Forensic Data Recovery from Android Smart Watches

 

Authors
Anda Basabe, F?lix
Format
MasterThesis
Status
publishedVersion
Description

Forensically sound methods for data acquisition in Android based devices are discussable because of the complexity of obtaining data without modifying any state of the wearable. Obtaining relevant data from a smart watch that could be used as digital evidence due to its probative value will lead to the emerge of guidelines for good practices. The recollection of data and analysis of potential evidence is limited to rooted and non-rooted Smartwatches with Android Wear. The di?erent approaches to extract data depend on the level of intrusion and destruction. Intrusive, Non-Intrusive and Destructive methodologies were applied and according to the results regarding forensic soundness, the nonintrusive data extraction was better than the Intrusive data extraction. The ?reverse engineering? of AFLogical allowed the creation of a wearable forensic application that is able to extract data by making queries on the available content providers for the wearable device. Rooting the watch would require to unlock the bootloader in most cases and wipe the data due to android security measures concerning privacy. The usage of wearable gadgets are prone to di?erent attacks that can leak our information and invade our privacy. Several attacker capabilities are identified in the threat model and are addressed to raise awareness. With the coming of disposable computers, the risk of being attacked will notably increase. Bluetooth packet sniffing was accomplished both with kismet and wireshark and plain text messages of di?erent messaging platforms were retreived.

Publication Year
2016
Language
eng
Topic
ANDROID
COMPUTACI?N FORENSE
RELOJES INTELIGENTES
SEGURIDAD INFORM?TICA
Repository
Repositorio SENESCYT
Get full text
http://repositorio.educacionsuperior.gob.ec/handle/28000/4257
Rights
openAccess
License
openAccess