<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CSSE</journal-id>
<journal-id journal-id-type="nlm-ta">CSSE</journal-id>
<journal-id journal-id-type="publisher-id">CSSE</journal-id>
<journal-title-group>
<journal-title>Computer Systems Science &#x0026; Engineering</journal-title>
</journal-title-group><issn pub-type="ppub">0267-6192</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">14472</article-id>
<article-id pub-id-type="doi">10.32604/csse.2021.014472</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Instagram Mobile Application Digital Forensics</article-title><alt-title alt-title-type="left-running-head">Instagram Mobile Application Digital Forensics</alt-title><alt-title alt-title-type="right-running-head">Instagram Mobile Application Digital Forensics</alt-title>
</title-group>
<contrib-group content-type="authors">
<contrib id="author-1" contrib-type="author">
<name name-style="western">
<surname>Mubarik</surname>
<given-names>Muhammad Asim</given-names>
</name>
<xref ref-type="aff" rid="aff-1">1</xref>
</contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western">
<surname>Wang</surname>
<given-names>Zhijian</given-names>
</name>
<xref ref-type="aff" rid="aff-1">1</xref>
</contrib>
<contrib id="author-3" contrib-type="author" corresp="yes">
<name name-style="western">
<surname>Nam</surname>
<given-names>Yunyoung</given-names>
</name>
<xref ref-type="aff" rid="aff-2">2</xref>
<email>ynam@sch.ac.kr</email>
</contrib> 
<contrib id="author-4" contrib-type="author">
<name name-style="western">
<surname>Kadry</surname>
<given-names>Seifedine</given-names>
</name>
<xref ref-type="aff" rid="aff-3">3</xref>
</contrib>
<contrib id="author-5" contrib-type="author">
<name name-style="western">
<surname>waqar</surname>
<given-names>Muhammad Azam</given-names>
</name>
<xref ref-type="aff" rid="aff-4">4</xref>
</contrib>
<aff id="aff-1">
<label>1</label><institution>College of Information and Computer Science, Hohai University</institution>, <addr-line>Nanjing, 210098</addr-line>, <country>China</country></aff>
<aff id="aff-2">
<label>2</label><institution>Department of Computer Science and Engineering, Soonchunhyang University</institution>, <addr-line>Asan, 336811</addr-line>, <country>Korea</country></aff>
<aff id="aff-3">
<label>3</label><institution>Department of Mathematics and Computer Science, Beirut Arab University</institution>, <addr-line>Beirut, 000000</addr-line>, <country>Lebanon</country></aff>
<aff id="aff-4">
<label>4</label><institution>School of Business Management, NFC Institute of Engineering &#x0026; Fertilizer Research</institution>, <addr-line>Faisalabad, 38800</addr-line>, <country>Pakistan</country></aff>
</contrib-group><author-notes><corresp id="cor1">&#x002A;Corresponding Author: Yunyoung Nam. Email: <email>ynam@sch.ac.kr</email></corresp></author-notes>
<pub-date pub-type="epub" date-type="pub" iso-8601-date="2020-12-21">
<day>21</day>
<month>12</month>
<year iso-8601-date="2021">2021</year>
</pub-date>
<volume>37</volume>
<issue>2</issue>
<fpage>169</fpage>
<lpage>186</lpage>
<history>
<date date-type="received">
<day>22</day>
<month>9</month>
<year iso-8601-date="2020">2020</year>
</date>
<date date-type="accepted">
<day>27</day>
<month>11</month>
<year iso-8601-date="2020">2020</year>
</date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2021 Mubarik et al.</copyright-statement>
<copyright-year>2021</copyright-year>
<copyright-holder>Mubarik et al.</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CSSE_14472.pdf"></self-uri>
<abstract>
<p>In this research, we developed a plugin for our automated digital forensics framework to extract and preserve the evidence from the Android and the IOS-based mobile phone application, Instagram. This plugin extracts personal details from Instagram users, e.g., name, user name, mobile number, ID, direct text or audio, video, and picture messages exchanged between different Instagram users. While developing the plugin, we identified resources available in both Android and IOS-based devices holding key forensics artifacts. We highlighted the poor privacy scheme employed by Instagram. This work, has shown how the sensitive data posted in the Instagram mobile application can easily be reconstructed, and how the traces, as well as the URL links of visual messages, can be used to access the privacy of any Instagram user without any critical credential verification. We also employed the anti-forensics method on the Instagram Android&#x2019;s application and were able to restore the application from the altered or corrupted database file, which any criminal mind can use to set up or trap someone else. The outcome of this research is a plugin for our digital forensics ready framework software which could be used by law enforcement and regulatory agencies to reconstruct the digital evidence available in the Instagram mobile application directories on both Android and IOS-based mobile phones.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Digital forensics</kwd>
<kwd>Instagram</kwd>
<kwd>mobile application forensics</kwd>
<kwd>anti-forensics</kwd>
<kwd>forensics framework plugin</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>Since the introduction of Facebook, online social networks have evolved (over the last decade) and a countless number of applications, that provide different features, have surfaced on the Internet [<xref ref-type="bibr" rid="ref-1">1</xref>]. These applications vary from generic social network services, to image-sharing, and video sharing, social networking services. Their primary purpose is help people from different continents to stay connected with one another.</p>
<p>Among the most popular social networking sites is Instagram, (primarily used via its mobile application) [<xref ref-type="bibr" rid="ref-2">2</xref>] which has over a billion registered users [<xref ref-type="bibr" rid="ref-3">3</xref>]. It is a social networking application that lets users capture and share photos and videos within their social circles. Users of Instagram, register themselves with a unique user ID and password. They also have the option of connecting their Instagram accounts with their Facebook accounts, which help users share their photos and videos with their audience (social circles) more effectively. Similar to Facebook&#x2019;s functionality, every Instagram user has their own personal newsfeed, which functions as a personal notice board, displaying content shared by individuals or pages that the user has subscribed to (&#x201C;follows&#x201D;). This visual sharing platform has become more popular nowadays because Instagram provides users with additional features including video editing and photo editing tools (enabling users to add filters, animals, and shapes, to their photos and videos). The &#x201C;story&#x201D; feature of Instagram allows users to attract more audience, which consequently helps them increase interaction on their regular posts. This results in users accumulating more highly desired &#x201C;likes&#x201D; on their posts. The &#x201C;story&#x201D; functions as a secondary newsfeed, situated atop the main personal newsfeed of every Instagram user. Through such activities, the platforms helps people from across the globe, to connect and form new relationships, in a very interactive manner. However, unbeknownst to its users, applications such as Instagram provide personal information of its users to other users, which can be potentially dangerous. In today&#x2019;s technologically advanced era, people are using platforms such as Instagram to find their future spouses online. Couples connect with each other freely on Instagram, without comprehending the potential danger they are exposed to. Cases of online theft, copyright infringement, extortion, kidnapping [<xref ref-type="bibr" rid="ref-4">4</xref>] and even rape, have been reported, which occurred because the victim had trusted a friend from their social network friend list, and shared personal information online.</p>
