Professional Documents
Culture Documents
Mohd Najwadi Yusoff, Ramlan Mahmod, Ali Dehghantanha, Mohd Taufik Abdullah
Faculty of Computer Science & Information Technology,
Universiti Putra Malaysia,
Serdang, Selangor, Malaysia.
najwadi@cs.usm.my,{ramlan,alid,taufik}@upm.edu.my
Abstract The advancement of smartphone technology has
attracted many companies in developing mobile operating
system. Mozilla Corporation recently released Linux-based open
source operating system, named Firefox OS. The emergence of
Firefox OS has created new challenges, concentrations and
opportunities for digital investigators. In general, Firefox OS is
designed to allow smartphones to communicate directly with
HTML5 applications using JavaScript and newly introduced
WebAPI. However, the used of JavaScript in HTML5
applications and solely no OS restriction might lead to security
issues and potential exploits. Therefore, forensic analysis for
Firefox OS is urgently needed in order to investigate any
criminal intentions. This paper will present an approach and
methodology in forensically sound manner for Firefox OS.
Keywords Mobile forensics; Firefox OS; digital investigation;
Forensic Method
I.
INTRODUCTION
RELATED WORKS
III.
PROPOSED WORK
Sufficient
information to
start ?
Knowledge
ready
Firefox OS
knowledge
preparation
TABLE I.
Hardware
Detail
Processor
Yes
Memory
512 MB Ram
Storage
-Internal 4GB
-Micro SD up to 16GB
Battery
1800 mAh
Display
Sensor
Camera
8 MP (Rear), 2 MP (Front)
No
Firefox OS smartphone
Phone connectivity
Connectivity
No
Return package to
requestor
Yes
START Acquisition
Fig. 1. Preparation and preservation procedure
B. Acquisition procedure
START
Acquisition Process
START
Data not
relevant
Is there
unprocessed
data ?
Consider advising
requester of initial
finding
Yes
Targeted data
acquired
What type
of data ?
Data relevant
START Analysis
Yes
Documenting
the result
Fig. 4. Examination and Analysis procedure
All the files and folders in the phone are listed at the right
hand side, while the host machine at the left. To acquire the
data from the phone, we can just select certain file or folder
and drag it into the right hand side. After the data is obtained,
the relevant data list will be marked and updated. This step
only involve specific files in the relevant data list. For example,
if we want to run log analysis, only log file will be acquired.
The second step is to verify the remaining data, if the
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
Fig. 5. QtADB Android Manager
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
ACKNOWLEDGMENT
Special thanks to academic staff of Universiti Putra
Malaysia for providing continuous guide and support, and also
to Ministry of Education Malaysia for granting the scholarship
to me.
[21]
[22]
REFERENCES
[1]
[2]
[3]
[23]
[24]
[25]
[26]
http://www.techhive.com/article/250879/first_look_at_mozilla_s_web_p
latform_for_phones_boot_to_gecko.html. 20-Feb-2014.
N. Lomas, First Firefox OS Smartphone Has Arrived: Telefonica Prices
ZTE Open At $90 In Spain, Latin American Markets Coming Soon,
http://techcrunch.com/2013/07/01/first-firefox-os-phone/. 20-Feb-2014.
Mozilla Corporation, Mozilla Announces Global Expansion for Firefox
OS, http://blog.mozilla.org/press/2013/02/firefox-os-expansion/. 07May-2013.
Mozilla Developer Network, Firefox OS,
https://developer.mozilla.org/en-US/docs/Mozilla/Firefox_OS. 07-May2013.
R. Goodwin, Mozillas Boot 2 Gecko and why it could change the
world,
http://www.knowyourmobile.com/products/16409/mozillasboot-2-gecko-and-why-it-could-change-world. 07-May-2013.
Mozilla Developer Network, Firefox OS security overview,
https://developer.mozilla.org/enUS/docs/Mozilla/Firefox_OS/Security/Security_model. 07-May-2013.
W. Jansen and R. Ayers, Guidelines on Cell Phone Forensics Recommendations of the National Institute of Standards and
Technology. 2007.
A. Distefano, G. Me, and F. Pace, Android anti-forensics through a
local paradigm, Digit. Investig., vol. 7, pp. S83S94, Aug. 2010.
A. J. Goode, Forensic extraction of electronic evidence from GSM
mobile phones, in IEE Seminar on Secure GSM and Beyond: End to
End Security for Mobile Communications, 2003, pp. 9/19/6.
S. Y. Willassen, Forensics and the GSM mobile telephone system, Int.
J. Digit. Evid., vol. 2, no. 1, pp. 117, 2003.
F. Casadei, A. Savoldi, and P. Gubian, SIMbrush: an open source tool
for GSM and UMTS forensics analysis, in First International
Workshop on Systematic Approaches to Digital Forensic Engineering
(SADFE05), 2005, pp. 105119.
F. Marturana, G. Me, R. Berte, and S. Tacconi, A Quantitative
Approach to Triaging in Mobile Forensics, in 2011 IEEE 10th
International Conference on Trust, Security and Privacy in Computing
and Communications, 2011, pp. 582588.
S. Chen, X. Hao, and M. Luo, Research of Mobile Forensic Software
System Based on Windows Mobile, in 2009 International Conference
on Wireless Networks and Information Systems, 2009, pp. 366369.
E. Casey, M. Bann, and J. Doyle, Introduction to Windows Mobile
Forensics, Digit. Investig., vol. 6, no. 34, pp. 136146, May 2010.
E. Casey, A. Cheval, J. Y. Lee, D. Oxley, and Y. J. Song, Forensic
acquisition and analysis of palm webOS on mobile devices, Digit.
Investig., vol. 8, no. 1, pp. 3747, Jul. 2011.
S. Mohtasebi, A. Dehghantanha, and H. G. Broujerdi, Smartphone
Forensics : A Case Study with Nokia E5-00 Mobile Phone, Int. J.
Digit. Inf. Wirel. Commun., vol. 1, no. 3, pp. 651655, 2012.
M. I. Husain and R. Sridhar, iForensics : Forensic Analysis of Instant
Messaging on, Lect. Notes Inst. Comput. Sci. Soc. Informatics
Telecommun. Eng. - Digit. Forensics Cyber Crime, vol. 31, pp. 918,
2010.
M. I. Husain, I. Baggili, and R. Sridhar, A Simple Cost-Effective
Framework for iPhone, Lect. Notes Inst. Comput. Sci. Soc. Informatics
Telecommun. Eng. - Digit. Forensics Cyber Crime, vol. 53, pp. 2737,
2011.
W. Chun and D. Park, A Study on the Forensic Data Extraction Method
for SMS , Photo and Mobile Image of Google Android and Windows
Mobile Smart Phone, Commun. Comput. Inf. Sci. - Converg. Hybrid
Inf. Technol., vol. 310, pp. 654663, 2012.
V. L. L. Thing, K.-Y. Ng, and E.-C. Chang, Live memory forensics of
mobile phones, Digit. Investig., vol. 7, pp. S74S82, Aug. 2010.
J. Sylve, A. Case, L. Marziale, and G. G. Richard, Acquisition and
analysis of volatile memory from android devices, Digit. Investig., vol.
8, no. 34, pp. 175184, Feb. 2012.
Mozilla Developer Network, Firefox OS architecture,
https://developer.mozilla.org/enUS/docs/Mozilla/Firefox_OS/Platform/Architecture. 07-May-2013].
QtADB, QtADB Android Manager, 2011. http://qtadb.wordpress.com.
11-Jan-2014.
M. Hrz, HxD Hex Editor, http://mh-nexus.de/en/hxd/.11-Jan-2014.