Forensic Artifact Discovery and Suspect Profiling through Google Assistant

Authors

  • Abu Sayed Md. Mostafizur Rahaman Jahangirnagar University, Dhaka, Bangladesh
  • Saiyeda Marzia Department of Computer Science and Engineering, Bangladesh University of Professionals, Dhaka, Bangladesh
  • Tafsir Haque Arnob Department of Computer Science and Engineering, Bangladesh University of Professionals, Dhaka, Bangladesh
  • Md.Zahidur Rahman Department of Computer Science and Engineering, Bangladesh University of Professionals, Dhaka, Bangladesh
  • Jesmin Akhter Institute of Information Technology, Jahangirnagar University, Dhaka, Bangladesh

DOI:

https://doi.org/10.12928/mf.v5i1.8046

Keywords:

Google Assistant, Cloud Forensics, Mobile Forensics, Suspect Profiling, Clustering

Abstract

It has become impossible to imagine modern society without the internet and mobile devices dominating our daily lives. As a result, popular apps like Google Assistant, Gmail, Google Home, etc., are quietly entering our veins. People aren't even aware of how much of a digital footprint they leave behind, let alone the fact that it can be completely chronologized and used to put any criminal in jail.  The data that we intentionally send to Google is fully retrievable from both the client side (a mobile device) and the cloud. Even if a suspect changes his mobile device, his previous digital footprint still follows him wherever he goes. In this project, we pinpointed the location of the primary database and the major repository for Google Assistant. Here, forensic artifacts of interest from our inquiry have been revealed, including the timeline and copies of previously traded audio chats, as well as a record of deleted data. In addition to that, we have applied the K-means clustering algorithm to isolate the suspect’s voice records and their chronological order among various call records stored in the cloud, where the cluster size is determined using the Silhouette score and the CH index.  The findings of the research are to identify forensic artifacts and suspect profiling so that forensic investigators make it easier to conduct criminal investigations

Author Biographies

Saiyeda Marzia, Department of Computer Science and Engineering, Bangladesh University of Professionals, Dhaka, Bangladesh

Saiyeda Marzia was the first Gold medalist from the IT department and the 7th place finisher at the third Convocation of UITS. In 2014, she graduated with a B.Sc. in Information Technology from the University of Information Technology & Sciences in Dhaka, Bangladesh. She won the scholar award at the CSE & IT Festival in 2012, which UITS organized. She did her undergraduate thesis on Cryptography, which was titled "A combination approach on Triple DES and AES: TDA-5." She is currently working on an ongoing research project on Digital Forensics as part of the MISS program at Bangladesh University of Professionals (BUP), where she is pursuing her Master's degree in Information Systems Security. Currently, she works at Contessa Solutions & Consultants Ltd. as a Cloud Engineer. Apart from studying, she spends the majority of her time volunteering with Haqqani Mission Bangladesh's youth programs. She also received professional classical music training and considers herself a student of Murshidi songs.

Tafsir Haque Arnob, Department of Computer Science and Engineering, Bangladesh University of Professionals, Dhaka, Bangladesh

Tafsir Haque Arnob has a BSc in CSE from BAIUST and is pursuing a Master's in Information Systems Security from the Bangladesh University of Professionals. He has participated in several programming contests, including the ICPC, and workshops on robotics and IoT. Tafsir secured the 68th position in the National Cyber Drill 2021 and continually updates his skills by completing training programs, such as Fundamental Web and Application Security Issues for NREN Professionals in 2021.

Md.Zahidur Rahman, Department of Computer Science and Engineering, Bangladesh University of Professionals, Dhaka, Bangladesh

Md Zahidur Rahaman has been serving in Bangladesh Army since 2001. He has served in various capacities at different outfits of the Bangladesh Army and Border Guard Bangladesh. He has done BSc in Electrical Electronic and Communication Engineering (EECE) from the Military Institute of Science and Technology. He is a graduate from Defence Services Command and Staff College, Mirpur, Bangladesh. Presently, he is pursuing Masters in Information System Security in the Bangladesh University of Professionals.