<p>In recent times, more and more cases are being reported to investigation agencies, which involve criminal activity caused by the misuse of social media platforms. These investigation agencies employ various digital forensics tools to extract key evidence from the mobile devices of culprits, to help get them convicted in the court of law. The problem here is that there are so many different devices and applications generating such large amounts of data, that its difficult for digital forensics experts keep themselves updated on latest digital forensics tools [<xref ref-type="bibr" rid="ref-5">5</xref>]. Keeping in mind the significance of social networking applications and digital forensics, national governments are now updating their standards and training their staff to detect drug-related crimes and stop drug trafficking operations [<xref ref-type="bibr" rid="ref-6">6</xref>].</p>
<p>&#x201C;So many applications and so many technologies are being created and continuously updated, that forensic investigators cannot keep up&#x201D; [<xref ref-type="bibr" rid="ref-7">7</xref>].</p>
<p>&#x201C;Our Digital Forensics research group here at Shanghai Forensic Research Center keeps adding automated forensics plugins for every new app that is popular among the masses so that our law enforcement officers can extract evidence from all the apps available on mobile phones whether it&#x2019;s an Android phone or an IOS phone.&#x201D;</p>
<p>In this paper, we have studied the forensic artifacts of the Instagram application on both Android and IOS phones. We implemented code to automatically extract these forensics artifacts using our forensic framework environment, which is capable of extracting evidence from more than seventy different Android and IOS applications. At the end of this paper, we have discussed an anti-forensics experiment conducted on the Android Instagram application, to gauge its effectiveness. We have also presented a few privacy issues that we found in both versions of the Instagram application (Android and IOS).</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Related Work</title>
<p>Forensics analysis of the Instagram mobile application is not a very popular topic. Several researchers have done the forensics analysis of Instagram, but none of them have helped digital forensics investigators to reconstruct the data from forensic artifacts available in mobile devices. Instagram has always been a successful and popular application. Within only two months of its inception, it had 2 million users registered worldwide. The popularity of the Instagram application coupled with the abundant forensics artifacts it leaves behind is why forensics experts find the application so interesting. Consequently, standalone applications like Instagram that run on mobile phones can provide add-on forensic information to help identify criminal suspects. A suspect&#x2019;s geolocation near a crime scene and their digital signature available on their installed Instagram application, can help resolve many cases. Such applications nowadays also provide a very convenient one-tap login facility, which allows you to set your mobile phone as your default device.</p>
<p>Reema Al Mushcab et al. performed forensics analysis of the iPhone 5s Instagram application [<xref ref-type="bibr" rid="ref-8">8</xref>]. Their focus was primarily on &#x201C;write-blockers&#x201D; rather than the forensics artifacts of the Instagram application. A problem that we identified in this research is that they could not locate the direct messages database in the Instagram directory &#x201C;com.instagram.android&#x201D; of the IOS application, where the main evidence usually resides. This is the main focus of our research. We want to extract evidence (messages exchanged between the victim and the accused directly using this application) of a criminal nature, which will prove the involvement of suspects in kidnapping, murdering, bombing, raping, or financial corruption cases.</p>
<p>In 2015, Ming [<xref ref-type="bibr" rid="ref-9">9</xref>] employed evidence-gathering techniques on Instagram using the Windows 10 Operating System. The focus of Ming Sang Chang&#x2019;s research matches our own research objectives which is to capture extensive evidence from social networking services that can be used to help deter people from committing crimes such as spreading slander, cyberstalking, cyberbullying, hacking, copyright infringement, rape, murder, and financial corruption. Chang&#x2019;s research involved capturing evidence from Internet Explorer and Google Chrome, using the SQLite database and WinHex to find data remnants of user&#x2019;s account IDs and passwords. The researchers created a scenario in which, after performing a criminal activity, the user tried to remove the digital evidence using Eraser Portable v5.8.8.1 and CCleaner V5.19.5633. The researchers subsequently performed digital forensics analysis of the user&#x2019;s hard drive to uncover any evidence. Unlike Mr. Chang&#x2019;s research, our own research focuses mainly on forensics analysis of the Android and IOS mobile applications.</p>
<p>Wong et al. (security researcher at Valkyrie-X Security Research Group) [<xref ref-type="bibr" rid="ref-10">10</xref>] conducted a detailed digital forensics study of Facebook&#x2019;s web application and mobile application. This research was conducted on the iPhone 3GS IOS version 4.3 which is why it&#x2019;s very old and outdated. The research is also limited only to IOS forensics, neglecting the large majority of Android device users.</p>
<p>Yusoff et al. [<xref ref-type="bibr" rid="ref-11">11</xref>], conducted a forensic investigation of social media and instant messaging services on Firefox OS, including Instagram, in 2017. This research involved using Forensics Toolkit (FTK) version 3.1.2 and HxD Hex Editor 1.7.7.0 to capture and analyze memory images on a phone called Peak (Geeksphone, 2013) running Mozilla FxOS. The limitation in this research is that volatile memory cannot hold data for long periods and forensic artifacts can only be found on the phone while Mozilla FxOS is running. If forensics analysis is performed after the phone has restarted, all the digital forensics evidence will have evaporated out of the phone&#x2019;s volatile memory. More importantly, every social networking service has now launched their own customized application, and registered users prefer accessing this application, rather than browsing the social media site it is affiliated with, on the mobile browser. The main reason for this is that users no longer need to re-login every time to use their desired social networking site, instead they can use the application&#x2019;s one-tap login feature. The mobile applications enable this feature by saving the registered user&#x2019;s account credentials on the mobile device. Mobile apps such as Instagram have their directory structures saved onto the users mobile device&#x2019;s physical storage. Such mobile applications store crucial information on persistent storage of the device aswell. In this research (of ours) we will show that the complete SQL lite database file can be found in different directories in both Android and IOS devices.</p>
