2023
DOI: 10.51662/jiae.v3i1.70
|View full text |Cite
|
Sign up to set email alerts
|

Identification of Whatsapp Digital Evidence on Android Smartphones using The Android Backup APK (Application Package Kit) Downgrade Method

Deny Sulisdyantoro,
Marza Ihsan Marzuki

Abstract: The use of WhatsApp for actions that lead to unlawful acts is a serious matter that needs to be proven in court. Android and the WhatsApp messaging application continue to update their features and security to provide maximum service and protection to its users, such as the WhatsApp database encryption using crypt14. With crypt14 encryption on the WhatsApp database, investigations of WhatsApp digital evidence against Electronic Evidence (BBE) require an acquisition and extraction method to identify artefacts r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…These studies have yielded valuable insights into call metadata including the timestamp, duration, and IP address used during calls. In recent research endeavors, two studies, [23] focused on the Identification of WhatsApp Digital Evidence on Android Smartphones using The Android Backup Application Package Kit (APK) Downgrade Method, and [24] aimed at Enabling the forensic study of applicationlevel encrypted data in Android via a Frida-based decryption framework. Both studies present methodologies for extracting artifacts from mobile devices, with a caveat that physical device access is mandatory, and the analysis is limited to a single application within the Android platform.…”
Section: Related Workmentioning
confidence: 99%
“…These studies have yielded valuable insights into call metadata including the timestamp, duration, and IP address used during calls. In recent research endeavors, two studies, [23] focused on the Identification of WhatsApp Digital Evidence on Android Smartphones using The Android Backup Application Package Kit (APK) Downgrade Method, and [24] aimed at Enabling the forensic study of applicationlevel encrypted data in Android via a Frida-based decryption framework. Both studies present methodologies for extracting artifacts from mobile devices, with a caveat that physical device access is mandatory, and the analysis is limited to a single application within the Android platform.…”
Section: Related Workmentioning
confidence: 99%