Digital Forensics and Cyber Crime. Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers

Research Article

Amazon Kindle Fire HD Forensics

Download
437 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-14289-0_4,
        author={Asif Iqbal and Hanan Alobaidli and Andrew Marrington and Ibrahim Baggili},
        title={Amazon Kindle Fire HD Forensics},
        proceedings={Digital Forensics and Cyber Crime. Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers},
        proceedings_a={ICDF2C},
        year={2015},
        month={2},
        keywords={Amazon Kindle Fire HD Digital Forensics Analysis Acquisition Android forensics Forensic flashing},
        doi={10.1007/978-3-319-14289-0_4}
    }
    
  • Asif Iqbal
    Hanan Alobaidli
    Andrew Marrington
    Ibrahim Baggili
    Year: 2015
    Amazon Kindle Fire HD Forensics
    ICDF2C
    Springer
    DOI: 10.1007/978-3-319-14289-0_4
Asif Iqbal,*, Hanan Alobaidli, Andrew Marrington1,*, Ibrahim Baggili2,*
  • 1: Zayed University
  • 2: University of New Haven
*Contact email: asif@babariqbal.com, marrington@computer.org, ibaggili@newhaven.edu

Abstract

This research presents two developed approaches for the forensic acquisition of an Amazon Kindle Fire HD. It describes the forensic acquisition and analysis of the Amazon Kindle Fire HD device. Two developed methods of acquisition are presented; one requiring a special cable to reflash the boot partition of the device with a forensic acquisition environment (Method A), and the other exploiting a vulnerability in the device’s Android operating system (Method B). A case study is then presented showing the various digital evidence that can be extracted from the device. The results indicate that Method A is more favorable because it utilizes a general methodology that does not exploit a vulnerability that could potentially be patched by Amazon in future software updates.