2018 Eleventh International Conference on Contemporary Computing (IC3) 2018
DOI: 10.1109/ic3.2018.8530576
|View full text |Cite
|
Sign up to set email alerts
|

Network Forensics Analysis of iOS Social Networking and Messaging Apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…Various researchers conduct network forensics for several reasons. Some of the most prominent reasons for conducting network forensics on social media applications include (1) traffic characterization [43,70,74,75], (2) traffic decryption [71], and lastly, (3) recovering artifacts [39][40][41][42]45,72,73], as shown in Table 4.…”
Section: Network Analysis Focusmentioning
confidence: 99%
See 1 more Smart Citation
“…Various researchers conduct network forensics for several reasons. Some of the most prominent reasons for conducting network forensics on social media applications include (1) traffic characterization [43,70,74,75], (2) traffic decryption [71], and lastly, (3) recovering artifacts [39][40][41][42]45,72,73], as shown in Table 4.…”
Section: Network Analysis Focusmentioning
confidence: 99%
“…Furthermore, legal considerations often place Android devices at the center of criminal cases, necessitating the continuous development of expertise in Android device analysis. However, with the increasing popularity of iOS devices, more attention is being given to the iOS platform [42,68,73]. It is also interesting to note that in mobile platforms such as Blackberry, no traces of evidence could be recovered, making it a very secure platform [7,66].…”
Section: Trends In Social Media Forensicsmentioning
confidence: 99%
“…Similarly, Jadhav Bhatt et al [17] conducted a network forensic analysis of iOS social networking and messaging apps to understand the types of user data that the apps were sending and to study the runtime behavior of these apps, drawing attention to the lesser known security flaws of many of the apps studied. The methodology involves using Charles proxy and Wireshark on a Mac workstation to capture the communication between an iPad running iOS 11.2.6 and the network and analyzing the traffic on a Windows workstation.…”
Section: Literature Reviewmentioning
confidence: 99%
“…None of the detected applications are available in public app stores in Germany and, consequently, they are not included in the further analyses. The remaining seven publications deal with the distantly related topic of the impact of warning detection apps on driver behavior (Botzer et al, 2017;Payre & Diels, 2020), and the following foreign topics: service provider communication (Chen et al, 2017), hotspot detection via smartphones (Cuenca et al, 2018), an app for safely texting-while-walking in indoor environments (Huang, 2017), network forensics analysis of iOS social networking and messaging apps (Bhatt et al, 2018) and the design of driver safety UI (Lee & Lee, 2018). These projects are not further analyzed.…”
Section: Classification Of Warning Appsmentioning
confidence: 99%