<p>In 2015, Daniel Walnysky et al. [<xref ref-type="bibr" rid="ref-12">12</xref>], published their research on direct messaging mobile applications and established how evidentiary traces allow reconstruction of data, and permit reconstruction of activities performed by users and applications. Their work mainly focuses on only Android applications. In their research, they have also suggested that the automated reconstruction of data is also possible, mentioning it as the basis of their future work. This automated reconstruction of data is the main outcome of our own research. In our research&#x2019;s analysis and results section we will discuss how our framework reconstructs the forensic remnants available inside the mobile phone and the concerned application directories for both Android and Apple devices. Walnysky et al. [<xref ref-type="bibr" rid="ref-12">12</xref>], also performed similar work on Facebook forensics analysis [<xref ref-type="bibr" rid="ref-13">13</xref>,<xref ref-type="bibr" rid="ref-14">14</xref>]. Our own research group has also conducted similar extensive research on Mobile application&#x2019;s digital forensics. Until now, our group has performed digital forensics analysis on more than seventy popular mobile applications used by the masses in China and elsewhere. The fruits of our labor will enable law enforcement personnel to use our digital forensics-ready workstation to perform necessary forensics analysis in ongoing cases, and present the evidence in a court of law.</p>
<p>This paper discusses our research and development of a forensics plugin for the Instagram mobile application.</p>
</sec>
<sec id="s3">
<label>3</label>
<title>Test Environment and Requirements</title>
<p>This framework was developed in Visual Studio with devexpress tools installed. Below is a complete list of all the hardware and software tools used to perform the forensics analysis of both Android and IOS based mobile applications:<list list-type="bullet"><list-item>
<p>iPhone 7Plus (v. 12.0.1)</p></list-item><list-item>
<p>Meizu Note 6</p></list-item><list-item>
<p>Instagram (v. 69.0)</p></list-item><list-item>
<p>Apple iTunes application (v. 12.1)</p></list-item><list-item>
<p>Android Debug Bridge (ADB)</p></list-item><list-item>
<p>Microsoft Visual Studio Professional 2012 (v. 11.0.50727.1 RTMREL)</p></list-item><list-item>
<p>DEVEXPRESS</p></list-item><list-item>
<p>SQLite Expert Professional (v. 3.5.21.2440)</p></list-item><list-item>
<p>DATABASE Browser for SQL open-source (Version 3.10.1)</p></list-item><list-item>
<p>Plist Editor Pro (v. 2.0)</p></list-item><list-item>
<p>Win Hex/X-Ways Forensics software</p></list-item><list-item>
<p>Apple&#x2019;s iPhone 7Plus USB data cable</p></list-item><list-item>
<p>Windows Photo Viewer</p></list-item><list-item>
<p>VLC Media player (v. 2.1.3)</p></list-item></list></p>
</sec>
<sec id="s4">
<label>4</label>
<title>Forensics Analysis of Android-Based Instagram Application</title>
<sec id="s4_1">
<label>4.1</label>
<title>Retrieval of the Instagram Directory Structure</title>
<p>We selected the Instagram application because our research group had already performed digital forensics for almost all the popular social media networking applications including Facebook, WhatsApp, Line, Weibo, and so many others. A picture of the front end for our framework can be seen in <xref ref-type="fig" rid="fig-1">Fig. 1</xref>.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Forensics framework front end</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-1.png"/>
</fig>
<p>We chose a mobile application based on popularity in China because this framework is designed for the use of Chinese law enforcement agencies and public security organizations to help solve cases more easily, and hence provide a more safe and secure social life within Chinese cities. We performed forensics analysis of the Instagram application for both Android and Apple IOS versions. For this activity, we first installed the Instagram application on an Android device as well as an Apple IOS device. In this specific experiment, we used an Android-based Meizu Note 5 phone and an Apple IOS 7 plus mobile device with IOS version 12.1.1.</p>
</sec>
<sec id="s4_2">
<label>4.2</label>
<title>Android Devices Data Extraction</title>
<p>The second stage was to utilize the &#x201C;pull&#x201D; command of Android Debug Bridge (ADB), which helped us extract the contents of &#x201C;com.instagram.android.&#x201D; We did this so that we could perform manual analysis of the changes in the contents of the package upon performing different activities (creating user, sending a message, and sharing pictures) via the mobile application. <xref ref-type="fig" rid="fig-2">Fig. 2</xref> shows the flow diagram of our experiment analysis process that we followed.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Flow diagram of the analysis process</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-2.png"/>
</fig>
</sec>
</sec>
<sec id="s5">
<label>5</label>
<title>Key Forensics Artifacts Identification of Android Instagram App</title>
<p>After acquiring the directories from an Android device, we performed a manual analysis of the application and attempted to locate the files of interest. <xref ref-type="table" rid="table-1">Tab. 1</xref> elaborates the information cum evidence that we wanted to locate from these devices; for this purpose, we performed an activities in the Instagram app so that data is generated and stored into the Instagram directory structure. We created two user names on Instagram to generate the forensics artifacts in the Instagram mobile application database. <xref ref-type="table" rid="table-1">Tab. 1</xref> elaborates on the activities performed in the mobile application to generate the data that would be extracted as evidence later on by our forensics framework.</p>
<table-wrap id="table-1">
<label>Table 1</label>
<caption>
<title>Activities performed</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Mobile &#x0026; Application</th>
<th>Activity</th>
</tr>
</thead>
<tbody>
<tr>
<td><list list-type="order"><list-item>
<p>Meizu Android Instagram.apk</p></list-item><list-item>
<p>IOS iPhone 7plus Instagram</p></list-item></list></td>
<td><list list-type="order"><list-item>
<p>New user registration</p></list-item><list-item>
<p>Following another Instagram user</p></list-item><list-item>
<p>Send text message</p></list-item><list-item>
<p>Send picture message</p></list-item><list-item>
<p>Send audio message</p></list-item><list-item>
<p>Send video clip</p></list-item></list></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Examination of Instagram on Android (com.instagram.android): Instagram creates com.instagram.android in data/app/ to store all the directories and files. Directories of com.instagram.android are shown in <xref ref-type="fig" rid="fig-3">Fig. 3</xref>.</p>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>Directory structure of com.instagram.android package extracted from Android Phone</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-3.png"/>
</fig>
<p>The &#x201C;databases&#x201D; directory and &#x201C;shared_prefs&#x201D; directory hold important forensics artifacts for digital forensics analysis of Instagram. &#x201C;shared_prefs&#x201D; directory contains XML files that hold &#x2018;full name&#x2019;, &#x2018;user name&#x2019;, &#x2018;id&#x2019;, location, and other important information about the user of the application. The databases directory contains the direct messages exchanged between the user and other Instagram users.</p>
<p>In the following section, we will describe the anatomy of the &#x201C;com.instagram.android_preferences.xml&#x201D; file. Snapshot of this file is presented in <xref ref-type="fig" rid="fig-4">Fig. 4</xref>, and we have listed important forensics artifacts in <xref ref-type="table" rid="table-2">Tab. 2</xref>.</p>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>Contents of com.instagram.android.xml</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-4.png"/>
