Sunteți pe pagina 1din 15

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/328168545

AndroKit: A toolkit for forensics analysis of web browsers on android platform

Article  in  Future Generation Computer Systems · October 2018


DOI: 10.1016/j.future.2018.08.020

CITATIONS READS

0 232

6 authors, including:

Muhammad Amjad Waseem Iqbal


National University of Sciences & Technology National University of Sciences and Technology
18 PUBLICATIONS   24 CITATIONS    33 PUBLICATIONS   75 CITATIONS   

SEE PROFILE SEE PROFILE

Hammad Afzal Haider Abbas


National University of Sciences and Technology NUST Pakistan / FIT , USA
61 PUBLICATIONS   238 CITATIONS    117 PUBLICATIONS   1,120 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Cloud Computing Security View project

Defense against Data Integrity Attacks in IoT View project

All content following this page was uploaded by Waseem Iqbal on 18 May 2019.

The user has requested enhancement of the downloaded file.


Future Generation Computer Systems 94 (2019) 781–794

Contents lists available at ScienceDirect

Future Generation Computer Systems


journal homepage: www.elsevier.com/locate/fgcs

AndroKit: A toolkit for forensics analysis of web browsers on android


platform
Muhammad Asim a , Muhammad Faisal Amjad a , Waseem Iqbal a , Hammad Afzal a ,

Haider Abbas a , , Yin Zhang b
a
National University of Sciences and Technology, Islamabad, Pakistan
b
Zhongnan University of Economics and Law (ZUEL), China

highlights

• The proposed AndroKit can be a very useful component of cyber threat intelligence.
• AndroKit provides a unified platform to perform android browser forensics.
• Beneficial for web browser vendors for strengthening user data privacy.

article info a b s t r a c t

Article history: Due to the pervasive nature of smart phones and devices, users are becoming more and more dependent
Received 3 April 2018 on such devices for accessing online information. Pervasive use of smart devices has significantly enlarged
Received in revised form 3 July 2018 the attack surface and resulted in a proportional complication of cyber threat intelligence gathering.
Accepted 8 August 2018
For such devices, web browsers have become a primary means for accessing information provided
Available online 9 October 2018
on Internet as well as file systems and therefore, web browser forensics is an important component
Keywords: of cyber threat intelligence. The basics of web browser forensics revolve around the artifacts such as
Forensic investigation web sites visited, malicious URLs, time stamps, counts of access, search histories, cookies, downloaded
Web browsers analysis activities etc. However, leveraging and locating this information can be challenging without the needed
Android operating system prerequisite information. This paper presents how to perform forensics analysis of data structures used
by popular web browsers such as Chrome, Opera, Mozilla Firefox, and Dolphin on Android and how a
forensic investigator can acquire forensic artifacts from web browsers. To strengthen digital investigation,
a toolkit named as AndroKit is proposed for Android web browsers forensics. The paper demonstrates that
the AndroKit can successfully acquire and analyze forensic evidence such as Web History, Downloads,
Cookies, Bookmarks, Chrome stored user credentials, decode base64 encoded images, Tabs information
etc. Finally, a comparative analysis of AndroKit with standard forensic tool-kits such as Oxygen forensics,
Andriller, MOBILedit and Belkasoft evidence center has been presented.
© 2018 Elsevier B.V. All rights reserved.

1. Introduction including browsing internet, shop online and using social media
etc. The increase in smartphone surfing marks a clear change since
During last few years, the usage of smart phones has enor- 2014 [1]. Fig. 1 shows that the usage and popularity of smart
mously increased. Smart phone overtook the laptop as the most phones has clearly overtaken the usage of other devices during last
popular device to get online in 2015 and its usage is increasing few years.
with every passing year. The latest report from Ofcom, i.e. The The popular operating systems on smartphones include Apple’s
Communication Market report 2017, shows that 76% of adults (in iOS, Google’s Android phone, Microsoft’s Windows, Symbian and
UK) own a smartphone whereas, the ownership of laptops is 64% RIM etc. During last few years, Android has been the most used
and that of tablets is 58%. This results in smart-phone being the operating system on smart devices including phones and tablets
most popular device to get online as well. More than four in ten etc. Developed by Google, Android is based on a modified version of
users (42%) use smart devices to get online for various activities the Linux kernel and other open source software. The first release
of Android was made in September 23, 2008 whereas, the most
∗ Corresponding author. recent version was released in December 5, 2017. The graph in
E-mail addresses: haiderabbas-mcs@nust.edu.pk (H. Abbas), Fig. 2 shows that the popularity of Android has been continuously
yin.zhang.cn@ieee.org (Y. Zhang). increasing since its first release [2]. According to a recent report

https://doi.org/10.1016/j.future.2018.08.020
0167-739X/© 2018 Elsevier B.V. All rights reserved.
782 M. Asim, M.F. Amjad, W. Iqbal et al. / Future Generation Computer Systems 94 (2019) 781–794

Fig. 1. The increased usage of Smart Phones since 2013 as shown in Ofcom Report 2017.

