What is it about?
In this paper we present a methodology for the forensic analysis of the artifacts generated on Android smartphones by Telegram Messenger, the official client for the Telegram instant messaging platform, which provides various forms of secure individual and group communication, by means of which both textual and non-textual messages can be exchanged among users, as well as voice calls.
Featured Image
Why is it important?
In this paper we show how to reconstruct the list of contacts, the chronology and contents of the messages that have been exchanged by users, as well as the contents of files that have been sent or received. Furthermore, we show how to determine significant properties of the various chats, groups, and channels in which the user has been involved (e.g., the identifier of the creator, the date of creation, the date of joining, etc.). Finally, we show how to reconstruct the log of the voice calls made or received by the user. Although in this paper we focus on Telegram Messenger, our methodology can be applied to the forensic analysis of any application running on the Android platform.
Perspectives
Read the Original
This page is a summary of: Forensic analysis of Telegram Messenger on Android smartphones, Digital Investigation, December 2017, Elsevier,
DOI: 10.1016/j.diin.2017.09.002.
You can read the full text:
Contributors
The following have contributed to this page