</fig>
<table-wrap id="table-2">
<label>Table 2</label>
<caption>
<title>Important forensics artifacts available within User Access Map tag com.instagram.android.xml</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Forensic Information</th>
<th>Key</th>
<th>Value</th>
</tr>
</thead>
<tbody>
<tr>
<td>Unique ID by Instagram</td>
<td>Id</td>
<td>7526247127</td>
</tr>
<tr>
<td>Total number of people following this ID</td>
<td>follower_count</td>
<td>13</td>
</tr>
<tr>
<td>Count of IDs this user is following</td>
<td>following_count</td>
<td>Null</td>
</tr>
<tr>
<td>Full name of user</td>
<td>full_name</td>
<td>DarkTest</td>
</tr>
<tr>
<td>URL of user profile picture</td>
<td>profile_pic_url</td>
<td><uri>https://scontent-sit4-1.cdnInstagram.com/vp/b38273e465e0bb2777b6845dea25cbd2/5BB665AE/t51.2885-19/s150x150/30078315_2120078654888308_1563912706187067392_n.jpg</uri></td>
</tr>
<tr>
<td>Unique ID by Instagram for this profile picture</td>
<td>profile_pic_id</td>
<td>1759213689388687079_7526247127</td>
</tr>
<tr>
<td>User name registered on Instagram</td>
<td>Username</td>
<td>dark2539</td>
</tr>
<tr>
<td>Selfie picture URL</td>
<td>selfie_url</td>
<td>Null</td>
</tr>
<tr>
<td>Last online time</td>
<td>time_accessed</td>
<td>1527749843766</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>This XML file contains two important tags that store information regarding the user of the application; the information is stored in a key-value pairs format, which can be easily extracted using any programming technique. In our experiment, as we mentioned above, we utilized Visual Studio with devexpress tool, to program the extraction of these forensics artifacts. The rest of the XML files and directories contain user bootstrap services information, cookies, etc. The next directory of our interest is the databases directory, which contains direct messages (in the file named &#x2018;direct.db&#x2019;) exchanged between the registered user of the mobile application, and other Instagram users. <xref ref-type="fig" rid="fig-5">Fig. 5</xref> shows the relations and tables in the direct.db file of Instagram; In these tables, the messages table, contains the direct messages exchanged between different users and has great significance as digital forensics information.</p>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>Table relation in Direct.db</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-5.png"/>
</fig>
<p>Here, we can observe that the message-id and user-id are the current user&#x2019;s id to identify the user of the current Instagram mobile application. As Instagram stores a copy of the contents on the server side, so every message is assigned a server_item_id whereas contents that reside in mobile application directories are assigned client_item_id, while recipient_id timestamp is for when the message was received.</p>
<p>Message_type distinguishes whether the message is a text message or an audio-video message. In case it is a text message, the text is stored in the &#x2018;text&#x2019; field of this table. However, if the message is a picture or video message, then the link of the multimedia message is stored in the message field while the &#x2018;text&#x2019; field is kept empty and has no value stored in it; this has been shown in <xref ref-type="fig" rid="fig-5">Fig. 5</xref> and <xref ref-type="fig" rid="fig-6">Fig. 6b</xref> by highlighting the message field data in these pictures. The Message field is an important element of this table and stores the most valuable forensics information for all kinds of messages, whether it is a text, video, or audio message.</p>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>Messages table of Direct.db (b) Contents of message field messages table of Direct.db</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-6a.png"/>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-6b.png"/>
</fig>
<p>This information is stored in JSON format. Contents of the message field for text message and visual (image or video) messages are listed in <xref ref-type="fig" rid="fig-7">Fig. 7</xref>.</p>
<fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>JSON Contents of the message field</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-7.png"/>
</fig>
<table-wrap id="table-3">
<label>Table 3</label>
<caption>
<title>Important forensics artifacts available within in User Access Map tag</title>
</caption>
<table>
<colgroup>
<col/>
<col/>
<col/>
</colgroup>
<thead>
<tr>
<th>Forensic Information</th>
<th>Key</th>
<th>Value</th>
</tr>
</thead>
<tbody>
<tr>
<td>User information</td>
<td>User</td>
<td>&#x201C;username&#x201D;:&#x201C;dark2539&#x201D;,<break/>&#x201C;full_name&#x201D;:&#x201C;DarkTest&#x201D;,<break/>&#x201C;profile_pic_url&#x201D;:&#x201C;https://scontent-sit4-1.cdnInstagram.com/vp/b38273e465e0bb2777b6845dea25cbd2/5BB665AE/t51.2885-19/s150x150/30078315_2120078654888308_1563912706187067392_n.jpg, &#x201C;profile_pic_id&#x201D;: &#x201C;1759213689388687079_7526247127&#x201D;, &#x201C;hd_profile_pic_url_info&#x201D;:{&#x201C;url&#x201D;:&#x201C;https://scontent-sit4-1.cdnInstagram.com/vp/8ff5fbeb9abde2f5d483404c30eaba04/5BBCE9D6/t51.2885-19/30078315_2120078654888308_1563912706187067392_n.jpg&#x201D;</td>
</tr>
<tr>
<td>Instagram ID</td>
<td>Id</td>
<td>7526247127</td>
</tr>
<tr>
<td>Follower count</td>
<td>follower_count</td>
<td>14</td>
</tr>
<tr>
<td></td>
<td>following_count</td>
<td>18</td>
</tr>
<tr>
<td></td>
<td>besties_count</td>
<td>0</td>
</tr>
<tr>
<td></td>
<td>Timestamp</td>
<td>1524463960077529</td>
</tr>
<tr>
<td></td>
<td>Timestamp</td>
<td>1524463960077529</td>
</tr>
<tr>
<td></td>
<td>Text</td>
<td>this is darktest 2539 from m5</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Once we had identified the information available in the different files and directories, we extracted this information in our digital forensics ready framework software. For this purpose, we created our local databases to store the forensics artifacts in. In the results section, we have shown how we extracted valuable information from different files to be stored permanently in our forensics workstation evidence database.</p>
</sec>
<sec id="s6">
<label>6</label>
<title>Forensics Analysis of IOS-Based Instagram Application</title>
<p>For the logical acquisition of the iPhone image from Apple devices, iTunes is the best authentic software available. Many research articles suggest and recommend the use of iTunes for the logical acquisition of Apple device contents; in their research, Bader et al. [<xref ref-type="bibr" rid="ref-15">15</xref>] described in detail how the logical acquisition of a device image using iTunes, with auto synchronization disabled, ensures that the acquired logical image of the device is forensically sound. Once the whole directory structure containing the data for forensics analysis was extracted into our forensics workstation, we started analyzing the contents of the directories and files manually to find the evidence we needed so we could code our framework. The purpose of this framework would be to extract similar forensics artifacts automatically later by just the click of a button.</p>
</sec>
<sec id="s7">
<label>7</label>
<title>Key Forensics Artifacts Identification of Instagram in IOS-based Device</title>
