10.1145/3465481.3470060acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Forensicast: A Non-intrusive Approach & Tool For Logical Forensic Acquisition & Analysis of The Google Chromecast TV

Published:17 August 2021Publication History

ABSTRACT

The era of traditional cable Television (TV) is swiftly coming to an end. People today subscribe to a multitude of streaming services. Smart TVs have enabled a new generation of entertainment, not only limited to constant on-demand streaming as they now offer other features such as web browsing, communication, gaming etc. These functions have recently been embedded into a small IoT device that can connect to any TV with High Definition Multimedia Interface (HDMI) input known as Google Chromecast TV. Its wide adoption makes it a treasure trove for potential digital evidence. Our work is the primary source on forensically interrogating Chromecast TV devices. We found that the device is always unlocked, allowing extraction of application data through the backup feature of Android Debug Bridge (ADB) without device root access. We take advantage of this minimal access and demonstrate how a series of artifacts can stitch together a detailed timeline, and we automate the process by constructing Forensicast – a Chromecast TV forensic acquisition and timelining tool. Our work targeted (n=112) of the most popular Android TV applications including 69% (77/112) third party applications and 31% (35/112) system applications. 65% (50/77) third party applications allowed backup, and of those 90% (45/50) contained time-based identifiers, 40% (20/50) invoked some form of logs/activity monitoring, 50% (25/50) yielded some sort of token/cookie, 8% (4/50) resulted in a device ID, 26% (13/50) produced a user ID, and 24% (12/50) created other information. 26% (9/35) system applications provided meaningful artifacts, 78% (7/9) provided time based identifiers, 22% (2/9) involved some form of logs/activity monitoring, 22% (2/9) yielded some form of token/cookie data, 22% (2/9) resulted in a device ID, 44% (4/9) provided a user ID, and 33% (3/9) created other information. Our findings also illustrated common artifacts found in applications that are related to developer and advertising utilities, mainly WebView, Firebase, and Facebook Analytics. Future work and open research problems are shared.

