The social networking investigation of metadata of forensic artifacts of a typical WeChat session under Windows

Hai Cheng Chu, Gai Ge Wang, Der-Jiunn Deng

Research output: Contribution to journalArticle

Abstract

Digital forensics-related investigations have been a relative competitive research area by the computer specialists or law enforcement agency officers to confirm or refuse the assumptions with respect to the cybercrime scenes. WeChat is one of the most popular instant messaging application programs in contemporary age. While applying WeChat, there is precious information deposited in the computing devices that could be supportive evidences in a court of law. Hence, this research is focusing on the application of WeChat on the desktop PC under Windows 7 by means of the acquisition of volatile digital evidences in order to provide supporting information for some cybercrime cases. This paper provides generic investigation methods conducting forensic sound analysis on WeChat from the aspect of data volatility of the computing devices. By means of the proposed methodologies, the digital forensics specialists should be able to gather critical digital traces to confirm the previous actions of a WeChat user or even to reconstruct the crime scene to prove the suspect is guilty or innocent in a court of law.

Original languageEnglish
Pages (from-to)5698-5709
Number of pages12
JournalSecurity and Communication Networks
Volume9
Issue number18
DOIs
Publication statusPublished - 2016 Dec 1

Fingerprint

Metadata
Crime
Law enforcement
Application programs
Acoustic waves
Digital forensics

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Networks and Communications

Cite this

@article{82afc8d0bf914a4ab7f622addd66ee01,
title = "The social networking investigation of metadata of forensic artifacts of a typical WeChat session under Windows",
abstract = "Digital forensics-related investigations have been a relative competitive research area by the computer specialists or law enforcement agency officers to confirm or refuse the assumptions with respect to the cybercrime scenes. WeChat is one of the most popular instant messaging application programs in contemporary age. While applying WeChat, there is precious information deposited in the computing devices that could be supportive evidences in a court of law. Hence, this research is focusing on the application of WeChat on the desktop PC under Windows 7 by means of the acquisition of volatile digital evidences in order to provide supporting information for some cybercrime cases. This paper provides generic investigation methods conducting forensic sound analysis on WeChat from the aspect of data volatility of the computing devices. By means of the proposed methodologies, the digital forensics specialists should be able to gather critical digital traces to confirm the previous actions of a WeChat user or even to reconstruct the crime scene to prove the suspect is guilty or innocent in a court of law.",
author = "Chu, {Hai Cheng} and Wang, {Gai Ge} and Der-Jiunn Deng",
year = "2016",
month = "12",
day = "1",
doi = "10.1002/sec.1729",
language = "English",
volume = "9",
pages = "5698--5709",
journal = "Security and Communication Networks",
issn = "1939-0114",
publisher = "John Wiley and Sons Inc.",
number = "18",

}

The social networking investigation of metadata of forensic artifacts of a typical WeChat session under Windows. / Chu, Hai Cheng; Wang, Gai Ge; Deng, Der-Jiunn.

In: Security and Communication Networks, Vol. 9, No. 18, 01.12.2016, p. 5698-5709.

Research output: Contribution to journalArticle

TY - JOUR

T1 - The social networking investigation of metadata of forensic artifacts of a typical WeChat session under Windows

AU - Chu, Hai Cheng

AU - Wang, Gai Ge

AU - Deng, Der-Jiunn

PY - 2016/12/1

Y1 - 2016/12/1

N2 - Digital forensics-related investigations have been a relative competitive research area by the computer specialists or law enforcement agency officers to confirm or refuse the assumptions with respect to the cybercrime scenes. WeChat is one of the most popular instant messaging application programs in contemporary age. While applying WeChat, there is precious information deposited in the computing devices that could be supportive evidences in a court of law. Hence, this research is focusing on the application of WeChat on the desktop PC under Windows 7 by means of the acquisition of volatile digital evidences in order to provide supporting information for some cybercrime cases. This paper provides generic investigation methods conducting forensic sound analysis on WeChat from the aspect of data volatility of the computing devices. By means of the proposed methodologies, the digital forensics specialists should be able to gather critical digital traces to confirm the previous actions of a WeChat user or even to reconstruct the crime scene to prove the suspect is guilty or innocent in a court of law.

AB - Digital forensics-related investigations have been a relative competitive research area by the computer specialists or law enforcement agency officers to confirm or refuse the assumptions with respect to the cybercrime scenes. WeChat is one of the most popular instant messaging application programs in contemporary age. While applying WeChat, there is precious information deposited in the computing devices that could be supportive evidences in a court of law. Hence, this research is focusing on the application of WeChat on the desktop PC under Windows 7 by means of the acquisition of volatile digital evidences in order to provide supporting information for some cybercrime cases. This paper provides generic investigation methods conducting forensic sound analysis on WeChat from the aspect of data volatility of the computing devices. By means of the proposed methodologies, the digital forensics specialists should be able to gather critical digital traces to confirm the previous actions of a WeChat user or even to reconstruct the crime scene to prove the suspect is guilty or innocent in a court of law.

UR - http://www.scopus.com/inward/record.url?scp=85013157800&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85013157800&partnerID=8YFLogxK

U2 - 10.1002/sec.1729

DO - 10.1002/sec.1729

M3 - Article

AN - SCOPUS:85013157800

VL - 9

SP - 5698

EP - 5709

JO - Security and Communication Networks

JF - Security and Communication Networks

SN - 1939-0114

IS - 18

ER -