Abstract
This research presents two developed approaches for the forensic acquisition of an Amazon Kindle Fire HD. It describes the forensic acquisition and analysis of the Amazon Kindle Fire HD device. Two developed methods of acquisition are presented; one requiring a special cable to reflash the boot partition of the device with a forensic acquisition environment (Method A), and the other exploiting a vulnerability in the device’s Android operating system (Method B). A case study is then presented showing the various digital evidence that can be extracted from the device. The results indicate that Method A is more favorable because it utilizes a general methodology that does not exploit a vulnerability that could potentially be patched by Amazon in future software updates.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Marturana, F., Me, G., Berte, R., Tacconi, S.: A quantitative approach to triaging in mobile forensics. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 582–588, 16–18 November 2011
Mobile Security And Forensics. NIST, 23 February 2009, Cited: 1, 19, 2013. http://csrc.nist.gov/groups/SNS/mobile_security/index.html
Zdziarski, J.: iPhone Forensics: Recovering Evidence. Personal Data and Corporate Assets, s.l. O’Reilly (2008)
Bader, M., Baggili, I.: iPhone 3GS forensics: Logical analysis using apple iTunes backup utility. Small Scale Digital Device Forensics J. 4(1) (2010)
Husain, M.I., Baggili, I., Sridhar, R.: A Simple Cost-Effective Framework for iPhone Forensic Analysis. In: Baggili, I. (ed.) ICDF2C 2010. LNICST, vol. 53, pp. 27–37. Springer, Heidelberg (2011)
Iqbal, B., Iqbal, A., Al Obaidli, H.: A novel method of iDevice(iPhone,iPad,iPod) forensics without jailbreaking. In: International Conference on Innovations in Information Technology (IIT), pp. 238–243, Abu Dhabi, Al Ain. IEEE (2012). doi:10.1109/INNOVATIONS.2012.6207740
Hoog, A.: Android forensics: investigation, analysis and mobile security for Google Android. Syngress (2011)
Vidas, T., Zhang, C., Christin, N.: Toward a general collection methodology for Android devices. Digital Invest. 8, S14–S24 (2011). doi:10.1016/j.diin.2011.05.003
Allyn S.: Amazon kindle forensics. A Safe Blog, 9 June 2011, Cited: 1, 19, 2013. www.blog.asafewebsite.com/2011/06/amazon-kindle-forensics.html
Thompson, M.: Introduction to kindle forensics. Practical Digital Forensics. 5 September 2011, Cited: 1, 19, 2013. http://practicaldigitalforensics.blogspot.com/2011/09/introduction-to-kindle-forensics.html
Eric H.: A cursory look at kindle forensics. In: A Fistful of Dongles. 13 April 2010, Cited: 1, 19, 2013. www.ericjhuber.com/2010/04/cursory-look-at-kindle-forensics.html
Kindle 3G Wireless Reading Device - forensically speaking. Computer Forensics and IR - what’s new? 3 October 2010, Cited: 1, 19, 2013. newinforensics.blogspot.com/2010/10/kindle-3g-wireless-reading-device.html
Forensic Imaging of the Amazon Kindle. MacForensicsLab, Cited: 1, 19, 2013. http://www.macforensicslab.com/ProductsAndServices/index.php?main_page=document_general_info&cPath=5_18&products_id=338&zeni%ED%AF%80%ED%B2%AB
Hannay, P., Kindle forensics: Acquisition and analysis. In: Proceedings of the ADFSL 2011 Conference on Digital Forensics, Security and Law (2011)
Iqbal, B., Iqbal, A., Guimaraes, M., Khan, K., Al Obaidli, H.: Amazon kindle fire from a digital forensics perspective. In: 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 323–329, 10–12 October 2012. doi:10.1109/CyberC.2012.61
Oxygen Forensic Suite 2012 Adds Support for Amazon Kindle Fire HD, PRweb, 23 October 2012, Cited: 1, 19, 2013. http://www.prweb.com/releases/kindle-fire-hd/forensic-tools/prweb10040657.htm50442462&pf_rd_i=B005890
qemu automated root, exploit, Cited: 14, 5, 2013. http://forum.xda-developers.com/showthread.php?t=1893838
Android Debug Bridge, Developer Android. Cited: 14, 5, 2013. http://developer.android.com/tools/help/adb.html
Sylve, J., Case, A., Marziale, L., Richard, G.G.: Acquisition and analysis of volatile memory from android devices. Digital Invest. 8(3–4), 175–184 (2012). doi:10.1016/j.diin.2011.10.003
Lessard, J., Kessler, G.C.: Android forensics: simplifying cell phone examinations. In: Small Scale Digital Device Forensics J. 4(1) September 2010
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Iqbal, A., Alobaidli, H., Marrington, A., Baggili, I. (2014). Amazon Kindle Fire HD Forensics. In: Gladyshev, P., Marrington, A., Baggili, I. (eds) Digital Forensics and Cyber Crime. ICDF2C 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 132. Springer, Cham. https://doi.org/10.1007/978-3-319-14289-0_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-14289-0_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14288-3
Online ISBN: 978-3-319-14289-0
eBook Packages: Computer ScienceComputer Science (R0)