[HTML][HTML] Interpol review of digital evidence for 2019–2022

P Reedy - Forensic Science International: Synergy, 2023 - Elsevier
When compiling the digital evidence review for 2019–2022, the first thought that came to
mind was “we have come so far… we have so far to go”. There has been considerable …

[HTML][HTML] A comprehensive survey on artifact recovery from social media platforms: approaches and future research directions

K Gupta, D Oladimeji, C Varol, A Rasheed… - Information, 2023 - mdpi.com
Social media applications have been ubiquitous in modern society, and their usage has
grown exponentially over the years. With the widespread adoption of these platforms, social …

[HTML][HTML] Forensic analysis of ephemeral messaging applications: Disappearing messages or evidential data?

H Heath, Á MacDermott, A Akinbi - Forensic Science International: Digital …, 2023 - Elsevier
Ephemeral messaging or 'disappearing messages' is the mobile-to-mobile transmission of
multimedia messages that automatically disappear from the recipient's screen after the …

Mobile Forensic Analysis of Signal Messenger Application on Android using Digital Forensic Research Workshop (DFRWS) Framework

I Riadi, NH Siregar - Ingenierie des Systemes d'Information, 2022 - search.proquest.com
Cybercrime is a crime committed using equipment connected to the internet. One of the
cybercrimes that occured during the COVID-19 pandemic was the spread hoaxes about the …

Enabling the forensic study of application-level encrypted data in Android via a Frida-based decryption framework

C Anglano, M Canonico, A Cepollina… - Proceedings of the 18th …, 2023 - dl.acm.org
The forensic study of mobile apps that use application-level encryption requires the
decryption of the data they generate. Such a decryption requires the knowledge of the …

A study on vulnerability of the Wickr login system in windows from a live forensics perspective

G Kim, S Kang, U Hur, J Kim - Computers & Security, 2024 - Elsevier
Secure instant messengers employ various techniques to ensure secure communication for
users, such as eavesdropping denial, data leakage prevention, and privacy protection …

Exploring the intersection between databases and digital forensics

DB Seufitelli, MA Brandão, MM Moro - Journal of Information and …, 2022 - sol.sbc.org.br
Digital forensics has attracted attention from assorted researchers, who primarily work on
predicting and solving digital hacks and crimes. In turn, the number and types of digital …

Mobile Forensic for Body Shaming Investigation Using Association of Chief Police Officers Framework

Y Safitri, I Riadi, S Sunardi - MATRIK: Jurnal …, 2023 - journal.universitasbumigora.ac.id
Body shaming is the act of making fun of or embarrassing someone because of their
appearance, including the shape or form of their body. Body shaming can occur directly or …

Multimedia Distribution Process Tracking for Android and iOS

YM Jeon, WM Heo, JM Kim, K Kim - arXiv preprint arXiv:2304.03848, 2023 - arxiv.org
The crime of illegally filming and distributing images or videos worldwide is increasing day
by day. With the increasing penetration rate of smartphones, there has been a rise in crimes …

Disappearing Messages: Privacy or Piracy?

AM Mac Dermott, H Heath… - CONF-IRM 2022 …, 2022 - researchonline.ljmu.ac.uk
The Telegram instant messenger application is a rival and alternative to the popular
messaging application WhatsApp, with both applications citing end-to-end encryption for …