Forensics Analysis of Dcard Application on Android Smartphone
Journal Title: Scholars Journal of Engineering and Technology - Year 2017, Vol 5, Issue 11
Abstract
Nowadays, mobile devices are considered as an important necessity in our daily lives. Mobile devices can keep us connecting with family, friends, colleagues and so on. Moreover, combining with the sprung up social networking sites, lots of people have permanently altered their way of living habits. For example, more and more new mobile devices have successfully launched in the market, people in the world can easily contact with anyone everywhere at any time. However, there are some problems we should concern. Thanks to the new technology and cyber worlds are prosperous, the mobile phones and social networking sites have become a tool or medium for perpetrators to commit a crime in recent years. As a result, the investigators should collect important evidences from all the digital devices at the crime scene, such as computer, mobile phone, tablet and so forth. In this paper, we focus on the mobile forensics of Dcard application running on the mobile phone. In the experiment, we strive to search the digital evidence that user has been done on the mobile phone. We adopt “dd” instruction to create an image file for the physical memory. The physical memory is also called non-volatile memory. The data stored in the non-volatile memory would not be vanished when the power is cutting off. Thereafter, we make use of authoritative computer forensic tools which is called FTK Imager to analyze these significant evidences and the correlation between them in detail. In addition, we also adopt SQLite editor to examine and analyze the database on the mobile phone. The analysis of experiment was performed with the aim of determining what information can be found on the device. We find that which behavior of suspect will leave what kind of evidences in the mobile phone. These findings could be an important reference for law enforcement agency to investigate a cybercrime.
Authors and Affiliations
Ching-Yu Lin, Ming-Sang Chang
Optimization of Reasonable Well Spacing for Polymer Flooding and Its Adaptability Analysis
After many years of water flooding, PuⅠ2-3 reservoirs has been in the stage of extra-high water cut, by 2016, comprehensive water cut in the study area is 92.5%.Based on watered-out log interpretation results and sealed...
Research on data synchronism model of well completion based on operation log
Synchronization is a key technology to improve the system performance of mobile database. The paper proposes a mobile data synchronous processing model which is based on operation log by relying on the mobile platform of...
Non-Homogeneous Sextic Equation with Four Unknowns
We obtain infinitely many non-zero integer quadruples(x,y,z,w) satisfying the non-homogeneous sextic equation with four unknowns. Various interesting properties among the values of x,y,z and w are presented Keywords: Sex...
Design and Implementation of an E-Learning Live Streaming Application With Audio Chat
In recent years, increased computing power, improved wireless and user-friendly technology and reduced telecommunication costs have contributed to lowering barriers to information access and exchange. The potential for u...
Experimental Investigation of Filament Wound Pressure Vessel Subjected to Internal Pressure by Finite Element Method.
Composite pressure vessels are an important type of high-pressure container that is widely used in aerospace industries. When compared with isotropic materials like steel, these pressure vessels develop hoop stresses tha...