TY - JOUR
T1 - Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems
T2 - Case study with KakaoTalk, NateOn and QQ messenger
AU - Choi, Jusop
AU - Yu, Jaegwan
AU - Hyun, Sangwon
AU - Kim, Hyoungshick
N1 - Publisher Copyright:
© 2019 Jusop Choi, Jaegwan Yu, Sangwon Hyun, Hyoungshick Kim
PY - 2019/4
Y1 - 2019/4
N2 - Instant messaging applications store users' personal data (e.g., user profile, chat messages, photos and video clips). Because those data typically include privacy sensitive information, most instant messaging applications are trying to protect the stored data in an encrypted form so that the authorized messaging application itself can only access the data. In this paper, we analyzed the locations and file formats of personal data files in three instant messaging applications (KakaoTalk, NateOn, and QQ)which are the most popularly used in China and South Korea. We particularly examined the encryption and decryption procedures for internal databases in those messaging applications through reverse-engineering. Our analysis results demonstrate how the database files of those instant messaging applications are stored and encrypted. Moreover, in the cases of KakaoTalk and NateOn applications, we found that their encrypted database files can successfully be recovered without requiring user password. We also found that QQ messenger stores the encryption key for the database files into an external server. This implementation may raise another privacy concern because users’ personal data can be freely accessed by the service provider without user consent.
AB - Instant messaging applications store users' personal data (e.g., user profile, chat messages, photos and video clips). Because those data typically include privacy sensitive information, most instant messaging applications are trying to protect the stored data in an encrypted form so that the authorized messaging application itself can only access the data. In this paper, we analyzed the locations and file formats of personal data files in three instant messaging applications (KakaoTalk, NateOn, and QQ)which are the most popularly used in China and South Korea. We particularly examined the encryption and decryption procedures for internal databases in those messaging applications through reverse-engineering. Our analysis results demonstrate how the database files of those instant messaging applications are stored and encrypted. Moreover, in the cases of KakaoTalk and NateOn applications, we found that their encrypted database files can successfully be recovered without requiring user password. We also found that QQ messenger stores the encryption key for the database files into an external server. This implementation may raise another privacy concern because users’ personal data can be freely accessed by the service provider without user consent.
KW - Database encryption
KW - Forensic analysis
KW - Instant messaging applications
KW - Key recovery
UR - https://www.scopus.com/pages/publications/85064862189
U2 - 10.1016/j.diin.2019.01.011
DO - 10.1016/j.diin.2019.01.011
M3 - Article
AN - SCOPUS:85064862189
SN - 1742-2876
VL - 28
SP - S50-S59
JO - Digital Investigation
JF - Digital Investigation
ER -