Abstract

Short Review

Forensic Analysis of WhatsApp: A Review of Techniques, Challenges, and Future Directions

Nishchal Soni*

Published: 18 June, 2024 | Volume 8 - Issue 1 | Pages: 019-024

WhatsApp, a widely used instant messaging application, has become a valuable source of digital evidence in forensic investigations. This review article explores the forensic analysis techniques, challenges, and future directions associated with WhatsApp. It covers the extraction and analysis of data from various sources, including mobile devices, cloud backups, and network traffic. The article discusses the challenges faced by forensic examiners, such as encryption, data volatility, and the need for proper validation of tools. It also highlights the importance of keeping up with the latest updates and changes in WhatsApp’s features and security measures. The future directions for WhatsApp forensics are explored, focusing on the development of more advanced and efficient analysis techniques, the need for standardization, and the importance of international cooperation in addressing cross-border investigations. This review provides insights for forensic examiners, researchers, and legal professionals involved in cases requiring WhatsApp evidence.

Read Full Article HTML DOI: 10.29328/journal.jfsr.1001059 Cite this Article Read Full Article PDF

Keywords:

WhatsApp forensics; Data extraction techniques; Encryption challenges; Forensic tool validation; Social media forensics

References

  1. About WhatsApp. 2021. https://www.whatsapp.com/about/
  2. Anglano C. Forensic analysis of WhatsApp Messenger on Android smartphones. Dig Investig. 2014; 11(3):201-213.
  3. Barmpatsalou K, Cruz T, Monteiro E, Simoes P. Current and future trends in mobile device forensics: A survey. ACM Comput Surv. 2018; 51(3):1-31.
  4. Walnycky D, Baggili I, Marrington A, Moore J, Breitinger F. Network and device forensic analysis of Android social-messaging applications. Dig Investig. 2015;14
  5. .Satrya GB, Daely PT, Shin SY. Android forensics analysis: Private chat on social messenger. In: 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN). 2016; 430-435.
  6. Gregorio J, Gardel A, Alarcos B. Forensic analysis of Telegram Messenger for Windows Phone. Dig Investig. 2017; 22:88-106.
  7. Zhang X, Baggili I, Breitinger F. Breaking into the vault: Privacy, security and forensic analysis of Android vault applications. Comput Secur. 2017; 70:516-531.
  8. Faheem M, Le-Khac NA, Kechadi T. Smartphone forensic analysis: A case study for obtaining root access of an Android Samsung S3 device and analyse the image without an expensive commercial tool. J Inf Secur. 2021; 2014.
  9. Chernyshev M, Zeadally S, Baig Z, Woodward A. Mobile forensics: Advances, challenges, and research opportunities. IEEE Secur Priv. 2017; 15(6):42-51.
  10. Jiang F, Zhang K. WhatsApp forensics on iPhone. In: Digital Forensics and Cyber Crime: 9th International Conference, ICDF2C 2017, Prague, Czech Republic. Proceedings. Springer. 2017; 2016:195.
  11. Shortall A, Azhar MAHB. Forensic acquisitions of WhatsApp data on popular mobile platforms. In: 2015 Sixth International Conference on Emerging Security Technologies (EST); 2015; 13-17.
  12. Schrittwieser S, Kieseberg P, Weippl E, Holzinger A. Security and privacy in mobile devices and applications. In: Trends and Advances in Information Systems and Technologies. Springer; 2016; 767-777.
  13. About end-to-end encryption. 2021. Available from: https://faq.whatsapp.com/general/security-and-privacy/end-to-end-encryption/?lang=en
  14. Yusoff MN, Dehghantanha A, Mahmod R. Forensic investigation of social media and instant messaging services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as case studies. In: Contemporary Digital Forensic Investigations of Cloud and Mobile Applications. Syngress; 2017; 41-62.
  15. Al Mutawa N, Baggili I, Marrington A. Forensic analysis of social networking applications on mobile devices. Dig Investig. 2012; 9.
  16. .Cheng L, van Dongen BF, van der Aalst WM. Efficient event correlation over distributed systems. In: 2019 IEEE 35th International Conference on Data Engineering (ICDE); 2019; 1690-1693.
  17. Sgaras C, Kechadi MT, Le-Khac NA. Forensics acquisition and analysis of instant messaging and VoIP applications. In: Computational Forensics. Springer, Cham; 2015; 188-199.
