Unit 3
Unit 3
Prepared by:
Akhila B Mukundan
• Mobile forensics is an essential subfield of digital forensics due to the central role mobile devices play in
communication and daily life.
• Investigators must be skilled in handling multiple tools, understand OS architecture (especially Android/iOS),
and follow proper legal procedures.
• With challenges like encryption and device fragmentation, mobile forensics continues to evolve with both
technological and investigative advancements.
*Device fragmentation refers to the wide variety of devices with different screen sizes, operating systems, hardware capabilities, and
manufacturer customizations that exist in the market.
Introduction – Mobile Forensics
Objectives of Mobile Forensics
• Mobile devices are central to communication and daily activities, making them rich sources of digital
evidence.
• Smartphones store vast amounts of personal and professional information.
• Criminals often use messaging apps, GPS, social media, and encrypted services - all of which leave behind
traces on mobile devices.
• Mobile forensics helps trace criminal behavior, verify alibis, uncover deleted data, and provide timeline
evidence in both civil and criminal cases.
Introduction – Mobile Forensics
Process of Mobile Forensics
Countermeasures:
• Place the device in Airplane Mode if unlocked.
• Use a Faraday bag to block network signals.
• Do not power off the device unless necessary.
Introduction – Mobile Forensics
Process of Mobile Forensics
2. Identification
• This step involves identifying the mobile device, user profile, and potential data of interest.
• Goal: Determine what type of data is stored and how it can be accessed.
Challenges:
• Devices may be locked with PINs, passwords, patterns, or biometrics.
• Fingerprint access is often easier to bypass than passcodes, which are legally protected in many
jurisdictions.
• Apps may include in-app locks, and data may be encrypted at the app, file system, or full-disk level.
Investigators must:
• Document the make, model, and OS version.
• Identify potential apps of interest (e.g., messaging, social media, banking).
• Check for encryption indicators that may affect acquisition.
Introduction – Mobile Forensics
Process of Mobile Forensics
3. Acquisition
• Acquisition involves creating a forensically sound copy of the data for analysis.
• Mobile data is volatile and can be moved, deleted, or synced with cloud platforms.
Key concerns:
• Remote deletion or modification if the device is online.
• Cloud synchronization (e.g., iCloud, Google Drive, OneDrive) allows data to exist beyond the physical device.
Investigators must:
• Determine if data is stored locally, externally (SD card), or in the cloud.
• Choose an appropriate extraction technique:
• Manual
• Logical
• Physical
• File system
• Maintain chain of custody during acquisition.
Tools like Cellebrite UFED, Magnet AXIOM, ADB, and Autopsy are used depending on access level and device type.
Introduction – Mobile Forensics
Process of Mobile Forensics
Examiners analyze:
• Call logs, messages, contacts
• App data (e.g., WhatsApp, Telegram)
• Location history and browser artifacts
• Deleted or hidden files using SQLite parsing and carving tools
Data must be analyzed contextually and chronologically, often using timelines and keyword searches.
Introduction – Mobile Forensics
Process of Mobile Forensics
5. Reporting
• The final step documents all forensic actions and findings in a clear, legally valid format.
• The forensic report acts as the official record of:
• Seizure
• Custody
• Control and transfer
• Acquisition method
• Analysis steps
• Findings and conclusions
*Espionage: Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret
or confidential information (intelligence).
Introduction – Mobile Forensics
Challenges in Mobile Forensics
*FDE
• FDE automatically encrypts data and operating systems (OSes) to prevent unauthorized access.
• Full-disk encryption was introduced to Android in 4.4, later using fast encryption from Android 5.0 which only
encrypts used blocks on the data partition to avoid the first boot taking a long time.
• Microsoft includes a full disk encryption feature built into Windows called BitLocker.
• Apple offers a built-in encryption tool for macOS called FileVault.
Evolution of Android
• Android is an open-source, Linux-based mobile operating system primarily developed for touchscreen devices
such as smartphones, tablets, and wearables.
• It allows extensive customization by manufacturers and developers due to its open-source nature.
• Originally developed by Android Inc. in 2003, founded by:
• Andy Rubin
• Rich Miner
• Nick Sears
• Chris White
• The initial goal was to create a smarter mobile OS with improved location awareness and internet capabilities.
• In 2005, Android Inc. was acquired by Google, who continued its development under the Open Handset
Alliance (OHA).
Evolution of Android
• The first commercial Android version was released in 2008.
