| Literature DB >> 32501313 |
Shawn Knox1, Steven Moghadam1, Kenny Patrick1, Anh Phan1, Kim-Kwang Raymond Choo1.
Abstract
With today's world revolving around online interaction, dating applications (apps) are a prime example of how people are able to discover and converse with others that may share similar interests or lifestyles, including during the recent COVID-19 lockdowns. To connect the users, geolocation is often utilized. However, with each new app comes the possibility of criminal exploitation. For example, while apps with geolocation feature are intended for users to provide personal information that drive their search to meet someone, that same information can be used by hackers or forensic analysts to gain access to personal data, albeit for different purposes. This paper examines the Happn dating app (versions 9.6.2, 9.7, and 9.8 for iOS devices, and versions 3.0.22 and 24.18.0 for Android devices), which geographically works differently compared to most notable dating apps by providing users with profiles of other users that might have passed by them or in the general radius of their location. Encompassing both iOS and Android devices along with eight varying user profiles with diverse backgrounds, this study aims to explore the potential for a malicious actor to uncover the personal information of another user by identifying artifacts that may pertain to sensitive user data.Entities:
Keywords: Android forensics; Dating app artifacts; Dating apps; Mobile forensics; Online dating; iOS forensics
Year: 2020 PMID: 32501313 PMCID: PMC7252105 DOI: 10.1016/j.cose.2020.101833
Source DB: PubMed Journal: Comput Secur ISSN: 0167-4048 Impact factor: 4.438