<p>Logical acquisition of an IOS device using the backup facility, provides a wealth of information for forensic analysis [<xref ref-type="bibr" rid="ref-16">16</xref>]. After being installed on the IOS device, the Instagram application creates the following directory structure as shown in <xref ref-type="fig" rid="fig-8">Fig. 8</xref>. In the AppDomain directory of the iPhone, a directory with &#x201C;com.burbn.Instagram&#x201D; name is created to store the data of Instagram on the IOS device. We extracted the entire directory structure from the IOS device using the iTunes backup facility [<xref ref-type="bibr" rid="ref-17">17</xref>]. After manual analysis of this directory structure, we noted that the database file containing direct messages exchanged between users of Instagram, was stored in the &#x201C;AppDomain\com.burbn.Instagram\Library\Application Support\DirectSQLiteDatabase\7463799528.db&#x201D; file. Another important fact we noted was that the direct messages file was named differently from that of the Android database file name counterpart. This number 7463799528 is the unique identifier for each Instagram user. As seen in the &#x201C;com.instagram.android_preferences.xml&#x201D; file of the Android Instagram version, this kind of unique identifier is being used to identify users of Instagram as well. Similarly in the IOS, the database file name is also assigned a congruent identifier to distinguish between the messages and databases of different users. We will now explain how we extracted the messages exchanged between users from this &#x201C;7463799528.db&#x201D; file.</p>
<fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>Directory structure of com.burbn.Instagram package extracted from Apple iPhone</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-8.png"/>
</fig>
<p>The second important file that contains significant digital artifacts related to the Instagram user in IOS devices is the &#x201C;com.burbn.Instagram.plist,&#x201D; which is located in the &#x201C;AppDomain\com.burbn.Instagram\Library\Preferences&#x201D; directory.</p>
<p><xref ref-type="fig" rid="fig-9">Fig. 9</xref> reveals all the information stored within the &#x201C;com.burbn.Instagram.plist&#x201D; file. In this file we are only interested in the key data which can serve as evidence and give away the personal details of the mobile application&#x2019;s user (name, user name, phone number, email address).</p>
<fig id="fig-9">
<label>Figure 9</label>
<caption>
<title>Key forensics artifacts stored in com.burbn.Instagram.plist</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-9.png"/>
</fig>
<p>After we had identified the personal information associated with the user, we wanted to extract the personal messages exchanged through this device using the Instagram application. This information is available in the &#x201C;7463799528.db&#x201D; file. Analysis of this file showed that the archive column of the messages table contains important information stored in the Binary Large Object (BLOB) format.</p>
<p>In <xref ref-type="fig" rid="fig-10">Fig. 10</xref> you can see the contents of the database file and the contents of its corresponding messages table and &#x201C;archive&#x201D; column. It is important to note that pictures and video messages are not stored locally on the device, instead, if the user shared any visual message, only its URL would be stored in this local database file.</p>
<fig id="fig-10">
<label>Figure 10</label>
<caption>
<title>Table relation in 7463799528.db</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-10.png"/>
</fig>
<p>Upon analyzing the archive column&#x2019;s BLOB object, and contents of the binary data, it was found that this BLOB contains data in the bplist format as shown in <xref ref-type="fig" rid="fig-11">Fig. 11</xref>. The first 6 offsets of every BLOB object is 62 72 6c 69 73 74 which corresponds to a bplist format of data.</p>
<fig id="fig-11">
<label>Figure 11</label>
<caption>
<title>Pblist Hexadecimal Header in BLOB object</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-11.png"/>
</fig>
<p>In the next step, we exported the binary data into the bplist file. After this, we opened the bplist file with WinHex/X-Ways Forensics software, and were able to view the contents of a text message in hex file as shown in <xref ref-type="fig" rid="fig-12">Fig. 12</xref>.</p>
<fig id="fig-12">
<label>Figure 12</label>
<caption>
<title>The text message is visible along with related metadata in the BLOB object of the archive column (in the messages table)</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-12.png"/>
</fig>
<p>Further analysis of this binary data revealed the contents of text messages, which were found at offsets 11B3 to 11F7. For visual messages, the URL of the contents are also stored in a BLOB. This bplist file contains a directory named &#x201C;root&#x201D; which has four keys stored in its directory, namely: $archiver, $objects, $top, and $version (as shown in <xref ref-type="fig" rid="fig-13">Fig. 13</xref>).</p>
<fig id="fig-13">
<label>Figure 13</label>
<caption>
<title>Bplist list view</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-13.png"/>
</fig>
<p>$Objects has sub directories which store the text messages exchanged within them, or the URL of picture messages exchanged between different users. <xref ref-type="fig" rid="fig-14">Fig. 14</xref> shows the hierarchy of directories in this bplist, $Objects are stored as BLOB objects in the archive column, of the messages table, in the user direct messages database file. In the next section, we will discuss the forensics results and data reconstructed from these files.</p>
<fig id="fig-14">
<label>Figure 14</label>
<caption>
<title>List view &#x0026; XML view of the bplist extracted from the BLOB object of the archive column in the messages table</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-14.png"/>
</fig>
</sec>
<sec id="s8">
<label>8</label>
<title>Evidence Retrieval, Plugin Implementation, and Results</title>
<p>As elaborated in previous sections, we successfully identified and located the valuable information which could serve as potential evidence. In this section, we will now present the extracted evidence from the Instagram mobile application. Instagram forensics was implemented in our forensics-ready framework as a dynamic link library. A unique identifier was created, and in this folder, forensics data of each application was saved into a separate folder (named according to the corresponding mobile application). In case of Instagram, the IMINSTAGRAM directory stored a copy of original files extracted from the Instagram app. Briefly explaining how the forensics software operated; it first extracted, and made a copy of the files containing digital forensics artifacts (&#x201C;com.instagram.android,&#x201D; &#x201C;direct.db&#x201D; and &#x201C;burbn.Instagram.plist,&#x201D; &#x201C;7463799528.db&#x201D;) for both the IOS and Android devices respectively, into the IMInstagram directory, as shown in <xref ref-type="fig" rid="fig-15">Fig. 15</xref>. Then, the software created a results folder, in which it stored a database file, containing the reports of all relevant information and direct messages exchanged between the current user and other Instagram users. <xref ref-type="fig" rid="fig-16">Figs. 16</xref> and <xref ref-type="fig" rid="fig-17">17</xref> exhibit the extraction of the currently logged in user&#x2019;s information, and messages exchanged between this user and different users within this application.</p>
<fig id="fig-15">
<label>Figure 15</label>
<caption>
<title>Forensics workstation evidence files local copy</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-15.png"/>
</fig>
<fig id="fig-16">
<label>Figure 16</label>
<caption>
<title>Direct messages reconstructed from Android application</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-16.png"/>
</fig>
<fig id="fig-17">
<label>Figure 17</label>
<caption>
<title>User information retrieved from Meizu Android-based application</title>
</caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="fig-17.png"/>
</fig>
</sec>
<sec id="s9">
<label>9</label>