• It debuted on the HTC Dream smartphone (also marketed as T-Mobile G1), marking Android’s official entry
into the mobile market.
• Android quickly evolved and surpassed earlier platforms like Symbian, BlackBerry OS, and Windows
Mobile.
• Over the years, Android has introduced:
• Advanced UI and UX improvements
• Powerful app development frameworks
• Robust security mechanisms
• Diverse file systems and data storage models
• Due to its global dominance and data-rich environment, Android is a major focus in mobile forensics for
retrieving and analyzing digital evidence.
Evolution of Android
Version Codename Year Key Features
Android 1.0 – 2008 Basic apps, web browser
Android 1.5 Cupcake 2009 On-screen keyboard
Android 2.2 Froyo 2010 Wi-Fi hotspot
Android 4.0 Ice Cream Sandwich 2011 Unified UI for phones & tablets
Reference: https://cubettech.com/resources/blog/android-1-0-to-android-m-the-story-of-mobile-evolution/
Evolution of Android
1. Android 1.0 (2008)
• Codename: None
• Key Features: Basic apps (Gmail, Maps), Web browser
• Importance: First stable Android OS; introduced foundational app and file structure.
*Doze Mode - a power-saving feature introduced in Android 6.0 (Marshmallow) to conserve battery life by restricting
background activities when the device is idle.
Evolution of Android
10. Android 10 (2019)
• Key Features: System-wide dark mode, refined location controls, scoped storage (optional)
• Importance: Scoped storage began limiting app access to entire file systems - reducing ability to extract
shared data without special permissions.
Reference: https://www.linkedin.com/pulse/android-evolution-jun-jonathan-zhang/
Evolution of Android
Evolution Highlights for Forensics
• Increased Security: Modern versions introduced features like full-disk encryption, scoped storage, and
security sandboxing, complicating forensic access.
• App Behavior Changes: Over time, Android restricted background access and file I/O, affecting data
extraction.
• Cloud Sync: Shift towards cloud storage in apps (e.g., WhatsApp backups on Google Drive) reduced local
artifacts.
• File System Changes: From YAFFS2 to EXT4 to F2FS, file carving and deleted data recovery methods had
to adapt.
*Scoped Storage:
Apps have access only to their app-specific directory on shared storage (eg: SD card or external storage), as well as specific
types of media that the app has created. This approach ensures that apps cannot access files belonging to other apps directly.
Scoped storage became mandatory for apps targeting Android 11 (API level 30) or higher.
Evolution of Android
Importance of Evolution in Mobile Forensics
• Extraction Tools Compatibility: Tools like Cellebrite or ADB need version-specific handling.
• Permissions Model: From static (pre-Marshmallow) to dynamic runtime permissions (post-Marshmallow),
impacting what data apps and tools can access.
• Encryption Defaults: Full disk encryption became mandatory in Android 6.0+, altering recovery strategies.
• Rooting Difficulties: Modern Android restricts rooting more aggressively, reducing forensic access unless
bootloader is unlocked.
• Android’s evolution has directly impacted how forensic professionals extract and analyze data.
• Each version brought improvements in security, performance, and user privacy.
• Investigators must be aware of OS version differences to choose the correct extraction and analysis
techniques.
Android Model
• Android architecture is a multi-layered software stack built on the Linux kernel, designed to support mobile
devices.
• Android is structured in layers, where each layer offers a set of services to the layer above it.
• This architecture ensures modularity, flexibility, and efficient management of system resources.
• Understanding Android's internal architecture is essential for forensic analysts, as it reveals the location of
data, data flow, storage mechanisms, and security implementations.
2. Libraries
• Provides C/C++ core libraries for graphics, data storage, web rendering, etc.
4. Application Framework
• Offers high-level services to applications (e.g., Activity Manager, Content Providers).
• Controls the lifecycle of apps and system-wide interactions.
5. Applications Layer
• Contains all the user-installed and pre-installed Android apps.
• These apps interact with the system through APIs exposed by the application framework.
Android Model
• Android apps run in isolated environments (sandboxes), preventing direct access to each other’s
data.
Sandboxing
• Forensic relevance: Limits access to app data; forensic tools must bypass sandboxing or gain
root access to extract cross-app artifacts.
• A standard Android component that enables apps and system tools to access structured data (e.g.,
contacts, SMS, call logs).
Content Providers
• Forensic relevance: Many tools use content providers to extract user data during logical
acquisition.
• Most Android apps store data such as messages, browsing history, login sessions, and user
preferences in SQLite database files.