from StatCounter Global Stats,1 Android has overtaken Windows been discussed in Section 5. Comparative analysis of AndroKit
as the most popular operating system to access the Internet in with other standard forensic tool-kits (Oxygen forensics, Andriller,
2017. This is also indicative of the fact that smart phones are MOBILedit and Belkasoft evidence center) is performed in Section
getting popular as the primary device to gain access to Internet as 6. Summary of this research is in Section 7 and finally, Section 8
compared to traditional devices such as laptop, desktop etc. concludes the paper.
In digital forensic investigations, the term mobile forensics refers
to the recovery of digital evidence from mobile devices. Forensics 2. Related work
data acquisition from mobile device is different from desktop sys-
tems. The main difference is that some forensics tools require a Web browsing activity is a major source of information in
communication vector, thus standard write protection does not digital forensics investigation [3,4]. Forensic analysis depends on
work during data acquisition process. Forensic acquisition meth- the architecture of the web browser and thus forensic tool-kits
ods may involve removing a chip or installing a boot-loader on need to adapt their code to new versions or new browsers [5] with
the mobile device prior to extracting the data in forensic sound different platforms (operating systems). The forensic analysis of
manner for analysis. Some challenges, specifically related to mo- web browsers on traditional platforms such as Windows and Linux
bile forensics, are hardware difference, mobile operating system, based systems have been reported in many research works [6–13];
mobile platform security features, lack of resources, dynamic nature however, very little research on web browsers forensics on Android
of evidence, lack of availability of tools and legal issues etc. platform has been carried out.
The popularity of smartphone’s is increasing due to their abil- In (2009), Tito [14] explained the change in the history system
ity to store, access and transmit user information. Sensitive and that occurred when Firefox 2 was restructured and Firefox 3 was
personally identifiable information e.g personal information, ge- released. The author proposed a new method of searching the
olocation data etc are potentially an important source of digital deleted history information with the help of unallocated fields. The
evidence. Thus forensics of smart devices such as smart phones and author suggested a technique of extracting history from Firefox 3
tablets is of utmost significance. Several forensic tool-kits for desk- by examining structure analysis of the SQLite database. However,
top platforms such as Windows, Linux and Mac-OS are available their work is limited to only desktop applications. In another
and their work has been published; however, very little research paper on Firefox forensics [15], authors presented a survey of web
has been published related to web browsers forensics on Android browser forensic analysis tools and evaluated their performance.
platform. Standard forensics tool-kits provide limited support on Each forensic tool has its own strengths and weaknesses. However,
Android OS for web browsers forensics. Due to the popularity of the author found that ‘‘FoxAnalysis’’ is best suited for Firefox foren-
smartphones as Internet accessing device, a forensic toolkit for web sic analysis on Windows system.
browsers on Android platform is required to facilitate the digital Rathod [16], performed forensic analysis of Chrome on Win-
forensic investigators. dows, Linux and Mac OSX system. Chrome was chosen for analysis
This paper presents that how popular browsers in Android OS on the basis of popularity among internet users. In this analysis,
store data in memory that can be utilized in forensics process. cookies, user profiles, prefetch file, RAM and web history is ana-
lyzed for forensic artifacts. Final results showed that forensic in-
The secondary objective is that, how a forensics investigator can
vestigator can collect valuable information about suspect activities
acquire and analyze web browsers forensic artifacts. To automate
from chrome sessions.
evidence extraction and analysis process, a forensic toolkit (An-
In 2013, Barghouthy et al. [17] performed forensic investiga-
droKit) has been designed and proposed for android web browsers
tion of Android Private Browsing Sessions using Orweb on two
forensics.
Samsung Galaxy S2 smart-phones. One of the devices was rooted,
The paper is arranged as follows: Section 2 presents the related
whereas other device was non-rooted. Their results showed that
work in android web browsers forensics and evidence extrac-
the browser history, and important corroborative digital evidence
tion methods from android device. Section 3 explains AndroKit
can be tracked and found on rooted device. This research only
methodology. Section 4 discusses data structure used by popular
considered private browsing session on Android device.
Android web browsers. AndroKit Design and Implementation has
Jang et al. [18], suggested a digital forensic process for digital
devices using social network services (SNSs). The author proposed
1 http://gs.statcounter.com/press/android-overtakes-windows-for-first-time. digital forensics investigation methodology applicable for social
M. Asim, M.F. Amjad, W. Iqbal et al. / Future Generation Computer Systems 94 (2019) 781–794 783

Fig. 2. Mobile Operating System Market Share — 2010 to 2017.

network services but this research only covers social networking Lockscreen cracking for Pattern, PIN code, or Password; custom
applications. decoders for Apps data from Android databases. MOBILedit Forensic
Reed et al. [10] presented forensic analysis of Epi Privacy Browser, (MF) is a product of Compelson Labs, it also provides support for
performed on Windows Operating Systems (7 and 10). Epic Privacy number of forensic activities such as search, examines and report
Browser prides itself on protecting the user’s privacy. Temporary forensic data from GSM/CDMA/PCS cell phones devices. Belkasoft
files and folder got deleted at the end of the browsing session. Evidence Center Toolkit (BECT) extracts digital evidence from mul-
However, this paper demonstrated that this data can be recovered tiple sources by analyzing volatile memory dumps, hard drives,
using standard toolkits. Web browsers store user’s data in different backups of iOS, Blackberry and Android backups, UFED, JTAG and
ways and locations, this depends on the operating system. Akbal chip-off dumps. BECT can be used to quickly locate and analyze
et al. [11], analyzed how commonly used web browsers store information found in social network remnants, instant messenger
users data and what forensic information can be recovered on logs, internet browser histories, mailboxes of popular email clients,
different operating systems (such as Windows, Linux, and Mac peer-to-peer data, multi-player game chats, office documents, pic-
OSx). They demonstrated the usage of standard toolkits such as tures, videos, encrypted files, mobile backups, system and registry
Internet Evidence Finder, FTK, Browser History Examiner. Further, files.
the author presented the working of major forensics tools such as The summary of the literature review is that, there has been
WebHistorian 1.3, Index.dat, Analyzer 2.5, ChromeAnalysis Plus, substantial work reported for web browser forensics on desktop
NetAnalysis v1.52 and Web Browser Forensic Analyzer to ana- based operating systems, however, very little work has been re-
lyze the web browsers forensics on the Windows system. They ported for Android. Moreover, most of the papers focused only on
performed analysis on cookies, cache, bookmarks, history, search a single browser. In this paper, we have presented a detailed anal-
words and download lists. Forensic tools successfully recovered ysis on four popular web browsers on Android. Based on analysis
this forensic evidence. results, a toolkit named as AndroKit is designed and presented. The
In 2011 Vidas et al. [19] discussed a general methodology for performance of Androkit is compared with standard toolkits. We
the examination and collection of evidence from Android devices. have also presented a brief overview of some standard toolkits with
Similarly, forensic analysis of social media applications such as which, the performance of Androkit has been compared.
WeChat [20], WhatsApp [21], Viber [22] and other IM applica-
tions [23] on Android system was performed. Standard tools also 3. Methodology
provide limited support.
Proposed framework for AndroKit evidence acquisition and
In market, many forensic tools are available. Some of popular
analysis is presented in Fig. 3. This framework is divided into
toolkit are Oxygen Forensics Suite, Andriller, MOBILedit and Belkasoft
following main steps;
Evidence Center. Oxygen Forensics suite (OFS) can be used to analyze
both smartphones and PDAs. OFS can extract contacts, calendar • Extract device information: This module extract device in-
events, SMS messages, files, event logs, device information and formation such as device name, serial No, root access sta-
metadata related to these artifacts. According to vendor’s claim, the tus, device encryption status etc. The extracted information
suite support more than 8400 devices. The range of devices spans would help investigator in identification of devices and its
all popular brands including Nokia, Vertu, Sony Ericsson, Samsung, current status.
Motorola, Blackberry, Apple iPhone series, Apple iPod Touch, Apple • Check root access: This module checks root status on con-
iPad, Panasonic, Siemens, HTC etc. In terms of operating systems, nected device, if device is rooted then it will further process to
OFS supports all popular operating systems including Symbian OS, search web browsers on device, if device is not rooted then it
Android OS devices, iOS and Windows Mobile 5/6, Phone 8 etc. will use stock recovery mode to get root access on connected
Andriller also provides forensics features for smartphones such as device.
784 M. Asim, M.F. Amjad, W. Iqbal et al. / Future Generation Computer Systems 94 (2019) 781–794

