Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

August Edition 2019

International Journal of Applied Information Systems solicits high quality original research papers for the July 2019 Edition of the journal. The last date of research paper submission is July 15, 2019.

Security Vulnerabilities of Skype Application Artifacts: A Digital Forensic Approach

S. Idowu, Ehiwe D. Dominic, S. O. Okolie, N. Goga in Security

International Journal of Applied Information Systems
Year of Publication: 2019
Publisher: Foundation of Computer Science (FCS), NY, USA
Authors:S. Idowu, Ehiwe D. Dominic, S. O. Okolie, N. Goga
10.5120/ijais2019451784
Download full text
  1. S Idowu, Ehiwe D Dominic, S O Okolie and N Goga. Security Vulnerabilities of Skype Application Artifacts: A Digital Forensic Approach. International Journal of Applied Information Systems 12(18):5-10, January 2019. URL, DOI BibTeX

    @article{10.5120/ijais2018451784,
    	author = "S. Idowu and Ehiwe D. Dominic and S. O. Okolie and N. Goga",
    	title = "Security Vulnerabilities of Skype Application Artifacts: A Digital Forensic Approach",
    	journal = "International Journal of Applied Information Systems",
    	issue_date = "January, 2019",
    	volume = 12,
    	number = 18,
    	month = "January",
    	year = 2019,
    	issn = "2249-0868",
    	pages = "5-10",
    	url = "http://www.ijais.org/archives/volume12/number18/1046-2018451784",
    	doi = "10.5120/ijais2018451784",
    	publisher = "Foundation of Computer Science (FCS), NY, USA",
    	address = "New York, USA"
    }
    

Abstract

Social network platforms and apps have gained popularity partly because of the ease by which users are able to sign up on the platform. This is in addition to the open source nature of majority of these software applications. By making use of these social network platforms and applications, users consent to the disclosure of information that may be used to recreate their profile, to reconstruct events that have taken place, and provide most times geo-location information that can be used to track or trace participants. In this study, presentation of the potential security vulnerabilities that can be associated with the digital artifacts harvested from Skype, a social network app in use by millions of subscribers worldwide is made. The study methodology involved set up of a forensic workstation for the acquisition and examination of the digital artifacts obtained from Skype application installed on a test Infinix HotNote Smartphone running Android OS version 5.5 that was utilized for this study. Following the National Institute of Science & Technology (NIST) guideline, the chain-of-custody of the performed activities was documentation. A key finding of this study indicates the acquired and examined stored user data and other metadata information are stored in plain and clear text formats. The security implication for this is significant as the ease or potential for a cyber-criminal activity becomes heightened. Therefore, the implementation of a robust and secure data encryption standard for protecting stored user records is recommended. While there are different types of encryption algorithms that may be utilized for achieving user security and privacy requirements, the decision to enforce any of the known standards can be taken following global application security standards for implementing security of software applications.

Reference

  1. Al Muttawa, N., Al Awadhi, I., Baggili, I., & Marrington, A. ” Forensic artifacts of Facebook’s instant messaging service”, Internet Technology and Secured Transactions (ICITST), 2011 International Conference for (pp. 771-776). IEEE.
  2. A. Mahajan, M. Dahiya, and H. Sanghvi, “Forensic Analysis of Instant Messenger Applications on Android Devices,” International Journal of Computer Applications, vol. 68, no. 8, pp. 38–44, 2013
  3. Al Muttawa, N., Baggili, I., & Marrington, A. ” Forensic analysis of social networking applications on mobile devices”, 2012, Digital Investigation, 9, S24-S33.
  4. C. Carpene, “Looking to iPhone backup files for evidence extraction,” in Proceedings of the 9th Australian Digital Forensics Conference, 2011, pp. 16–32.
  5. H. Chu, S. Yang, S. Wang, and J. Park, “The Partial Digital Evidence Disclosure in Respect to the Instant Messaging Embedded in Viber Application Regarding an Android Smart Phone,” in Proceedings of the 4th FTRA International Conference on Information Technology Convergence and Services (ITCS-12), 2012, pp. 171–178.
  6. M. Kiley, S. Dankner, and M. Rogers, “Forensic Analysis of Volatile Instant Messaging,” in in Advances in Digital Forensics IV, vol. 285, 2008, pp. 129–138.
  7. The Register, “Italian crooks use Skype to frustrate wiretaps,” 2009.
  8. Europol, “Threat Assessment - Italian organised crime,” 2013.

Keywords

Security vulnerabilities, Digital artifacts, Encryption, Metadata, Algorithms