<title>Instagram Anti-Forensics on Android</title>
<p>In IOS-based devices, it is not possible to perform any anti-forensics techniques. However, for Android-based devices, if suspected culprits are aware of currently employed digital forensics techniques that could get them convicted, the culprits can potentially get away with their criminal activities by simply corrupting the evidence in the application directory. This can be done easily by simply extracting the database file located in the &#x201C;\com.instagram.android \databases\direct.db&#x201D; path of Instagram, and alter its contents, then subsequently save them back into the directory.</p>
<p>To confirm the presented hypothesis, we simulated this scenario, and attempted to change the contents of the text messages placed in &#x201C;direct.db,&#x201D; and save this direct.db file onto the following path &#x201C;\com.instagram.android\databases\direct.db.&#x201D;</p>
<p>Here are the details of this experiment.</p>
<p>We sent a message from the Android-based Meizu phone hosting &#x201C;Dark2539&#x201D; user to &#x201C;Mubarik_Muhammad&#x201D; Instagram user on the iPhone7 device.</p>
<p>Message: &#x201C;I am DarkTest from mezu&#x201D;</p>
<p>This message is located in &#x201C;\com.instagram.android\databases\direct.db&#x201D; file.</p>
<p>We extracted the &#x201C;direct.db&#x201D; file, opened it in the database software, and changed the contents of the message to</p>
<p>&#x201C;I am wangle from Meizu&#x201D;</p>
<p>In the next step, we restored this altered &#x2018;direct.db&#x2019; file into the phone.</p>
<p>The file was successfully restored on the Android phone.</p>
<p>Next, we connected the device to the internet, went online, and opened the Instagram Application, to check if our altered text is visible in the application as well.</p>
<p>As expected Instagram displayed the original text, &#x201C;I am DarkTest from Meizu.&#x201D;</p>
<p>This shows that Instagram maintains a copy of chat on their own servers, and updates the data when users appear online.</p>
<p>We concluded that a criminal may be smart enough to leave his/her phone offline. However another reason that invalidates this anti-forensics technique, the &#x201C;direct.db&#x201D; file also displays the date it was modified alongside it, so if the data is changed, it will be quite evident to a forensics analyst.</p>
</sec>
<sec id="s10">
<label>10</label>
<title>Privacy Issues of Instagram</title>
<p>During the forensics investigation of both the Android and IOS versions of the Instagram Application, we have found a serious privacy issue regarding user&#x2019;s multimedia content stored on the server-side. As in the previous sections, we have explained that pictures and videos shared by Instagram users are not stored in the local directory structure of the application, instead, the messages table of the database file stores only the URL link of the multimedia messages. A person with very little knowledge of digital forensics can extract this URL of multimedia messages and have access to a user&#x2019;s images and videos directly, using any web browser, and without having to verify or input any critical credentials (username or passwords). To test this, we experimented. The user Dark2539 shared a few pictures with the Mubarik_Muhammad account and we extracted the URL of these pictures from the messages table of the database file. All the URLs were available, so we accessed the URL in the Chrome web browser and successfully retrieved all the pictures.</p>
<p>This depicts that the invalidity of user privacy on Instagram; anyone can have access to your personal multimedia information if they has access to these URLs. When Dark2539 shared a picture of the Shanghai River with the Mubarik_Muhammad account, we extracted the URL from the messages table of the database and accessed the image in the Chrome browser. We successfully retrieved the image without inputting any user verification information. However (over time), as we were developing this plugin and writing this article, Instagram updated their application and the URLs extracted from the messages database table do not work anymore. We noticed a visible change in both URLs saved in an older version and a newer version of Instagram.</p>
<p>URL of Pictures shared in the old version.</p>
<p><uri>https://scontent-sit4-1.cdnInstagram.com/vp/8e2ae39215d58a78971a0fa373565e5d/5BB77629/t51.2885-19/s150x150/35509004_417214398762526_2675262676875083776_n.jpg</uri></p>
<p>URL of Pictures shared in New Version.</p>
<p><uri>https://scontent-lhr3-1.cdnInstagram.com/vp/32769d90c55fe39e08da1cd97c5deb98/5BDF0329/t51.2885-19/s150x150/35509004_417214398762526_2675262676875083776_n.jpg?efg&#x003D;eyJ1cmxnZW4iOiJ1cmxnZW5fZnJvbV9pZyJ9</uri></p>
<p>Old URLs were un-signed but now Instagram is using signed URLs for their pictures in the new version. URL signing is a way to control time-limited access to HTTP resources which are the pictures in our experiment. In the new URLs, Instagram has added a URL parameter &#x2018;efg&#x2019; which has an encrypted value; this acts as a URL signature. When we open the image URL, the Instagram server decrypts the signatures, and decides whether it is expired or not, based on the timestamp used while creating the URLs originally. Once the URL has expired, the Instagram app receives a new URL with updated signatures while the app is authenticated (logged in). If we try to run an expired URL in the Chrome browser (outside Instagram app scope), the Instagram server will not send us a new URL because we&#x2019;re not logged in. This resolves the privacy issues we found in the old version of Instagram.</p>
</sec>
<sec id="s11">
<label>11</label>
<title>Conclusion</title>
<p>This was a great learning experience on how Instagram organizes their application on both Android and IOS based devices. As technology keeps enhancing, Instagram also has updated its application over time. We intend to add versioning in our Instagram forensics plugin, so it keeps track of changes and keeps extracting data from all the versions of the Instagram application. In conclusion, I would like to extend my gratitude to &#x201C;Chen Star Electronic Data Forensic Research Center&#x201D; Ministry of Public Security Beijing China for their help and guidance in conducting this research.</p>
</sec>
</body>
<back>
<ack>
<p>This research article is part of my Ph.D. work by the Chinese scholarship council (CSC) &#x2018;<uri>www.csc.edu.cn</uri>&#x2019; conducted under the collaboration between &#x201C;College of Information and Computer Science Hohai University Nanjing China&#x201D; And &#x201C;Chen Star Electronic Data Forensic Research Center&#x201D; Ministry of Public Security Beijing China.</p>
</ack><fn-group>
<fn fn-type="other">
<p><bold>Funding Statement:</bold> This research was supported by the Korea Institute for Advancement of Technology (KIAT) Grant Funded by the Korea Government (MOTIE) (P0012724, The Competency Development Program for Industry Specialist) and the Soonchunhyang University Research Fund.</p>
</fn>
<fn fn-type="conflict">
<p><bold>Conflicts of Interest:</bold> The authors declare that they have no conflicts of interest to report regarding the present study.</p>
</fn>
</fn-group>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1">
<label>[1]</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>W.</given-names> 
<surname>McIver</surname></string-name>, <string-name>
<given-names>W.</given-names> 
<surname>Birdsall</surname></string-name> and <string-name>
<given-names>M.</given-names> 
<surname>Rasmussen</surname></string-name>
</person-group>, &#x201C;
<article-title>The Internet and the right to communicate</article-title>,&#x201D; 
<source>First Monday</source>, vol. 
