KEYWORDS: Forensic science, Databases, Data storage, Error control coding, Data acquisition, Analytical research, Data modeling, Computer security, Lithium, Digital forensics
The rapid growth in usage and Instant Messenger Applications (IMAs) has made them a potential target by cyber criminals to conduct malicious activities such as identity theft, illegal trading, etc. For example, WeChat is extending its services to mobile platforms, making it an important source of evidence in cyber investigation cases. Therefore, understanding the types of potential evidence of users activities available on mobile devices is crucial for forensic investigations and research. In this article, we examined WeChat, the most popular application on the Android platform. We created various artifacts (e.g., texts messages, images, audio, and document) that are of forensic interest to perform targeted spoofing tampering with WeChat data. This helps in analyzing the authenticity of WeChat data during forensics, thereby proving the innocence of people or the existence of certain criminal activities.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.