  18. Majeed A, Zia H, Imran R, Saleem S. Forensic analysis of three social media apps in Windows 10. In: 2015 12th International Conference on High-capacity Optical Networks and Enabling/Emerging Technologies (HONET); 2015; 1-5.
  19. Karpisek F, Baggili I, Breitinger F. WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages. Dig Investig. 2015; 15:110-118.
  20. Anglano C. Forensic analysis of WhatsApp Messenger on Android smartphones. Dig Investig. 2014; 11(3):201-213.
  21. Thakur NS. Forensic analysis of WhatsApp on Android smartphones [dissertation]. 2013.
  22. Levendoski M, Datar T, Rogers M. Yahoo! Messenger forensics on Windows Vista and Windows 7. In: IFIP International Conference on Digital Forensics. Springer, Berlin, Heidelberg; 2014; 317-329.
  23. Majeed A, Zia H, Imran R, Saleem S. Forensic analysis of three social media apps in Windows 10. In: 2015 12th International Conference on High-capacity Optical Networks and Enabling/Emerging Technologies (HONET); 2015; 1-5.
  24. Mehrotra S, Mehtre BM. Forensic analysis of Wickr application on Android devices. In: 2013 IEEE International Conference on Computational Intelligence and Computing Research (ICCICR); 2013; 1-6.
  25. Satrya GB, Daely PT, Nugroho MA. Digital forensic analysis of Telegram Messenger on Android devices. In: 2016 International Conference on Information & Communication Technology and Systems (ICTS); 2016; 1-7.
  26. Jain A, Chhabra GS. Anti-forensics techniques: An analytical review. In: 2014 Seventh International Conference on Contemporary Computing (IC3); IEEE. 2014; 412-418.
  27. Meffert C, Baggili I, Breitinger F. Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition. In: Proceedings of the 12th International Conference on Availability, Reliability and Security; 2016; 1-11.
  28. Lukáš J, Fridrich J, Goljan M. Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensics Secur. 2006; 1(2):205-214.
  29. Chu HC, Deng DJ, Park JH. Live data mining concerning social networking forensics based on a Facebook session through aggregation of social data. IEEE J Sel Areas Commun. 2011; 29(7):1368-1376.
  30. Al Mutawa N, Al Awadhi I, Baggili I, Marrington A. Forensic artifacts of Facebook's instant messaging service. In: 2011 International Conference for Internet Technology and Secured Transactions; IEEE. 2011; 771-776.
  31. WhatsApp Encryption Overview. 2021. https://www.whatsapp.com/security/WhatsApp-Security-Whitepaper.pdf
  32. Carvey H. Windows forensic analysis toolkit: Advanced analysis techniques for Windows 8. Elsevier; 2014.
  33. Casey E. Digital evidence and computer crime: Forensic science, computers, and the internet. Academic Press; 2011.
  34. Kobeissi N, Bhargavan K, Blanchet B. Automated verification for secure messaging protocols and their implementations: A symbolic and computational approach. In: 2017 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE. 2017 Mar; 435-450.
  35. Vaziripour E, Wu J, O'Neill M, Metro D, Cockrell J, Moffett T, Seamons K, et al. Action needed! Helping users find and complete the authentication ceremony in signal. In: Proceedings of the Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019); 2019 May.
  36. Nguyen TT, Dinh HT, Huynh HA. WhForensics: a forensics tool for WhatsApp. In: 2019 6th NAFOSTED Conference on Information and Computer Science (NICS). IEEE. 2019 Nov; 541-546.
  37. Martini B, Do Q, Choo KKR. Mobile cloud forensics: An analysis of seven popular Android apps. arXiv preprint arXiv:1506.05533. 2015.
  38. Zhang X, Baggili I, Breitinger F. Breaking into the vault: Privacy, security and forensic analysis of Android vault applications. Comput Secur. 2017; 70:516-531.
  39. Walnycky D, Baggili I, Marrington A, Moore J, Breitinger F. Network and device forensic analysis of Android social-messaging applications. Dig Investig. 2015;14
  40. .Barmpatsalou K, Damopoulos D, Kambourakis G, Katos VA critical review of 7 years of Mobile Device Forensics. Dig Investig. 2013; 10(4):323-349.
  41. Ayers R, Brothers S, Jansen W. Guidelines on mobile device forensics (NIST Special Publication 800-101 Revision 1). National Institute of Standards and Technology. 2014.
  42. Anglano C. Forensic analysis of WhatsApp Messenger on Android smartphones. Dig Investig. 2014; 11(3):201-213.
  43. Gregorio J, Gardel A, Alarcos B. Forensic analysis of Telegram Messenger for Windows Phone. Dig Investig. 2017; 22:88-106.

Figures:

Similar Articles

Recently Viewed

Read More

Most Viewed

Read More

Help ?