Table 1 Table 2
The location of popular web browsers application and user data. The path of cookies on popular web browsers application on android.
Web browser Path Web browser Path
Google chrome /data/data/com.android.chrome/ Google chrome /com.android.chrome/app_chrome/Default/cookies
Opera /data/data/com.opera.browser/ Opera /com.opera.browser/app_opers/cookies
/sdcard/Android/data/com.opera.browser Mozilla firefox /org.mozilla.firefox/files/mozilla/xx.default/&cookies.sqlite
Mozilla firefox /data/data/org.mozilla.firefox/ Dolphin /mobi.mgeek.TunnyBrowser/app_webview/cookies
/sdcard/Android/data/org.mozilla.firefox
Dolphin /data/data/mobi.mgeek.TunnyBrowser/
/sdcard/TunnyBrowser/ Table 3
/sdcard/Android/data/mobi.mgeek.TunnyBrowser The structure of cookies SQLite3 file: Fields of cookies table.
Item Description
creation_utc data/time creation
host_key identify host
• Search web browsers evidence: This module lists all in- Name Name of cookies.
stalled web browsers on connected device. Value store value of cookie such as password value, login value
• Calculate evidence check-sum: This module calculates check- etc.
sum (md5 hash) of web browsers application data and store Path Path of cookies. If path is /̈¨, this means cookies will
accessible via all pages in domain. If path is set to
in memory for evidence validation.
‘‘/subfolder’’, then cookies will accessible to only subfolder
• Extract forensic evidence: This module uses adb pull method webpages.
to extract web browsers forensics data from the device. expire_utc Cookies Expire time in UTC.
• Analyze digital evidence: After forensic evidence acquisition secure Support Boolean value 1 or 0. 1 indicates that cookies can
from the connected device, first this module will calculate be sent only over encrypted (HTTPS) requests.
Httponly Support Boolean Values 1 or 0. 1 tells the web browser that
check-sum of extracted data and compare it with check- cookies should be only accessed by server, Restrict client
sum which is calculated before evidence extraction, then side requests.
extracted evidence is process for forensic analysis. lastaccess_utc Last access time of Cookies.
hasexpires Support Boolean values, 1 shows cookies have expired.
These steps are briefly discussed in AndroKit design and imple- Persistent Support Boolean value 1 or 0. Persistent cookies expires at
mentation section. a specific date/time, if value is set to 1.
encrypted value Encrypted Value of cookies

4. Analysis: data structure used by popular android web


browsers Table 4
The path of Bookmarks on popular web browsers on Android.
In this section, we have presented data structure analysis of Web browser Path
popular android web browsers. In Android OS, application data is Google chrome /com.android.chrome/app_chrome/Default/bookmarks
stored in ‘‘/data/data’’ directory. This directory is accessible only Opera /com.opera.browser/app_opera/bookmark
with root privileges. During our analysis, we have used Flash Cus- Mozilla firefox /org.mozilla.firefox/files/mozilla/xxxxxxxx.default/ browser.db
tom Recovery technique to gain root access on the device [24]. Dolphin /mobi.mgeek.TunnyBrowser/databases/browser.db
After gaining root access via stock recovery mode, the directories
shown in Table 1 are pulled via adb from the device for foren-
Table 5
sic and data structure analysis. In this analysis, all popular web The structure of Bookmark File with Bracket delimiters.
browser’s application data and users data was examined. This data Item Description
would help digital forensic investigators in getting artifacts from
Checksum bookmark file hash(for integrity).
web browsers session on Android device. We have performed the Id Unique ID of each record.
analysis of data structures and forensic analysis of popular android Date Added Date and Time in UNIX format.
web browsers on following devices: Name Title of web page.
Type Show bookmark type (normally it is URL)
• Samsung Alpha — Android OS version 4.4 URL URL Address
• Samsung Grand Prime — Android OS Version 5.0
• Android Emulator SDK V21
All popular web browsers available on Android are installed on web browser. Android based web browsers store Cookies in SQLite
above mentioned devices and Emulator. In particular, following database file. Table 2 shows on device cookies storage path of
browsers are installed: popular android web browsers. Cookies are stored in Cookies table
inside Cookies SQLite database file. Structure of Cookies table is
• Google Chrome Version 56.0.2924.87
presented in Table 3.
• Opera Version 42.3.2246.113338
• Mozilla Firefox Version 53.0.2
4.2. Bookmarks
• Dolphin Version 11.5.19
In analysis, following forensic evidences are successfully acquired, Bookmark is a URI (Uniform Resource Identifier) that is stored
analyzed and recovered. in application data on device for later retrieval. Google Chrome and
Opera store Bookmarks (Table 4) in plain text file using Bracket
4.1. Cookies delimiters format [25,26]. Bookmark file Bracket delimiters format
structure is discussed in Table 5. Mozilla Firefox and Dolphin store
Cookies are used for a variety of purposes such as tracking the Bookmarks data in SQLite database file in (Table 4). We have in-
identity of users, recording user preferences and preserving session cluded the capability of parsing both Bracket delimiters and SQLite
information between multiple page requests etc. Cookies stored in- files for retrieving forensic information in proposed AndroKit. As
formation can be very helpful in digital forensics investigations. per our knowledge, the other standard forensic tools only parse
‘‘HTTP Set-Cookie’’ headers is used to pass cookies from server to a SQLite files for bookmarks.
M. Asim, M.F. Amjad, W. Iqbal et al. / Future Generation Computer Systems 94 (2019) 781–794 785

Fig. 3. AndroKit Flow Chart.