<volume>8</volume>, no. 
<issue>12</issue>, 
<year iso-8601-date="2003">2003</year>. [Online]. Available: <uri>https://www.firstmonday.org/article/view/1102/1022/</uri>.</mixed-citation>
</ref>
<ref id="ref-2">
<label>[2]</label><mixed-citation publication-type="other">
<person-group person-group-type="author"><string-name>
<given-names>P.</given-names> 
<surname>Kallas</surname></string-name>
</person-group>, &#x201C;
<article-title>Top 15 most Popular Social Networking Sites and Apps</article-title>,&#x201D; 
<publisher-name>DreamGrow</publisher-name>, 
<year iso-8601-date="2018">2018</year>. [Online]. Available: <uri>https://www.dreamgrow.com/top-15-most-popular-social-networking-sites/</uri>.</mixed-citation>
</ref>
<ref id="ref-3">
<label>[3]</label><mixed-citation publication-type="other">
<person-group person-group-type="author">
<collab>Anonymous</collab>
</person-group>, &#x201C;
<article-title>Instagram active users</article-title>,&#x201D; 
<publisher-name>Statista</publisher-name>, 
<year iso-8601-date="2018">2018</year>. [Online]. Available: <uri>https://www.statista.com/statistics/253577/number-of-monthly-active-instagram-users/</uri>.</mixed-citation>
</ref>
<ref id="ref-4">
<label>[4]</label><mixed-citation publication-type="other">
<person-group person-group-type="author"><string-name>
<given-names>J. M.</given-names> 
<surname>Olsen</surname></string-name>
</person-group>, &#x201C;
<article-title>Norwegian billionaire&#x2019;s wife kidnapped, ransom demanded: police</article-title>,&#x201D; 
<publisher-name>HuffPost</publisher-name>, 
<year iso-8601-date="2019">2019</year>. [Online]. Available: <uri>https://www.huffingtonpost.com/entry/norway-businessman-s-wife-abducted-ransom-demanded_us_5c3629bde4b00c33ab5f12d9</uri>.</mixed-citation>
</ref>
<ref id="ref-5">
<label>[5]</label><mixed-citation publication-type="other">
<person-group person-group-type="author"><string-name>
<given-names>S. G.</given-names> 
<surname>Punja</surname></string-name> and <string-name>
<given-names>R. P.</given-names> 
<surname>Mislan</surname></string-name>
</person-group>, &#x201C;
<article-title>Mobile device analysis</article-title>,&#x201D; 
<source>Small Scale Digit Device Forensics Journal</source>, 
<year iso-8601-date="2008">2008</year>. [Online]. Available: <uri>https://pdfs.semanticscholar.org/279c/06abd3861704ed20883fbd49b7666b00113b.pdf</uri>.</mixed-citation>
</ref>
<ref id="ref-6">
<label>[6]</label><mixed-citation publication-type="other">
<person-group person-group-type="author"><string-name>
<given-names>Y.</given-names> 
<surname>Fedotov</surname></string-name>
</person-group>, &#x201C;
<article-title>The drug problem and organized crime, illicit financial flows, corruption, and terrorism 5 world drug report</article-title>,&#x201D; 
<year iso-8601-date="2017">2017</year>. [Online]. Available: <uri>https://www.unodc.org/wdr2017/field/Booklet_5_NEXUS.pdf</uri>.</mixed-citation>
</ref>
<ref id="ref-7">
<label>[7]</label><mixed-citation publication-type="other">
<person-group person-group-type="author"><string-name>
<given-names>I.</given-names> 
<surname>Baggili</surname></string-name>
</person-group>, &#x201C;
<article-title>Cyber forensics team launches digital forensics database</article-title>,&#x201D; 
<publisher-name>University of New Haven</publisher-name>, 
<year iso-8601-date="2019">2019</year>. [Online]. Available: <uri>http://www.newhaven.edu/news/releases/2017/cyber-forensics-team-launches-digital-forensics-database.php</uri>.</mixed-citation>
</ref>
<ref id="ref-8">
<label>[8]</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>R. Al</given-names> 
<surname>Mushcab</surname></string-name> and <string-name>
<given-names>P.</given-names> 
<surname>Gladyshev</surname></string-name>
</person-group>, &#x201C;
<article-title>Forensic analysis of Instagram and path on an iPhone 5s mobile device</article-title>,&#x201D; in <conf-name>IEEE Symposium Computers and Communication ISCC</conf-name>, pp. 
