期刊文献+

司法鉴定实践中基于Android即时通讯记录的真实性实例分析探究

Exploring the Authenticity Analysis of Android Instant Messaging Applications Records in Forensic Practice
在线阅读 下载PDF
导出
摘要 目的即时通讯应用程序(如微信、QQ和钉钉)提供便捷服务的同时,也因其特性而使其成为网络犯罪分子进行恶意活动的潜在目标。因此,即时通讯记录成为网络调查案件的重要证据来源。然而,目前针对即时通讯记录真实性的研究相对匮乏,这可能会使其在司法实践中失去公信力。方法结合司法鉴定工作实务,对即时通讯记录的存储结构进行分析,如文本信息、图片、视频等多种数据类型在设备中的存储路径和格式,揭示其内在的数据组织和存储机制。同时,结合数据特征,如时间戳、发送/接收的信息内容以及逻辑合理性等方面,进一步对即时通讯记录的真实性进行探究。结果从基于Android即时通讯记录真实性司法鉴定实例研究出发,所探讨的方法能够有效鉴别即时通讯记录存在窜改痕迹。结论相关鉴定技术的研究对通讯记录的真实性鉴定具有重要的理论研究意义和实践应用价值,有助于为从事数字取证的研究人员提供重要参考。 Objective Instant messaging applications provide convenient services,such as WeChat,QQ,and DingTalk,but their nature also made them a potential target by cyber criminals to conduct malicious activities.As a result,instant messaging records have become an important source of evidence in cyber investigation cases.However,research on the authenticity of instant messaging applications records is relatively scarce,which may make them lose credibility.Therefore,a method for the analysis of the authenticity of android instant messaging applications records is quite essential.Methods In combined with forensic practice,we performed a more in-depth analysis of the storage structure of instant communication records,such as the storage paths and formats of text messages,images,videos,and other data types in the device,to reveal their internal data management and storage mechanisms.Meanwhile,the authenticity of instant communication records was further explored in terms of data characteristics such as timestamps,contents of sent/received messages,and logical rationality.Results Through the study of authenticity forensics cases of Android instant messaging records,the method explored in this paper can effectively identify the tampering traces that exist in instant messaging records.Conclusion The research of related authentication techniques has theoretical research significance and practical application value.The research can provide important references for researchers engaged in digital forensics.
作者 田野 李致君 郭弘 李岩 杨恺 毛晓 TIAN Ye;LI Zhijun;GUO Hong;LI Yan;YANG Kai;MAO Xiao(Shanghai Key Laboratory of Forensic Medicine,Key Laboratory of Forensic Science,Ministry of Justice,Shanghai Forensic Service Platform,Academy of Forensic Science,Shanghai 200063,China)
出处 《中国司法鉴定》 2024年第4期60-64,共5页 Chinese Journal of Forensic Sciences
基金 科研院所公益研究专项(GY2023G-5,GY2022G-7) 上海市司法鉴定专业技术服务平台资助项目。
关键词 电子数据鉴定 即时通讯记录鉴定 真实性分析 digital forensics instant messaging records examination authenticity analysis
作者简介 田野(1988-),女,助理研究员,博士,主要从事电子数据鉴定、声像资料鉴定研究。E-mail:tiany@ssfjd.cn;通信作者:郭弘(1978-),女,正高级工程师,硕士,主要从事电子数据取证、信息安全的研究。E-mail:guoh@ssfjd.cn。
  • 相关文献

参考文献4

二级参考文献92

  • 1Egham. Gartner says sales of smartphones grew 20 percent in third quarter of 2014 [EB/OL]. [2015-06-01]. http:// www. gartner, com/newsroom/id/2944819.
  • 21991 T.Appfigures:2014年Googleplay增加新应用数量首次超过Appstore[EB/OL].[2015—06—01].http://www.199it.com/archives/321519.htm.
  • 3TheHackerNews. Zero-day smartphone vulnerability exposes location and user data [EB/OL]. [2015 06-01]. bttp:// t hehackenews, com/2012/02/zero-day-smartphone-vulnerability. html.
  • 4Sehlegel R, Zhang K, Zhou X, et al. Soundeomber: A stealthy and context-aware sound trojan for smartphones [C] //Proc of the 18th Network and Distributed System Security. San Diego: NDSS, 2011:17-33.
  • 5Nerney C. Sneaky "pileup" malware can exploit android upgrades, researchers say [EB/OL]. [2015-06-01]. http:// www. eiteworld, com/article/2114420/mobile-byod/android- pileup-malware, html.
  • 6Xing L, Pan X, Wang R, et al. Upgrading your android, elevating my malware: Privilege escalation through mobile os updating [C] //Proc of 2014 IEEE Syrup on Security and Privacy (SP). Piscataway, NJ.. IEEE, 2014: 393-408.
  • 7Jia Jack.“黑暗潜伏者”——手机病毒新型攻击方式[EB/OL].2014[2015—06-01].http://blog.csdn.net/androidsecurity/article/detans/41207959.
  • 8Alephzain. Framaroot, a one-click apk to root some devices [EB/OL]. [2015-06-01]. http://forum, xda-developers, corn/ apps/framaroot/root- framaroot-one-click-apk-to-root-t2130276.
  • 9金刚项目团队.Androidfakeid任意代码注入执行漏洞简析[EB/OL].[2015—06—01].http://security.tencent.com/index.php/blog/msg/64.
  • 10National Vulnerability Database. Nvd vulnerability summary for eve-2014-3153 [EB/OL]. [2015-06-01]. http://web, nvd. nist. gov/view/vuln/ detait ?vulnld=CVE-2014-3153.

共引文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部