Table 6
The path of Web History stored by popular web browsers on Android.
Web browser Path
Google chrome ‘‘/com.android.chrome/app_chrome/Default/History’’
Opera ‘‘/com.opera.browser/app_opera/history.db’’
Mozilla firefox ‘‘/org.mozilla.firefox/files/mozilla/xxxxxxxx.default/ browser.db’’
Dolphin ‘‘/mobi.mgeek.TunnyBrowser/databases/browser.db’’

4.3. Web history ‘‘History.db’’ SQLite file. The main difference between Chrome and
Opera ‘‘History.db’’ structure is that Opera stores downloads infor-
Web history is another source of large amount of forensic in- mation in separate Bracket delimiters plain text file Fig. 4 and most
formation during digital investigation. Web browsers use different visited websites details in ‘‘databases/mostvisited.db’’ SQLite file.
SQLite formats and locations for storing visited web history on the History file has meta, urls, visits, visit_source, keyword_search_terms,
device (Table 6). Google Chrome and Opera stores web history in downloads, downloads_urls_chains, segments and segments_usage
786 M. Asim, M.F. Amjad, W. Iqbal et al. / Future Generation Computer Systems 94 (2019) 781–794

Table 7 Table 10
The structure of URLs Table (Visited URLs). The structure of download table.
Item Description Item Description
Id Unique ID of each record in table Id Unique ID Field
url Visited URL address. current_path save current downloaded image path
Title Title of web page. target_path if user move downloaded file to another location then path
visit_count Total visits counts. of file stored in target_path
last_visit_time Last Visit Time in UTC start_time downloading/downloaded file starting time in UNIX
favicon_id Website favicon ID. A foreign key to the favicon table format
which stores the favicon for each URL received_bytes field shows Downloading/downloaded file total bytes
hidden Indicates if the URL will be displayed by the auto complete received
function. A value of 1 will keep it hidden and 0 will display total_bytes show total file size in bytes.
it. State status of downloading file, this is 1 for completed and 0 for
incomplete file
interrupt_reason if file is interrupt in downloading, interrupt_reason field is
Table 8 used to stored interruption reason.
The structure of keyword search term table. end_time End time show time stamp of file downloading completion.
Opened User had open file after downloading or not, in opened file
Keyword_id Unique ID of each record in table
if value in 1 this indicates that file has opened by user and
url_id Foreign key of url. if value is 0 this indicate user did not open this file via
lower_term store searched keyword chrome. If user open this file from any other application
such as file manager etc then chrome will not change value
in opened field of download table.
Referrer Referrer URL of downloaded file.
last_modified store information about if user has made modification to
the file the time stamp when this modification occurs.
Mimetype store downloaded file type information such as if file is
jpeg image it will store image/jpeg value in mimetype
field.
tab_url contains url of current tab.
site_url path from where file is downloaded.

Fig. 4. Opera Downloads Bracket delimiters file.

Fig. 5. User Credentials as stored by Chrome.


Table 9
The structure of visits table.
Id Unique ID of each record in table
url Foreign key of urls table store this information in encrypted/encoded form. In Chrome, Orig-
visit_time Webpage visit time (UTC). inal_url and url_action fields in Login table store website address
from_visit Stores the id from where the URL came from originally. If with actionable page address. User_element stored element name
the URL does not have a referring URL this value is 0 of web page and its value is stored in user name_value. Pass-
transition Value describes how URL was LOADED in Web browser
[27].
word_element field stores password element name of website and
segment_id Stores the segment id. It is not clear what ‘segments’ are. its value is store in Password_value field in BLOB format. To find this
There are tables called segments and segment_usage in BLOB Value; Open login_data file in any Hex editor (Fig. 5).
history. It stores the domain names of accessed URLs along Mozilla Firefox stores passwords in encrypted form. The files
with a total visit count
used to encrypt/decrypt the passwords are cert9.db, key4.db and
visit_duration Total website visit duration (UTC).
pkcs11.txt, which are also stored in ‘‘org.mozilla.firefox/files/mozilla/
xxxxxxxx.default/signons.sqlite’’ directory. Dolphin stores user cre-
dentials in encrypted form in ‘‘mobi.mgeek. TunnyBrowser/
tables. Description of download table is shown in (Table 10) and databases/passowrd.db’’SQLite file. Opera stores Username/
visited URLs table in (Table 7). Table 9 shows the structure of URLs Passwords in encoded form in ‘‘/app_opera/prefs.json’’ file. AndroKit
table, while Table 8 shows the information of searched keywords. has ability to extract chrome stored user credentials in plain text.
Mozilla Firefox and Dolphin web browser store web history in
History table, Recent open tabs information in recent_tabs table, 4.5. Cache
Most visited websites information in top_sites table and Searches
keywords history in searches table of ‘‘browser.db’’ SQLite file. Web browsers cache store valuable information such as images,
AndroKit analyzes all popular browsers web history and shows strings, visited websites, searches history etc. This data provides a
results in separate tab for each browser. lot of forensic information. Chrome and Opera store cache data in
‘‘/cache/ ’’ directory inside application data directory. Mozilla Fire-
4.4. User credentials fox stores cache data in ‘‘org.mozilla.firefox /cache/xxxxxxxx.default’’.
Inside cache directory, there are sub directories (i.e. news, cache,
Chrome, Mozilla and Dolphin use SQLite file while Opera uses okhttp etc.) which store cache data in random files (such as file
‘‘.json’’ file for storing user credentials. Chrome (version 56.0.2924. begins with ‘‘caticon_xxxx’’ store PNG Images). Weppy Images
87) stores user credentials in plain text, while other browsers are also stored in cache. Weppy images are created by Google,
M. Asim, M.F. Amjad, W. Iqbal et al. / Future Generation Computer Systems 94 (2019) 781–794 787

