“Playing Hide-and-Seek: Detecting the Manipulation of Android Timestamps”

Pieterse, Olivier, and van Heerden

2015

Citation information

H. Pieterse, M. S. Olivier, and R. van Heerden. “Playing Hide-and-Seek: Detecting the Manipulation of Android Timestamps”. In: ISSA 2015 — 14th International Information Security for South Africa Conference. In press. Johannesburg, South Africa, Aug. 2015

Abstract

Mobile technology continues to evolve in the 21st century, providing users with improved capabilities and advance functionality. One of the leaders of this evolution is Android, a mobile operating system that continuously elevates existing features and offers new applications. Such improvements allowed Android to gain popularity worldwide. A combination of Androids advance technology and increasing popularity allow smartphones supporting this operating system to become a rich source of trace evidence. Traces found on Android smartphones form a significant part of digital investigations, especially when the user of the smartphone is involved in criminal activities. A key component of these traces is the date and time, often formed as timestamps. These timestamps allow the examiner to relate the traces found on Android smartphones to some real event that took place. Knowing when events occurred in digital investigations is of great importance to the overall success of the investigation. This paper introduces a new solution, called the Authenticity Framework for Android Timestamps (AFAT) that establishes the authenticity of timestamps found on Android smartphones. Currently the framework determines the authenticity of timestamps found in SQLite databases by following two individual methods. The first method identifies the presence of certain changes in the Android file system, which are indications of the manipulation of the SQLite databases. The second method subsequently focuses on the individual SQLite databases and the identification of inconsistencies in these databases. The presence of specific file system changes as well as inconsistencies in the associated SQLite databases indicates that authenticity of the timestamps might be compromised. The results presented in the paper provide preliminary evidence that the suggested approach, Authenticity Framework for Android Timestamps, shows potential.

BibTeX reference

@inproceedings(andrtime,
author={Heloise Pieterse and Martin S Olivier and Renier van Heerden},
title={Playing Hide-and-Seek: Detecting the Manipulation of Android Timestamps},
booktitle={ISSA 2015 --- 14th International Information Security for South Africa Conference},
address={Johannesburg, South Africa},
month=aug,
year={2015},
note={In press} )


[Publications] [Home]
Page maintained by Martin Olivier
Database updated: November 8, 2015

Beta version of new bibliography database; please report errors (or copyright violations) that may have slipped in.