Repository logo
  • Log In
    New user? Click here to register.Have you forgotten your password?
University College Dublin
    Colleges & Schools
    Statistics
    All of DSpace
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Institutes and Centres
  3. Insight Centre for Data Analytics
  4. Insight Research Collection
  5. Forensic Acquisition and Analysis of Tango VoIP
 
  • Details
Options

Forensic Acquisition and Analysis of Tango VoIP

Author(s)
Le-Khac, Nhien-An  
Sgaras, Christos  
Kechadi, Tahar  
Uri
http://hdl.handle.net/10197/6497
Date Issued
2014-07-18
Date Available
2015-04-20T11:22:55Z
Abstract
The advent of the Internet has significantly transformed the daily activities of millions of people, with one of them being the waypeople communicate where Instant Messaging (IM) and Voice over IP (VoIP) communications have become prevalent. AlthoughIM applications are ubiquitous communication tools nowadays, it was observed that the relevant research on the topic ofevidence collection from IM services was limited. The reason is an IM can serve as a very useful yet very dangerous platform forthe victim and the suspect to communicate. Indeed, the increased use of Instant Messengers on smart phones has turned to be thegoldmine for mobile and computer forensic experts. Traces and Evidence left by applications can be held on smart phones andretrieving those potential evidences with right forensic technique is strongly required. Recently, most research on IM forensicsfocus on applications such as WhatsApp, Viber and Skype. However, in the literature, there is no forensic analysis related toTango, an IM on both iOS and Android platforms, even though the total users of this application already exceeded 100 million.Therefore, in this paper we present forensic acquisition and analysis of Tango VoIP for both iOS and Android platforms. We tryto answer on how evidence can be collected when IM communications are used. We also define taxonomy of target artefacts inorder to guide and structure the subsequent forensic analysis. Additionally to the forensic analysis, alternative sources ofevidence were examined such as the possibility to clone an IM session and perform communication interception. Finally, areview of the information that can become available via the IM vendor was conducted. The achieved results of this researchprovided elaborative answers on the types of artefacts that can be identified by this IM application. We compare moreover theforensics analysis of Tango with two other popular IM: WhatApp and Viber.
Sponsorship
Science Foundation Ireland
Type of Material
Conference Publication
Subjects

Machine learning

Statistics

Web versions
http://www.iieng.org/2014/07/19/49
Language
English
Status of Item
Peer reviewed
Conference Details
International Conference on Challenges in IT, Engineering and Technology (ICCIET 2014), Phuket, Thailand, 17-18 July 2014
This item is made available under a Creative Commons License
https://creativecommons.org/licenses/by-nc-nd/3.0/ie/
File(s)
Loading...
Thumbnail Image
Name

insight_publication.pdf

Size

477.36 KB

Format

Adobe PDF

Checksum (MD5)

7c30f5a71a8b57bd13da5186509d86da

Owning collection
Insight Research Collection
Mapped collections
Computer Science Research Collection

Item descriptive metadata is released under a CC-0 (public domain) license: https://creativecommons.org/public-domain/cc0/.
All other content is subject to copyright.

For all queries please contact research.repository@ucd.ie.

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Cookie settings
  • Privacy policy
  • End User Agreement