4.9. Local storage

Local storage files are saved in SQLite format. Each file contains
items table. Item tables contains key–value pairs, the semantics
of which depend on the individual website. The extension ‘‘.lo-
calstorage’’ indicates an application support file created by the
web browsers using WebKit, such as Google Chrome and Apple
Safari. These files store browser settings or local data for a browser
Fig. 6. Cache Image. extension, and enables extensions to store a local cache of user
data saved in a SQLite database format. This information will help
forensic investigator in acquiring local data and settings from
to improve performance of web pages and make website faster extensions. Figs. 10 and 11 shows the paths for all web browser
by reducing image size [28]. In analysis, we found images in on which Local storage data is stored.
‘‘cache/okhttp’’ (Fig. 6), Base64Encoded Images (Fig. 7), HTML pages
with URL (Fig. 8)and plain text data. Dolphin stores cache data in 4.10. Chrome .log and .ldb files
‘‘mobi.mgeek. TunnyBrowser/databases/ dolphin_webviewCache.db’’
SQLite file and cache images in ‘‘sdcard/Android /data/mobi.mgeek.
Chrome stores ‘‘.log’’ and ‘‘.ldb’’ files in ‘‘com.android.chrome/
TunnyBrowser/cache’’ directory. Andro-Kit successfully extracted
app_chrome /Default/DeltaFileLevelDb/ ’’. Sessions data are stored in
cache data (including images, URL, Web pages etc.) from all popular
‘‘.ldb’’ files. Bookmarks and history are stored in ‘‘.log’’ files (Fig. 9).
Android web browsers.
This is sync data (Web history and bookmarks) of other devices
on chrome. This information helps investigator in extracting web
4.6. Stored sessions
history from other devices where suspect had signed-in in chrome.
Each session of activity in web browsers is recorded by the web
browsers. In event of browser crashing, session can be restored. 4.11. Other forensics data
Sessions records store information about closed/open tabs, cook-
ies etc. Therefore, it is possible to recover multiple evidences in Web browsers save some other forensic data related to brows-
order to show a user’s web activity. Chrome stores session data ing session, time, search engine keywords, frequency of access,
in ‘‘Session Storage’’ directory, Opera and Dolphin store this data user profile and web browsers setting in memory. Therefore, in
in SQLite file which Mozilla Firefox utilize ‘‘sessionstore.js’’ file for investigating suspect’s device, this evidence can provide useful in-
storing session data. Paths on which popular android web browsers formation. It is necessary to extract such significant data related to
store session data are shown in Fig. 11. Chrome stores session forensic investigations. Figs. 10 and 11 shows the list of some other
data in ‘‘com.android.chrome/app_chrome/Default /Session Storage/’’ valuable forensic data with description, which can be extracted
directory. Opera stores this information in ‘‘databases/appboy.db’’ from web browsers.
SQLite file. Mozilla stores session data in ‘‘org.mozilla.firefox/files
/mozilla/yybtc8zi.default/sessionstore.js’’ file. Dolphin stores session 5. AndroKit design and implementation
information in ‘‘mobi.mgeek.TunnyBrowser/databases’’ SQLite file.
AndroKit has ability to recovery sessions data from all popular The major contribution of this paper is the toolkit that can assist
android web browsers. in digital forensics regarding all the artifacts and data structures
explained in Section 2. The environments in which AndroKit works
4.7. Save pages include Windows 7, 8 and 10, and the targeted Android web
browsers for forensic analysis are Chrome, Opera , Mozilla Firefox
Web browsers often save web pages for offline use. For forensics and Dolphin. The basic structure of the tool is illustrated in Fig. 3.
investigators, interesting information may be stored in such files.
Chrome and Opera store these pages in MHTML format. MHTML
5.1. AndroKit development environment
is a file extension for web pages archive format. MHTML saves
webpage contents and external resources such as applets, images
etc. into HTML Document [29]. Mozilla saves pages in portable doc- Development environment for AndroKit is Windows Presen-
ument ‘‘PDF’’ format. Dolphin browser saves web pages in ‘‘.htm’’ tation Foundation (WPF) forms in C# using Visual Studio 2015.
format. Dolphin browser has no direct support for saving web Following NuGet packages are used in AndroKit implementation;
pages into Portable document. Add-ons such as ‘‘Web to PDF’’ may mAdb and sharpAdbClient: sharpAdbClient and mAdb are free
be used to save webpages for offline use. A summary of locations open source libraries that allow .net applications to communicate
on which all web browsers store save pages are shown in Figs. 10 with android devices. SharpAdbClient is .net client for Android De-
and 11. bug Bridge. Android Debug Bridge is command line tool that assists
in communication with connected android device or emulator. Adb
4.8. Tabs information provides access to UNIX shell. Adb is client server program that
includes a Client, daemon and a Server. Client runs on development
Web browsers store information about current/close tabs in machine which sends commands, Daemon (adbd) is background
application data. This information will help forensic investigator process on device which runs commands on device and Server is re-
in correlating their findings regarding web sessions such as visited sponsible for management of communication between the daemon
pages. Browsers use different formats and locations for recording and Client. Server is also on development machine as background
this information. Figs. 10 and 11 lists format used by browsers for process. Details about adb and its commands are discussed in [30].
recording tabs information and locations on which web browsers’ sharpAdbClient and mAdb provide implementation of the adb pro-
tabs related information is stored. AndroKit is the only toolkit tocol and give flexibility to the developer to launch adb.exe and
which extract tabs information while other standard forensic tool- parse console output. Following sharpAdbClient and mAdb methods
kits do not deal with open/closed tabs information. are used in Andro-Kit.
788 M. Asim, M.F. Amjad, W. Iqbal et al. / Future Generation Computer Systems 94 (2019) 781–794

Fig. 7. Cache Base64 Encoded Image.

Fig. 8. Cache URLs and HTML Page.

Fig. 9. Cache URLs and HTML Page.

• SharpAdbClient.AdbClient.Instance class provides methods Information Extraction Module: Information extraction mod-
which allow application to interact with android device. To ule employed in AndroKit gets device information and extracts
communicate directly with android device, adb.exe is inter- forensic data from device. This module utilizes adb libraries
mediate process between android device and application. (sharpAdbClient and mAdb). AdbClient. Instance.GetDevices() func-
• AdbServer.StartServer method is used for starting adb shell. tion gets connected device status. If device is connected, then adb
• DeviceMonitor is used to check device connection status (de- get prop command is utilized via AdbClient.Instance.
vice connected/disconnected). ExecuteRemoteCommand to get connected device information such
• AdbClient.Instance.ExecuteRemoteCommand method is used to as Device Serial No, Root access etc. Root access is required for
run ‘‘adb shell’’ commands on android device. performing Web browsers forensic data acquisition. If device has
• IOutputReciver object is used to read/receive executed ‘‘adb’’ not root access, integrated third party module is activated for
command output. flashing stock recovery. We have discussed third-party module
SQLite Package System.Data.SQLite Package is used for forensics integration in later sections. In forensic data acquisition, evidence
analysis of SQLite database files. integrity is the major concern. To maintain evidence integrity,
Regular Expressions System.Regex class is used for extracting adb shell md5sum method is utilized to calculate MD5 hash before
forensics data from web browsers cache. Regular expression is a extracting forensic data. This hash is compared with extracted
pattern that can be matched against an input text. A pattern may forensic data after pulling from device (adb pull method is used
consists of character literals, constructs and operators. There are for pulling forensics data from device).
different categories of operators, constructs and characters that let Integrated Third-Party Module: Third-Party Module consists
you to define regular expressions [25,26]. of Odin and fast boot. Odin is the ROM Flashing tool for Samsung
Android devices [31]. Fast Boot firmware flashing tool is used for
5.2. AndroKit implementation MTK Chip based Android Smart-phones. These applications are
integrated with AndroKit for flashing Stock/Custom recoveries.
AndroKit’s implementation consists of following modules; Flashing recovery is a method for getting root access on android
M. Asim, M.F. Amjad, W. Iqbal et al. / Future Generation Computer Systems 94 (2019) 781–794 789

