M. apps: Techniques and future directions.’ International
(2008). ‘Mobile device froensic tool evaluation.’ [online] Conference on Information Systems Security. Springer
http://www.ericgoldman.name/security/17-forensics/36- Berlin Heidelberg, 2011.
mobile-device-forensic-tool-investigation (accessed April
2015) Yi, X., and Mao, S. (2013) "A survey of mobile cloud
Forensic Pathways. (2012). ‘Mobile/cell phone forensics.’ computing for rich media applications." IEEE Wireless
[online] http://www.forensic-pathways.com/products-and- Commun. 20.3 (2013): 1-0.
services/mobile-phone-forensics (accessed April 2015)
Geiger, M. (2005). ‘Evaluating commercial counter-forensic
tools’. Pittsburgh.

View publication stats

You might also like