Forensic Data Recovery from Android Smart Watches
- Authors
- Anda Basabe, F?lix
- Format
- MasterThesis
- Status
- publishedVersion
- Description
Forensically sound methods for data acquisition in Android based devices are discussable because of the complexity of obtaining data without modifying any state of the wearable. Obtaining relevant data from a smart watch that could be used as digital evidence due to its probative value will lead to the emerge of guidelines for good practices. The recollection of data and analysis of potential evidence is limited to rooted and non-rooted Smartwatches with Android Wear. The di?erent approaches to extract data depend on the level of intrusion and destruction. Intrusive, Non-Intrusive and Destructive methodologies were applied and according to the results regarding forensic soundness, the nonintrusive data extraction was better than the Intrusive data extraction. The ?reverse engineering? of AFLogical allowed the creation of a wearable forensic application that is able to extract data by making queries on the available content providers for the wearable device. Rooting the watch would require to unlock the bootloader in most cases and wipe the data due to android security measures concerning privacy. The usage of wearable gadgets are prone to di?erent attacks that can leak our information and invade our privacy. Several attacker capabilities are identified in the threat model and are addressed to raise awareness. With the coming of disposable computers, the risk of being attacked will notably increase. Bluetooth packet sniffing was accomplished both with kismet and wireshark and plain text messages of di?erent messaging platforms were retreived.
- Publication Year
- 2016
- Language
- eng
- Topic
- ANDROID
COMPUTACI?N FORENSE
RELOJES INTELIGENTES
SEGURIDAD INFORM?TICA
- Repository
- Repositorio SENESCYT
- Rights
- openAccess
- License
- openAccess