Fig. 10. Miscellaneous Data for Web Browsers Forensics.

device. Custom recoveries are composed of mini OS which perform has been deployed. Evidence tampering protection is one of the
various system tasks. This is like small piece of OS running inde- major concerns in forensic data protection. For users query exe-
pendent of system image and can control various system function cutions in manual analysis, queries are restricted to only SELECT
and settings. In market, there are two popular stock recoveries. query. This protects web browsers forensic data from tampering.
TWRP (Team Win Recovery Project) and CWM (Clockwork Mod); Forensic data extraction from cache uses Regex expressions.
both provide fantastic features such as backup device, provide Regex expressions are also used for Base64 Encoded images
root access, wipe device, mount partitions, install applications, extraction from cache files, however for decoding these images,
calculate md5sum, execute basic UNIX commands and much more. Convert.FromBase64String function has been used.
adb commands are also supported by the stock recoveries [32]. On Forensic Data Reporting Module: Data Reporting module is
Some Android device custom images are flashed with over the air used to export forensics results to pdf or html file.
(OTA) updates [33].
Forensic Data Analysis Module: AndroKit uses automated and 5.3. AndroKit design
manual forensic data analysis. SQLite Package System.Data.SQLite
and Regular Expressions System.Regex classes are used for auto- AndroKit GUI Design consists of following interfaces/Tabs
mated forensic data analysis. For manual analysis, SQLite Package (Fig. 12).
790 M. Asim, M.F. Amjad, W. Iqbal et al. / Future Generation Computer Systems 94 (2019) 781–794

Fig. 11. A Complete Summary of various artifacts of web browsers on Android.

Main Interface: AndroKit Main Interface GUI contains follow- Information Tab: Information Tab shows the status of connected
ing controls; device, Mode (Online, Recovery, Downloading) and settings. This
control integrates forensics information extraction module. Web
• Extract Data: Extract data control is used for extraction of web Browsers Tab: After extracting/loading forensics data in AndroKit,
browsers forensic data (forensic data Extraction module is this control shows each web browser forensic data in separate tab
integrated in this control). (Fig. 13).
• Select Extracted: This control is used for loading already ac- Cache Analysis Tab: After extracting/loading forensics data in
quired web browsers forensics evidence. AndroKit, This control shows each web browsers cache data such as
• Odin/Fast boot: This control integrates Third-Party firmware images (JPG, PNG, base 64 decoded images etc.). Analysis: Analysis
flashing tools Odin (for Samsung devices) and Fastboot (for Tab shows all acquire SQLite files for manual analysis. User can ex-
MTK chipset based Android Phones). ecute SQL queries manually (Fig. 14). Queries are restricted to only
M. Asim, M.F. Amjad, W. Iqbal et al. / Future Generation Computer Systems 94 (2019) 781–794 791

Fig. 12. AndroKit: User Interface.

Fig. 13. AndroKit: Web History.

Table 11
Comparative analysis of AndroKit features with other forensics tool-kits features.
Forensics Tool-Kits Andro Kit Oxygen Andriller MOBILedit Belkasoft
Screen Lock bypass ✓ ✓ (Only MTK) ✕ ✕ ✕
Root device ✓ ✓ (Only MTK) ✕ ✕ ✕
Flash Stock Recovery ✓ ✕ ✕ ✕ ✕
Custom Query Execution ✓ ✕ ✕ ✕ ✕

SELECT command. Forensic Data Analysis Module is integrated in For this analysis, Flash Custom Recovery technique was used to
this control. gain root access via AndroKit (Third-party integrated module) [24].
All Files Tab: All files tab shows all extracted files, forensic Odin was used to flash TWRP recovery image on Samsung Al-
investigators can use this option to display Binary, HEX and ASCII pha. After getting root access, information and evidence extraction
of all extracted files. This will help in searching any text, binary or modules were used for forensic evidence acquisition. Further, ex-
hex values in extracted files. tracted evidence is analyzed with Evidence Analysis module.
792 M. Asim, M.F. Amjad, W. Iqbal et al. / Future Generation Computer Systems 94 (2019) 781–794

Fig. 14. AndroKit: User Query (Manual Analysis).

6. Comparative analysis of androkit with other forensics tool- 7. Summary


kits

In this research, popular android web browsers are evaluated


For comparative analysis of AndroKit with standard forensics
Tool-Kits; Chrome (Version 56.0.2924.87), Opera (Version for digital evidence. Based on the analysis results, AndroKit is
42.3.2246.113338), Mozilla Version (53.0.2) and Dolphin Version proposed for web browsers forensics. AndroKit provides advance
(11.5.19) are installed on Samsung Grand Prime (Android OS ver- forensic data acquisition and analysis features such as flashing
sion 4.0 and 5.0), Samsung S3 (Android OS version 5.0) and Sam- stock recovery, custom query execution etc. Further, AndroKit
sung Alpha (Android OS version 4.2 and 5.0). After installation extracts cookies, Bookmarks, Web History, User credentials, recon-
of web browsers, Standard Mobile Forensics Tool-Kits; Oxygen struct cache data (images, web pages etc.), Decode base64encoded
Forensics, Andriller, MOBILedit and Belkasoft Evidence Center are images, stored sessions, save pages, downloaded files, Tabs in-
installed on Windows 7 PC. Web browsers forensic analysis is formation and more interesting digital evidence which will help
performed on following scenario; forensics investigators in their investigations.
Non-Rooted Locked Android Device: In this scenario, standard
forensic toolkits are compared with AndroKit. All standard foren-
sics tool-kits failed to extract forensic evidences from Non-Rooted 8. Conclusion
locked Android devices shown in Table 11. Standard tools like
Oxygen Forensics provides lock screen bypass and device rooting
capabilities only for MTK Chipset based devices. Only AndroKit This paper discusses popular android based web browsers
is able to successfully get root access on device and bypass lock (Chrome, Opera, Mozilla Firefox and Dolphin), how these web
screen via flashing stock recovery mode. After getting root access, browsers store forensics data on android devices and how inves-
forensics evidence is acquired from Android devices. tigator can acquire Web browsers forensics data from Android
Rooted Android Device: On Rooted devices, all forensic tools smart-phones. Further, the design of AndroKit and its implemen-
are able to acquire forensics evidence form android web browsers tation is discussed. Finally, comparative analysis of AndroKit with
but analysis features vary in each forensics tool-kit. AndroKit has other standard forensic tool-kits is performed in forensic sound
more analysis features (such as custom queries, cache data etc.)
manner. Comparative analysis results show that AndroKit provides
as compared to standard forensic tool-kits shown in Table 11 and
maximum features as compared to other standard forensic tool-
Fig. 15. Some standard tool-kits, like MOBILedit needs to install
kits.
client application on device for forensics evidence association but
this is not feasible forensics sound method to acquire evidence In smart phones, digital forensics industries are not aligned with
from device, because it violates user data partition integrity on smart phones technology development due to faster development
installing client application. In analysis, we found Androkit has in technology as compare to forensics industries. In future, An-
better features than other standard forensic tool-kits. Detailed droKit can be extended to support other android applications such
comparative analysis results are presented in Table 11 and Fig. 15. as social media applications (Whatsapp, Viber, Messenger etc.).
M. Asim, M.F. Amjad, W. Iqbal et al. / Future Generation Computer Systems 94 (2019) 781–794 793

