Files

PDF

HOW TO CITE

FORENSIC ANALYSIS OF ENCRYPTED ANDROID AND iOS APPLICATIONS: A MULTI-LAYER INVESTIGATION FRAMEWORK WITH STATISTICAL VALIDATION
Authors (Affiliation): PRAVEEN BADAMI (Smt. Kumudben Darbar College of Commerce, Science & Management StudiesVijayapura, Karnataka, India)
DoI: https://doi.org/10.69490/jcsdf8020260213
Abstract:

Abstract - Encrypted messaging platforms such as WhatsApp, Signal, and Telegram protect user confidentiality but introduce major challenges for mobile device forensic investigations. Modern smartphones enforce strict sandbox policies, encrypted databases, secure storage modules like Apple Secure Enclave and Android TEE, and data-at-rest encryption schemes including SQLCipher. This research proposes a Multi-Layer Mobile Forensic Investigation Framework (ML-MFIF) integrating acquisition strategy evaluation, encrypted database analysis, metadata reconstruction, and machine-learning-based statistical validation using a synthetic forensic dataset. Results demonstrate that physical acquisition yields a 31 percentage point higher artifact recovery rate compared to logical acquisition (84% vs. 53%). WhatsApp provides the highest recoverability (78% success), followed by Telegram (62%) and Signal (39%). The proposed model assists examiners in predicting evidence accessibility and prioritizing forensic workflows in encrypted environments.

Keywords: Machine Learning, Keywords — Mobile Device Forensics, Encrypted Messaging, iOS Forensics, Android Forensics, TEE, Secure Enclave, SQLCipher, Forensic Framework.
Vol & Issue: VOL.3, ISSUE No.2, December 2024