SQLite Databases
• Forensic relevance: SQLite DBs are rich sources of evidence and often hold deleted or residual
data.
Android Model - Forensic Artefacts
• Android uses internal storage (private app files) and external storage (shared media files,
downloads).
External/Internal
Storage • Forensic relevance: Investigators must understand storage locations to recover user files, app
data, and media. External storage is more accessible, while internal storage often requires root or
physical access.
• Android uses a dynamic permission system where apps must request and be granted access to
sensitive resources (e.g., camera, location, contacts).
Permissions Model
• Forensic relevance: Reviewing app permissions helps investigators understand what data an app
could access and potentially misuse.
Android Model – App Sandboxing
App sandboxing is a core security feature of the Android operating system that isolates each application to
run in its own separate environment.
• Every app runs as a separate user (UID) in the system.
• It has its own private data directory (in /data/data/<package_name>) that other apps cannot access.
• Even if two apps are from the same developer, they cannot share data unless they use explicit
methods (e.g., content providers, shared user ID with same signature).
Forensic Relevance:
• Limits unauthorized data access: Investigators cannot access app data without root access or special
permissions.
• Makes data acquisition harder, especially in non-rooted devices.
• Forensic tools must work around sandbox restrictions (e.g., use ADB, root, custom recovery).
App sandboxing enhances user privacy and app security, but it also poses a challenge for forensic data
extraction.
Android Model - Storage Locations
Type Explanation
• Stored at /data/data/<package> - Contains sensitive app files like databases,
Internal App Data preferences, and caches
• Requires root access to view.
• Located at /sdcard/ or /storage/emulated/0/ - Used for media, downloads,
External Shared Storage and app-exported files
• Easily accessible, even without root.
• Found in /system, /proc, /cache - Includes OS files, boot logs, and runtime
System Config/Logs info
• Mostly read-only or restricted for security.
Security Features
• App Sandboxing
• Permissions Model
• Verified Boot
• SELinux
• Encryption
• Google Play Protect
• Security Updates
• Keystore System
• Biometric Authentication
Android Security
2. Permissions
1. App Sandboxing 3. Verified Boot
Model
4. SELinux
6. Google Play
(Security-Enhanced 5. Encryption
Protect
Linux)
9. Biometric
7. Security Updates 8. Keystore System
Authentication
Feature Definition
Each app runs in its own isolated environment with a unique UID,
App Sandboxing
preventing other apps from accessing its data or code.
SELinux (Security-Enhanced Enforces mandatory access control policies at the kernel level,
Linux) limiting what system processes and apps can do.
Android Security
Feature Explanation
Scans apps for malware before and after installation; also helps
Google Play Protect
detect suspicious app behavior during runtime.
• These features restrict direct access to data unless bypassed or extracted through authorized methods.
• Investigators may need root access, custom recovery, or bootloader unlocking to bypass protections,
while respecting legal boundaries.
• Understanding Android security also helps in identifying tampering, malware presence, or data wiping
attempts.
Android File Hierarchy & File System
• Android’s file system is based on a Linux-like directory structure.
• Each application and system component stores data in defined locations with specific permissions.
• Understanding this hierarchy is crucial in mobile forensics to locate user data, logs, cache, databases,
and configuration files.
Reference:
https://www.scaler.com/topics/android/android-file-system/
Android File Hierarchy & File System
• Stores user apps and their data: • Used for storing temporary system
/data/data/<package_name>/. data, downloaded updates, app
• Includes shared preferences, cache.
SQLite databases, cache, files. • Cleared periodically by the system
• Also stores user credentials or during factory reset.
(encrypted), chat history, logs. • May contain OTA update
• Accessible only with root packages and logs.
permissions or physical access • Forensics: Temporary evidence
with custom recovery. (e.g., update info, install logs)
• Forensics: Most valuable for app might be recovered here.
data extraction and user activity
tracking.
Android File Hierarchy & File System
Watch:
https://www.youtube.com/watch?v=FD_eVX_B1Dg
Android File System
Common File Systems
5. SquashFS
Forensics Relevance:
• Investigators need to analyze both lower (read-only) and upper
(OverlayFS) layers to understand system changes.
• Some changes (e.g., malware injections, tampering) may only
appear in the overlay, not in the base image.
• Root access or custom recovery may be needed to inspect
OverlayFS data during acquisition.
Android File System
Android 9 (Pie) Not used officially Used traditional system, vendor partitions