Fig. 15. Comparative Analysis of AndroKit Web Browsers forensics with Other Forensics Tool-Kits.

References [12] A. Nalawade, S. Bharne, V. Mane, Forensic analysis and evidence collection
for web browser activity, in: Automatic Control and Dynamic Optimization
[1] The Communications Market Report 2017: United Kingdom (online). Techniques (ICACDOT), International Conference on, 2016, pp. 518–522.
Available: https://www.ofcom.org.uk/data/assets/pdf_file/0017/105074/ [13] A. Varol, Y.U. Sonmez, The importance of web activities for computer foren-
cmr-2017-uk.pdf. (Accessed 08 January 2018). sics, Computer Science and Engineering (UBMK), 2017 International Confer-
[2] Global mobile OS market share in sales to end users from 1st quarter 2009 ence on, 2017, pp. 66–71.
to 2nd quarter 2017 (online). Available: https://www.statista.com/statistics/ [14] Pereira Murilo Tito, Forensic analysis of the Firefox3 internet history and
266136/global-market-share-held-by-smartphone-operating-systems/. recovery of deleted SQLite records, Digital Investigation 5 (2009) 93–103.
(Accessed 08 January 2018). [15] S. Mahaju, T. Atkison, Evaluation of firefox browser forensics tools, in: Pro-
[3] J. Oh, S. Lee, S. Lee, Advanced evidence collection and analysis of web browser ceedings of the SouthEast Conference, ACM, 2017, pp. 5–12.
activity, Digital Investigation 8 (2011) S62–S70. [16] D. Rathod, Web browser forensics: google chrome, Intl. J. Adv. Res. Comput.
[4] A. Rahman, N. Hidayah, K.R. Choo, A survey of information security incident Sci. 8 (7) (2017) 518–522.
handling in the cloud, Comput. Secur. 49 (2015) 45–69. [17] E.A. Barghouthy, A. Marrington, I. Baggil, The forensic investigation of android
[5] J. Gratchoff, G. Kroon, Project Spartan Forensics, Amsterdam University, 2015. private browsing sessions using Orweb, in: 5th International Conference on
[6] Lu Huimin, Yujie Li, Tomoki Uemura, Hyoungseop Kim, Seiichi Serikawa,
Computer Science and Information Technology, CSIT, Dubai, UAE 2013, 2013.
Low illumination underwater light field images reconstruction using deep
[18] Y.J. Jang, J. Kwak, Digital forensics investigation methodology applicable for
convolutional neural networks, Future Gener. Comput. Syst. (2018).
social network services, Multimedia Tools Appl. 74 (14) (2015) 5029–5040.
[7] Lu Huimin, Yujie Li, Shenglin Mu, Dong Wang, Hyoungseop Kim, Seiichi
[19] T. Vidas, C. Zhang, N. Christin, Toward a general collection methodology for
Serikawa, Motor anomaly detection for unmanned aerial vehicles using re-
Android devices, Digital Investigation 8 (2011) S14–S24.
inforcement learning, IEEE Internet Things J. (2017).
[8] Lu Huimin, Yujie Li, Min Chen, Hyoungseop Kim, Seiichi Serikawa, Brain in- [20] S. Wu, Y. Zhang, X. Wang, X. Xiong, Forensic analysis of WeChat on android
telligence: go beyond artificial intelligence, Mobile Netw. Appl. 23 (2) (2018) smartphones, in: Proceedings of the 16th Annual USA Digital Forensics Re-
368–375. search Conference, DFRWS, USA, 2016.
[9] Q. Darren, B. Martini, K.R. Choo, Cloud Storage Forensics, Syngress, 2013. [21] A. Shortall, M.A.H.B. Azhar, Forensic Acquisitions of WhatsApp Data on Popu-
[10] A. Reed, M. Scanlon, Le-Khac. N, Forensic analysis of epic privacy browser on lar Mobile Platforms, in: Sixth International Conference on Emerging Security
windows operating Systems, in: Proceedings of the 16th European Confer- Technologies, EST, 2015.
ence on Cyber Warfare and Security, ECCWS 2017, vol. 1, 2017, pp. 341–350. [22] A. Hamid, F. Ahmad, K. Ram, A. Khalique, Implementation of forensic analysis
[11] E. Akbal, F. Günes, A. Akbal, Digital forensic analyses of web browser records, procedures for whatsapp and viber android applications, Intl. J. Comput. Appl.
JSW 11 (7) (2016) 631–637. 128 (12) (2015) 26–33.
794 M. Asim, M.F. Amjad, W. Iqbal et al. / Future Generation Computer Systems 94 (2019) 781–794

