PAZIIM DIGITAL EVIDENCE ANALYSIS APPLICATION ON ANDROID SMARTPHONES WITH A LOGICAL ACQUISITION APPROACH
Keywords:mobile forensic, paziim, logical acquisition, social media forensic, android debug bridge
AbstractThe use of social media in Indonesia has increased very rapidly in 2018 compared to the previous year. This makes a lot of social media made by the children of the nation appear, one of which is Paziim. Socializing on the internet is very easy to leak personal data. There are three aspects that can be utilized on online social networks (OSN) in the disclosure of private data to the public, namely the strength of the relationship (strong or weak), the type of relationship and the characteristics of one's habits. Mobile forensics is needed to analyze digital evidence on social media applications installed on Android smartphones. Indonesia through the National Standardization Agency (BSN) also issued standards related to digital forensics. Standards which are derived from ISO / IEC regulate Security Techniques - Guidelines for the Identification, Collection, Acquisition and Preservation of Digital Evidence. This standardization is known as SNI ISO / IEC 27037: 2014. From the results of cell phone forensic analysis on the Paziim application, the results found the username, coordinates, device models, and operators used by users in SQLite Web_Data and OneSignal.xml files
We Are Social dan Hootsuite, “2018 Q2 Global Digital Statshot,” 2018.
We Are Social dan Hootsuite, “Indonesia Digital 2019,” 2019.
I. Y. Pasa, “Analisis Pengembangan Fitur Obrolan Baru Berbasis Scan QR Code pada Aplikasi Paziim,” in The 9th University Research Colloqium 2019, 2019.
J. J. Drake, P. O. Fora, Z. Lanier, C. Mulliner, S. A. Ridley, dan G. Wicherski, Android Hackers’s Handbook, 1 Edition. Wiley, 2014.
D. Hariyadi dan A. A. Huda, “Laron: Aplikasi Akuisisi Berbasis SNI 27037:2014 pada Ponsel Android,” Indonesia Security Conference 2015. Cirebon, hal. 1–10, 2015.
A. Umair, P. Nanda, dan X. He, “Online Social Network Information Forensics: A survey on use of various tools and determining how cautious facebook users are?,” in Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, 2017, hal. 1139–1144.
B. Raharjo, “Sekilas Mengenai Forensik Digital,” J. Sosioteknologi, vol. 12, no. 29, hal. 384–387, Agu 2013.
H. Bidgoli, Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations, Volume 2. California: John Wiley & Sons, Inc., 2006.
D. Hariyadi, “Bermain dengan Forensik Digital,” 2014. [Daring]. Tersedia pada: https://milisdad.blogspot.com/2014/05/bermain-dengan-forensik-digital.html. [Diakses: 26-Mei-2014].
S. Dogan dan E. Akbal, “Analysis of Mobile Phones in Digital Forensics,” 2017 40th Int. Conv. Inf. Commun. Technol. Electron. Microelectron. MIPRO 2017 - Proc., hal. 1241–1244, 2017.
M. N. Al-Azhar, Digital Forensic: Panduan Praktis Investigasi Komputer. Jakarta: Salemba Infotek, 2012.
R. Ayers, S. Brothers, dan W. Jansen, “NIST Special Publication 800-101 Revision 1: Guidelines on Mobile Device Forensics,” Gaithersburg, MD, Mei 2014.
S. Kurniawan, “Perancangan Prosedur Operasional Standar Penanganan Alat Bukti Digital: Studi Kasus Kementerian Komunikasi dan Informatika,” Universitas Indonesia, 2014.
M. Faheem, N.-A. Le-Khac, dan T. Kechadi, “Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial Tool,” J. Inf. Secur., vol. 05, no. 03, hal. 83–90, 2014.
A. M. de L. Simao, F. C. Sicoli, L. P. de Melo, dan R. T. de S. Junior, “Acquisition of digital evidence in android smartphones,” Aust. Digit. Forensics Conf., no. December, 2011.
Svein Y. Willassen, "Forensic analysis of mobile phone internal memory," in Advances in Digital Forensics .. Springer, 2005, ch. 16, pp.191-204.
"AT COMMAND SET HILO 3G," SAGEMCOM, Rueil-Malmaison, Frane, Tech. Rep URDI - OTL 5696.1 -006/ 72370 Edition 02, 2011.
K. A. Alghafli, A. Jones, T. A. Martin, “Forensics Data Acquisition Methods for Mobile Phones”, The 7th ICITST, 2012
Association of Chief Police Officer, “ACPO Good Practice Guide for Digital Evidence,” 2012.
I. Y. Pasa dan D. Hariyadi, “Identifikasi Barang Bukti Percakapan Aplikasi Dual Apps Whatsapp Pada Ponsel Xiaomi Menggunakan Metode NIST Mobile Forensic,” J. INTEK Univ. Muhammadiyah Purworejo, vol. 1, hal. 1–7, 2018.
How to Cite
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Under the following terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.