Jesmin Akhter, Institute of Information Technology, Jahangirnagar University, Dhaka, Bangladesh

Jesmin Akhter has received PhD degree in 2019 in the field of 4G wireless networks. from Department of Computer Science and Engineering of Jahangirnagar University, Savar, Dhaka, Bangladesh and obtained M.Sc Engineering degree in Computer Science and Engineering from Jahangirnagar University, Savar, Dhaka, Bangladesh in 2012. She also received her B.Sc. Engineering degree in Computer Science and Engineering from Jahangirnagar University, Savar, Dhaka, Bangladesh in 2004. Since 2008, she is a faculty member having current Designation "Professor" at the Institute of Information Technology in Jahangirnagar University, Savar, Dhaka, Bangladesh. Currently her research focuses are on IoT, network traffic, complexity and algorithms and software engineering. Being a dynamic and versatile person who is capable of merging innovative ideas, technology, knowledge, and experience for positive contribution towards the system development in the rapidly changing scenario of Information Technology and become a good teacher in the field of software and telecommunication systems.

References

S. Levy, In the plex: how Google thinks, works, and shapes our lives, 1. ed. New York, NY: Simon & Schuster, 2011.

N. Zhang, X. Mi, X. Feng, X. Wang, Y. Tian, and F. Qian, “Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems,” in 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA: IEEE, May 2019, pp. 1381–1396. doi: 10.1109/SP.2019.00016.

A. Klein, A. Hinderks, M. Rauschenberger, and J. Thomaschewski, “Exploring Voice Assistant Risks and Potential with Technology-based Users:,” in Proceedings of the 16th International Conference on Web Information Systems and Technologies, Budapest, Hungary: SCITEPRESS - Science and Technology Publications, 2020, pp. 147–154. doi: 10.5220/0010150101470154.

A. Castro and A. Perez-Pons, “Virtual Assistant for Forensics Recovery of IoT Devices,” in 2021 7th IEEE Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE Intl Conference on High Performance and Smart Computing, (HPSC) and IEEE Intl Conference on Intelligent Data and Security (IDS), NY, USA: IEEE, May 2021, pp. 186–190. doi: 10.1109/BigDataSecurityHPSCIDS52275.2021.00043.

A. Akinbi and T. Berry, “Forensic Investigation of Google Assistant,” SN COMPUT. SCI., vol. 1, no. 5, p. 272, Sep. 2020, doi: 10.1007/s42979-020-00285-x.

G. Germanos, D. Kavallieros, N. Kolokotronis, and N. Georgiou, “Privacy Issues in Voice Assistant Ecosystems,” in 2020 IEEE World Congress on Services (SERVICES), Beijing, China: IEEE, Oct. 2020, pp. 205–212. doi: 10.1109/SERVICES48979.2020.00050.

I. Yildirim, E. Bostanci, and M. S. Guzel, “Forensic Analysis with Anti-Forensic Case Studies on Amazon Alexa and Google Assistant Build-In Smart Home Speakers,” in 2019 4th International Conference on Computer Science and Engineering (UBMK), Samsun, Turkey: IEEE, Sep. 2019, pp. 1–3. doi: 10.1109/UBMK.2019.8907007.

C. Krueger and S. McKeown, “Using Amazon Alexa APIs as a Source of Digital Evidence,” in 2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Dublin, Ireland: IEEE, Jun. 2020, pp. 1–8. doi: 10.1109/CyberSecurity49315.2020.9138849.

K. P, K. G. Ganiga, C. L, A. Srivatsava, D. V. S. S. Kumar, and P. N. S, “Forensic Data Analysis using the Case Studies on Anti Forensic Devices,” vol. 9, no. 9, pp. 49–52, Sep. 2022.

D. D. Nath, N. I. Khan, J. Akhter, and A. S. Md. M. Rahaman, “Prediction of Android Malicious Software Using Boosting Algorithms,” in Emerging Technologies in Computing, vol. 395, M. H. Miraz, G. Southall, M. Ali, A. Ware, and S. Soomro, Eds., in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 395. , Cham: Springer International Publishing, 2021, pp. 21–36. doi: 10.1007/978-3-030-90016-8_2.

D. Saha, S. Karmakar, F. N. Nur, A. Mariam, N. N. Moon, and A. Ahmed, “Mobile Device and Social Media Forensic Analysis: Impacts on Cyber-Crime,” in 2021 1st International Conference on Emerging Smart Technologies and Applications (eSmarTA), Sana’a, Yemen: IEEE, Aug. 2021, pp. 1–8. doi: 10.1109/eSmarTA52612.2021.9515742.

N. Zhang, X. Mi, X. Feng, X. Wang, Y. Tian, and F. Qian, “Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home,” 2018, doi: 10.48550/ARXIV.1805.01525.

Downloads

Published

2023-09-30

Issue

Section

Articles