[23] S.C. K.M.T., L.-K. N.A., Forensics acquisition and analysis of instant messaging
and VoIP applications, in: Computational Forensics, in: Lecture Notes in Dr. Hammad Afzal is currently heading ‘‘The Center
Computer Science, vol. 8915, Springer, Cham, 2015, p. 27. of Data and Text Engineering and Mining’’ (CoDTeEM)
[24] P.E. King, Using TWRP’s new ADB interface (online). Available: http: group at NUST. His primary interests are machine learn-
//www.pocketables.com/2014/10/using-twrps-new-adb-interface.html ing, text and data mining systems. He completed PhD
(Accessed 08 February 2018). from School of Computer Science, University of Manch-
[25] Jeffrey E.F. Friedl, Generic Mastering Regular Expressions: Powerful Tech- ester, UK in Dec, 2009 under supervision of Dr. Goran
niques for Perl and Other Tools (Nutshell Handbook), O’Reilly and Associates, Nenadic in Text Mining Group. Before PhD, he completed
1997. MSc in Advanced Computing Sciences from University of
[26] M.L. Scott, Programming Language Pragmatics, Morgan Kaufmann, ISBN 1- Manchester, UK where he was awarded Program Prize of
55860-(1999) 442-1. the year from Department of Computation for acquiring
[27] (online). Available: http://kb.digital-detective.net/display/BF/Page+ highest grades in MSc courses. He has also been affiliated with Digital Enterprise
Transitions (Accessed 07 February 2018). Research Institute (DERI), National University of Ireland, Galway as a Research
[28] Webp (online). Available: https://developers.google.com/speed/webp/docs/ Assistant from July, 2009 to Dec, 2009.
riff_container?csw=1.
[29] What is MHTML? What Opens a MHTML? File Format List from WhatIs.com
(online). Available: http://whatis.techtarget.com/fileformat/MHTML-
MHTML-document-MIME (Accessed 08 February 2018).
[30] Android Debug Bridge (online). Available: https://developer.android.com/
studio/commandline/adb.html#howadbworks. (Accessed 25 January 2018). Dr. Haider Abbas received the M.S. degree in En-
[31] Samsung Odin (online). Available: http://odindownload.com. (Accessed 08 gineering and Management of Information Systems and
February 2018). the Ph.D. degree in Information Security from the KTH-
[32] P.E. King, Using TWRP’s new ADB interface (online). Available: http:// Royal Institute of Technology, Stockholm, Sweden, in
www.pocketables.com/2014/10/using-twrps-new-adb-interface.html. (Ac- 2006 and 2010, respectively. His professional career con-
cessed 08 February 2018). sists of activities ranging from research and develop-
[33] OTA Updates (online). Available: https://source.android.com/devices/tech/ ment and industry consultations (government and pri-
ota/. (Accessed 08 February 2018). vate), through multi-national research projects, research
fellowships, doctoral studies advisory services, interna-
tional journal editorships, conferences/workshops chair,
invited/keynote speaker, technical program committee member, and reviewer
Muhammad Asim is a Researcher, IT Security Pro- for several international journals and conferences. He is currently a Cyber Secu-
fessional and Digital Forensics Investigator. He did his rity Professional, an Academician, a Researcher, and an Industry Consultant who
bachelor’s degree in Information Technology and master took professional trainings and certifications from the Massachusetts Institute of
degree in Information Security from Military College of Technology, USA; Stockholm University, Sweden; the Stockholm School of En-
Signals, National University of Science and Technology trepreneurship, Sweden; IBM, USA; and the EC Council. He is also an Adjunct
(NUST) in 2018. He has more than 4 years of indus- Faculty and Doctoral Studies Advisor at the Florida Institute of Technology, USA and
trial experience (including R&D organizations) in Cyber Manchester Metropolitan University, United Kingdom. In recognition of his services
Security.The major areas of his interest includes Digi- to the international research community and excellence in professional standing, he
tal Forensics, Block-Chain Security, IT Security Auditing, has been awarded one of the youngest Fellows of the Institution of Engineering and
Cryptographic Products Security Evaluation and Malware Technology, U.K.; a fellow of the British Computer Society, U.K.; and a fellow of the
Analysis. Institute of Science and Technology, U.K.

Dr. Faisal Amjad is working as an Assistant Pro-


fessor at National University of Sciences and Technol-
ogy (NUST), Pakistan since 2008. He completed his PhD
in Computer Science from University of Central Florida Dr. Yin Zhang is an Assistant Professor of the
(UCF), USA in 2015. His main areas of interests have been School of Information and Safety Engineering, Zhong-
Game Theory, Cognitive Radio; however, he recently has nan University of Economics and Law (ZUEL), China.
found interest in machine learning techniques in business He is an IEEE Senior Member since 2016. He is an
intelligence and information security domain. Currently, Excellent Young Scholar at ZUEL. He is Vice-chair
he is also associated with ‘‘Center of Data and Text En- of IEEE Computer Society Big Data STC. He was a Poster-
gineering and Mining (CoDTeEM)’’ group at NUST where Doctoral Fellow in the School of Computer Science and
he is exploring machine learning techniques in information security and forensics Technology at Huazhong University of Science and Tech-
domain. nology, China. He serves as editor or associate editor for
IEEE Access, IEEE Sensors Journal, etc. He is a Guest Editor
Mian Muhammad Waseem Iqbal is an academician, for Mobile Networks and Applications, Sensors, Multimedia Tools and Applications,
researcher, security professional and industry consultant. Journal of Medical Systems, New Review of Hypermedia and Multimedia, etc. He
He did his bachelor’s degree in Computer Sciences from also served as Track Chair of IEEE CSCN 2017, TPC Co-Chair of CloudComp 2015 and
Department of Computer Science, University of Peshawar TRIDENTCOM 2017, etc. He has published more than 50 prestigious conference and
in 2008. He achieved merit based scholarship throughout journal papers. His research interests include intelligent service computing, big data
his bachelor’s degree. He completed his Masters in Infor- and social network, etc.
mation Security from Military College of Signals – NUST
in 2012. He was inducted as Lecturer at Department of
Information Security (NUST) in May 2012. In Feb 2015
he was promoted as Assistant Professor. Currently he
is enrolled in PhD program and is in research phase. His professional services
include, but not limited to Industry Consultation, Workshops Organizer/Resource
Person, Technical Program Committee member, Conference Chief organizer, Invited
speaker and reviewer for several International conferences. He has authored over
17 scientific research articles in prestigious international journals (ISI-Indexed) and
conferences. He is principal advisor for more than 8 MS students and 10 UG projects.
8 out 10 UG projects are industry funded projects. Mr. Waseem has conducted more
the 15 CEH, CHFI, CSCU and Forensics practical hands on workshops for industry
and armed forces. In recognition of Mr. Waseem services, he was awarded Overall
University Best Teacher Award for the year 2014/15.

View publication stats

S-ar putea să vă placă și