References

  1. Shadi Al Awawdeh and Jason Moore. 2014. LiFE (Logical iOS Forensic Examiner): An Open Source iOS Backup Forensics Examination Tool. In Proceedings of the Conference on Digital Forensics, Security and Law. Association of Digital Forensics, Security and Law, 41.Google ScholarGoogle Scholar
  2. Noora Al Mutawa, Ibrahim Baggili, and Andrew Marrington. 2012. Forensic analysis of social networking applications on mobile devices. Digital Investigation 9 (Aug. 2012), S24–S33. https://doi.org/10.1016/j.diin.2012.05.007Google ScholarGoogle Scholar
  3. Somaya Ali, Sumaya AlHosani, Farah AlZarooni, and Ibrahim Baggili. 2012. iPad2 Logical Acquisition: Automated or Manual Examination?. In Proceedings of the Conference on Digital Forensics, Security and Law. Association of Digital Forensics, Security and Law, 113.Google ScholarGoogle Scholar
  4. Mona Bader and Ibrahim Baggili. 2010. iPhone 3GS Forensics: Logical Analysis Using Apple iTunes Backup Utility. Electrical & Computer Engineering and Computer Science Faculty Publications 4 (Sept. 2010), 16. https://digitalcommons.newhaven.edu/electricalcomputerengineering-facpubs/32Google ScholarGoogle Scholar
  5. A. Boztas, A. R. J. Riethoven, and M. Roeloffs. 2015. Smart TV forensics: Digital traces on televisions. Digital Investigation 12 (March 2015), S72–S80. https://doi.org/10.1016/j.diin.2015.01.012 Proceddings of DFRWS-EU 2015.Google ScholarGoogle Scholar
  6. Anthony Cuthbertson. 2018. Amazon ordered to give Alexa evidence in double murder case. https://www.independent.co.uk/life-style/gadgets-and-tech/news/amazon-echo-alexa-evidence-murder-case-a8633551.html Section: Lifestyle.Google ScholarGoogle Scholar
  7. Mousa Al Falayleh. 2013. A Review of Smart TV Forensics: Present State & Future Challenges. In The International Conference on Digital Information Processing, E-Business and Cloud Computing (DIPECC2013). The Society of Digital Information and Wireless Communication.Google ScholarGoogle Scholar
  8. Peijun Feng, Qingbao Li, Ping Zhang, and Zhifeng Chen. 2018. Logical acquisition method based on data migration for Android mobile devices. Digital Investigation 26 (Sept. 2018), 55–62. https://doi.org/10.1016/j.diin.2018.05.003Google ScholarGoogle Scholar
  9. ghostlulz. 2019. Hacking Google Chromcast. https://medium.com/@ghostlulzhacks/hacking-google-chromcast-dcdf98392f8fGoogle ScholarGoogle Scholar
  10. Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon Clark, and Frank Breitinger. 2018. Experience constructing the Artifact Genome Project (AGP): Managing the domain’s knowledge one artifact at a time. Digital Investigation 26 (July 2018), S47–S58. https://doi.org/10.1016/j.diin.2018.04.021 Proceedings of DFRWS-USA 2018.Google ScholarGoogle Scholar
  11. M. Hadgkiss, S. Morris, and S. Paget. 2019. Sifting through the ashes: Amazon Fire TV stick acquisition and analysis. Digital Investigation 28 (March 2019), 112–118. https://doi.org/10.1016/j.diin.2019.01.003Google ScholarGoogle Scholar
  12. Mohammad Iftekhar Husain, Ibrahim Baggili, and Ramalingam Sridhar. 2010. A simple cost-effective framework for iPhone forensic analysis. In International Conference on Digital Forensics and Cyber Crime. Springer, 27–37.Google ScholarGoogle Scholar
  13. Harish Jonnalagadda. 2017. Google has sold 55 million Chromecasts around the world. https://web.archive.org/web/20171005101127/https://www.androidcentral.com/google-has-sold-55-million-chromecasts-around-worldGoogle ScholarGoogle Scholar
  14. Austin J. Marck. 2017. Abusing Android TV Box for Fun and Profit. Ph.D. Dissertation. University of Cincinnati. https://etd.ohiolink.edu/apexprod/rws_olink/r/1501/10?clear=10&p10_accession_num=ucin1504786962271509Google ScholarGoogle Scholar
  15. Andrew Marrington, Ibrahim Baggili, George Mohay, and Andrew Clark. 2011. CAT Detect (Computer Activity Timeline Detection): A tool for detecting inconsistency in computer activity timelines. Digital Investigation 8 (Aug. 2011), S52–S61. https://doi.org/10.1016/j.diin.2011.05.007Google ScholarGoogle Scholar
  16. Mohamed Al Marzougy, Ibrahim Baggili, and Andrew Marrington. 2013. BlackBerry PlayBook Backup Forensic Analysis. In Digital Forensics and Cyber Crime(Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering), Marcus Rogers and Kathryn C. Seigfried-Spellar (Eds.). Springer, Berlin, Heidelberg, 239–252. https://doi.org/10.1007/978-3-642-39891-9_15Google ScholarGoogle Scholar
  17. Logan Morrison, Huw Read, Konstantinos Xynos, and Iain Sutherland. 2017. Forensic Evaluation of an Amazon Fire TV Stick. 63–79. https://doi.org/10.1007/978-3-319-67208-3_4Google ScholarGoogle Scholar
  18. A. Tekeoglu and A. Ş Tosun. 2014. Blackbox security evaluation of chromecast network communications. In 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC). 1–2. https://doi.org/10.1109/PCCC.2014.7017050 ISSN: 2374-9628.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ARES 21: Proceedings of the 16th International Conference on Availability, Reliability and Security
    August 2021
    1447 pages
    ISBN:9781450390514
    DOI:10.1145/3465481

    Copyright © 2021 ACM

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 17 August 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate228of451submissions,51%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format
About Cookies On This Site

We use cookies to ensure that we give you the best experience on our website.

Learn more

Got it!