2013
DOI: 10.12720/jcm.8.11.708-715
|View full text |Cite
|
Sign up to set email alerts
|

Social Networks IM Forensics: Encryption Analysis

Abstract: Al Barghuthi's teaching interests are computer information security, network and internet security. Her research interests include cyber forensics, mobile forensics, information security, computer networking, internet security, digital forensics, small scale digital forensics, database systems and security. She has published several conference papers in small scale digital devices forensics. She has published several peer-reviewed papers in journals and conferences.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 26 publications
(12 citation statements)
references
References 9 publications
0
12
0
Order By: Relevance
“…Messenger, and Google Talk) on the iOS platform. (Al Barghuthi and Said, 2013) presents the analysis of several IM applications on various smartphone platforms, aimed at identifying the encryption algorithms used by them. (Tso et al, 2012) discusses the analysis of iTunes backups for iOS devices aimed at identifying the artifacts left by various social network applications.…”
Section: Related Workmentioning
confidence: 99%
“…Messenger, and Google Talk) on the iOS platform. (Al Barghuthi and Said, 2013) presents the analysis of several IM applications on various smartphone platforms, aimed at identifying the encryption algorithms used by them. (Tso et al, 2012) discusses the analysis of iTunes backups for iOS devices aimed at identifying the artifacts left by various social network applications.…”
Section: Related Workmentioning
confidence: 99%
“…Their work differs from ours for both the IM applications and the smartphone platform it considers. [2] focus on the analysis of several IM applications (including WhatsApp Messenger) on various smartphone platforms, including Android, with the aim of identifying the encryption algorithms used by them. Their work, unlike ours, does not deal with the identification, analysis, and correlation of all the artifacts generated by WhatsApp Messenger.…”
Section: Related Workmentioning
confidence: 99%
“…The CelleBrite UFED tool, on the other hand, facilitated the recovery of SMS/MMS messages, call logs, videos, photos, and contact information. In [13] authors undertook a study seeking to establish adaptable encryption standards to hide communication on instant messaging apps purposing to secure the exchanged message. These include symmetric and asymmetric algorithms.…”
Section: Related Workmentioning
confidence: 99%