Analisa dan Perbandingan Performa Tools Forensik Digital pada Smartphone Android menggunakan Instant Messaging Whatsapp
DOI:
https://doi.org/10.30865/mib.v6i1.3487Keywords:
Instan Messaging, Cybercrime, Whatsapp, MOBILedit, Oxygen ForensicAbstract
Technology services are currently developing rapidly, one of the services that rapidly increased is the development of Instant messaging (IM) technology which is increasingly sophisticated and cannot be separated from people's lives. However, the use of this technology is not always about activities that have a good impact but are also vulnerable to being used as a medium to do harmful things. One of the things that have a detrimental impact that often occurs is cybercrime by utilizing Instant messaging (IM) applications. One of the IM platforms that is often used as a media for cybercrime is WhatsApp. The message deletion feature can be one of the feature that uses criminals to hide evidence of a crime. Therefore, a digital forensic protocol is needed that can help the authorities to uncover evidence of crimes that have been tried to eliminate by criminals. Therefore, this study raises the issue of research utilizing the Whatsapp platform using two tools, namely MOBILedit and Oxygen Forensic. The final result of this research is a method and tool recommendation that can be the best alternative for digital forensics needs.References
G. Cornelis, R. Seelt, and N. Le-khac, “Forensic Science International : Digital Investigation Forensic analysis of Matrix protocol and Riot . im application,†Forensic Sci. Int. Digit. Investig., vol. 36, p. 301118, 2021.
D. Wijnberg and N. Le-khac, “Forensic Science International : Digital Investigation Identifying interception possibilities for WhatsApp communication,†Forensic Sci. Int. Digit. Investig., vol. 38, p. 301132, 2021.
C. Anglano, “Forensic analysis of whats app messenger on Android smartphones,†Digit. Investig., vol. 11, no. 3, pp. 201–213, 2014.
S. J. Yang, J. H. Choi, K. B. Kim, R. Bhatia, B. Saltaformaggio, and D. Xu, “Live acquisition of main memory data from Android smartphones and smartwatches,†Digit. Investig., vol. 23, pp. 50–62, 2017.
A. Fukami, R. Stoykova, and Z. Geradts, “A new model for forensic data extraction from encrypted mobile devices,†Forensic Sci. Int. Digit. Investig., vol. 38, p. 301169, 2021.
N. Dwi, W. Cahyani, D. Ph, K. R. Choo, and D. Ph, “DIGITAL & MULTIMEDIA SCIENCES An Evidence-based Forensic Taxonomy of Windows Phone Dating Apps,†no. 7, 2018.
G. Humphries, R. Nordvik, H. Manifavas, P. Cobley, and M. Sorell, “Law Enforcement educational challenges for mobile forensics,†Digit. Investig., vol. 38, p. 301129, 2021.
T. Holt and D. S. Dolliver, “Forensic Science International : Digital Investigation Exploring digital evidence recognition among front-line law enforcement of fi cers at fatal crash scenes,†Forensic Sci. Int. Digit. Investig., vol. 37, p. 301167, 2021.
E. Gentry and M. Soltys, “SEAKER: A mobile digital forensics triage device,†Procedia Comput. Sci., vol. 159, pp. 1652–1661, 2019.
G. Kim, M. Park, S. Lee, Y. Park, I. Lee, and J. Kim, “Forensic Science International : Digital Investigation A study on the decryption methods of telegram X and BBM-Enterprise databases in mobile and PC,†Forensic Sci. Int. Digit. Investig., vol. 35, p. 300998, 2020.
G. Kim, S. Kim, M. Park, Y. Park, I. Lee, and J. Kim, “Forensic Science International : Digital Investigation Forensic analysis of instant messaging apps : Decrypting Wickr and private text messaging data,†Forensic Sci. Int. Digit. Investig., vol. 37, p. 301138, 2021.
I. Riadi, A. Yudhana, M. Caesar, and F. Putra, “Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method,†vol. 5, no. 2, pp. 235–247, 2018.
N. Son, Y. Lee, D. Kim, J. I. James, S. Lee, and K. Lee, “A study of user data integrity during acquisition of android devices,†Proc. Digit. Forensic Res. Conf. DFRWS 2013 USA, vol. 10, pp. S3–S11, 2013.
X. Lin, T. Chen, T. Zhu, K. Yang, and F. Wei, “Automated forensic analysis of mobile applications on Android devices,†Digit. Investig., vol. 26, pp. S59–S66, 2018.
G. Grispos, T. Storer, and W. B. Glisson, “A comparison of forensic evidence recovery techniques for a windows mobile smart phone,†Digit. Investig., vol. 8, no. 1, pp. 23–36, 2011.
A. Fukami and K. Nishimura, “Forensic analysis of water damaged mobile devices,†Digit. Investig., vol. 29, pp. S71–S79, 2019.
M. Guido, J. Buttner, and J. Grover, “Rapid differential forensic imaging of mobile devices,†DFRWS 2016 USA - Proc. 16th Annu. USA Digit. Forensics Res. Conf., vol. 18, pp. S46–S54, 2016.
P. Sharma, D. Arora, and T. Sakthivel, “Enhanced Forensic Process for Improving Mobile Cloud Traceability in Cloud-Based Mobile Applications,†Procedia Comput. Sci., vol. 167, no. 2019, pp. 907–917, 2020.
J. Grover, “Android forensics: Automated data collection and reporting from a mobile device,†Proc. Digit. Forensic Res. Conf. DFRWS 2013 USA, vol. 10, pp. S12–S20, 2013.
J. Park, Y. H. Jang, and Y. Park, “New flash memory acquisition methods based on firmware update protocols for LG Android smartphones,†Digit. Investig., vol. 25, pp. 42–54, 2018.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).