<fpage>146</fpage>&#x2013;
<lpage>151</lpage>, 
<year iso-8601-date="2015">2015</year>. </mixed-citation>
</ref>
<ref id="ref-9">
<label>[9]</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>S. C.</given-names> 
<surname>Ming</surname></string-name>
</person-group>, &#x201C;
<article-title>Chang Evidence Gathering of Instagram on Windows 10</article-title>,&#x201D; 
<source>International Journal of Innovative Science, Engineering &#x0026; Technology</source>, vol. 
<volume>3</volume>, no. 
<issue>10</issue>, pp. 
<fpage>2348</fpage>&#x2013;
<lpage>7968</lpage>, 
<year iso-8601-date="2016">2016</year>.</mixed-citation>
</ref>
<ref id="ref-10">
<label>[10]</label><mixed-citation publication-type="other">
<person-group person-group-type="author"><string-name>
<given-names>K.</given-names> 
<surname>Wong</surname></string-name>, <string-name>
<given-names>A. C. T.</given-names> 
<surname>Lai</surname></string-name>, <string-name>
<given-names>J. C. K.</given-names> 
<surname>Yeung</surname></string-name>, <string-name>
<given-names>W. L.</given-names> 
<surname>Lee</surname></string-name> and <string-name>
<given-names>P. H.</given-names> 
<surname>Chan</surname></string-name>
</person-group>, &#x201C;
<article-title>Facebook forensics</article-title>,&#x201D; 
<volume>5</volume>, 
<publisher-name>Valkyrie-X Secur. Res. Group</publisher-name>, 
<year iso-8601-date="2011">2011</year>. [Online]. Available: <uri>https://www.fbiic.gov/public/2011/jul/Facebook_Forensics-Finalized.pdf</uri>.</mixed-citation>
</ref>
<ref id="ref-11">
<label>[11]</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>M. N.</given-names> 
<surname>Yusoff</surname></string-name>, <string-name>
<given-names>A.</given-names> 
<surname>Dehghantanha</surname></string-name> and <string-name>
<given-names>R.</given-names> 
<surname>Mahmod</surname></string-name>
</person-group>, &#x201C;
<article-title>Forensic investigation of social media and instant messaging services in Firefox OS: Facebook, Twitter, Google&#x002B;, Telegram, OpenWapp, and Line as case studies</article-title>,&#x201D; 
<source>Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications Elsevier</source>, pp. 
<fpage>41</fpage>&#x2013;
<lpage>62</lpage>, 
<year iso-8601-date="2017">2017</year>.</mixed-citation>
</ref>
<ref id="ref-12">
<label>[12]</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>D.</given-names> 
<surname>Walnycky</surname></string-name>, <string-name>
<given-names>I.</given-names> 
<surname>Baggili</surname></string-name>, <string-name>
<given-names>A.</given-names> 
<surname>Marrington</surname></string-name>, <string-name>
<given-names>J.</given-names> 
<surname>Moore</surname></string-name> and <string-name>
<given-names>F.</given-names> 
<surname>Breitinger</surname></string-name>
</person-group>, &#x201C;
<article-title>Network and device forensic analysis of android social-messaging applications</article-title>,&#x201D; 
<source>Digital Investigation</source>, vol. 
<volume>14</volume>, pp. 
<fpage>S77</fpage>&#x2013;
<lpage>S84</lpage>, 
<year iso-8601-date="2015">2015</year>.</mixed-citation>
</ref>
<ref id="ref-13">
<label>[13]</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>N.</given-names> 
<surname>Al Mutawa</surname></string-name>, <string-name>
<given-names>I.</given-names> 
<surname>Baggili</surname></string-name> and <string-name>
<given-names>A.</given-names> 
<surname>Marrington</surname></string-name>
</person-group>, &#x201C;
<article-title>Forensic analysis of social networking applications on mobile devices</article-title>,&#x201D; 
<source>Digital Investigation</source>, vol. 
<volume>9</volume>, pp. 
<fpage>S24</fpage>&#x2013;
<lpage>S33</lpage>, 
<year iso-8601-date="2012">2012</year>.</mixed-citation>
</ref>
<ref id="ref-14">
<label>[14]</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>N.</given-names> 
<surname>Al Mutawa</surname></string-name>, <string-name>
<given-names>I.</given-names> 
<surname>Al Awadhi</surname></string-name>, <string-name>
<given-names>I.</given-names> 
<surname>Baggili</surname></string-name> and <string-name>
<given-names>A.</given-names> 
<surname>Marrington</surname></string-name>
</person-group>, &#x201C;
<article-title>Forensic artifacts of Facebook&#x2019;s instant messaging service</article-title>,&#x201D; in <conf-name>Int. Conf. for Internet Technology and Secured Transactions</conf-name>, pp. 
<fpage>771</fpage>&#x2013;
<lpage>776</lpage>, 
<year iso-8601-date="2011">2011</year>. </mixed-citation>
</ref>
<ref id="ref-15">
<label>[15]</label><mixed-citation publication-type="journal">
<person-group person-group-type="author"><string-name>
<given-names>M.</given-names> 
<surname>Bader</surname></string-name> and <string-name>
<given-names>I.</given-names> 
<surname>Baggili</surname></string-name>
</person-group>, &#x201C;
<article-title>iPhone 3GS forensics: Logical analysis using apple iTunes backup utility</article-title>,&#x201D; 
<source>Small Scale Digital Device Forensics Journal</source>, vol. 
<volume>4</volume>, no. 
<issue>1</issue>, pp. 
<fpage>1</fpage>&#x2013;
<lpage>15</lpage>, 
<year iso-8601-date="2010">2010</year>.</mixed-citation>
</ref>
<ref id="ref-16">
<label>[16]</label><mixed-citation publication-type="conf-proc">
<person-group person-group-type="author"><string-name>
<given-names>C.</given-names> 
<surname>Carpene</surname></string-name>
</person-group>, &#x201C;
<article-title>Looking to iPhone backup files for evidence extraction</article-title>,&#x201D; in <conf-name>Proc. of the 9th Australian Digital Forensics Conf.</conf-name>, 
<year iso-8601-date="2011">2011</year>. </mixed-citation>
</ref>
<ref id="ref-17">
<label>[17]</label><mixed-citation publication-type="other">
<person-group person-group-type="author">
<collab>Anonymous</collab>
</person-group>, &#x201C;
<article-title>Locate backups of your iPhone, iPad, and iPod touch&#x2014;Apple Support</article-title>,&#x201D; 
<year iso-8601-date="2019">2019</year>. [Online]. Available: <uri>https://support.apple.com/en-us/HT204215</uri>.</mixed-citation>
</ref>
</ref-list>
</back>
</article>