Dong Bin Oh, Somi Lim, Suji Lee, Yesong Jo, Gahyun Choi, Bumyun Kim, Huy Kang Kim
{"title":"Forensic analysis and evaluation of file-wiping applications in Android OS.","authors":"Dong Bin Oh, Somi Lim, Suji Lee, Yesong Jo, Gahyun Choi, Bumyun Kim, Huy Kang Kim","doi":"10.1111/1556-4029.70174","DOIUrl":null,"url":null,"abstract":"<p><p>Anti-forensics refers to techniques designed to obstruct the discovery of evidence in digital forensic investigations. File-wiping is one of the anti-forensic techniques that make data recovery impossible by overwriting data with specific patterns. This technique poses significant challenges to investigators. Our study evaluates the effectiveness of file-wiping applications on the Android OS from the anti-forensic perspective. We selected six applications from the Google Play Store that support file-level wiping. By analyzing these applications using reverse engineering and digital forensic tools, we addressed the three key research questions. First, we discovered that although one application claimed to provide file-wiping functionality, it actually performed simple file deletions, making the deleted files recoverable. Second, we found that file-wiping applications did not adhere to file-wiping standards or guidelines. Lastly, by examining artifacts generated by the Android OS and applications during the file-wiping process, we were able to reveal evidence of tool execution and artifacts of wiped files. Based on these findings, we propose a novel evaluation framework that assists digital forensic investigators in detecting traces of wiping activity and inferring information about deleted data on Android devices.</p>","PeriodicalId":94080,"journal":{"name":"Journal of forensic sciences","volume":" ","pages":""},"PeriodicalIF":1.8000,"publicationDate":"2025-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of forensic sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1111/1556-4029.70174","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Anti-forensics refers to techniques designed to obstruct the discovery of evidence in digital forensic investigations. File-wiping is one of the anti-forensic techniques that make data recovery impossible by overwriting data with specific patterns. This technique poses significant challenges to investigators. Our study evaluates the effectiveness of file-wiping applications on the Android OS from the anti-forensic perspective. We selected six applications from the Google Play Store that support file-level wiping. By analyzing these applications using reverse engineering and digital forensic tools, we addressed the three key research questions. First, we discovered that although one application claimed to provide file-wiping functionality, it actually performed simple file deletions, making the deleted files recoverable. Second, we found that file-wiping applications did not adhere to file-wiping standards or guidelines. Lastly, by examining artifacts generated by the Android OS and applications during the file-wiping process, we were able to reveal evidence of tool execution and artifacts of wiped files. Based on these findings, we propose a novel evaluation framework that assists digital forensic investigators in detecting traces of wiping activity and inferring information about deleted data on Android devices.