Mobile Forensics on social media Using Digital Forensics Research Workshop Methods


  • Herman Herman Universitas Ahmad Dahlan
  • Imam Riadi Universitas Ahmad Dahlan
  • Irhash Ainur Rafiq


The rapidly growing digital technology is also followed by many loopholes in cybercrime if it is not balanced with the user's knowledge and knowledge of digital data. Instagram and WhatsApp are among the most popular apps in the social media category. Cybercrime often utilizes social media apps as a place of practice. Cyber allegations that often occur on social media are online prostitution, fraud, online gambling, hate speech, fake news, and the sale of illegal drugs. Law enforcement officials will secure smartphone used for cybercrime as physical evidence. Digital evidence on smartphones will be obtained through a process called digital forensics. Digital Forensics Research Workshop (DFRWS) is one of the methods applied to investigate smartphones. The Digital Forensics Research Workshop has six stages: identification, preservation, collection, examination, analysis and presentation. The final result of this study is the result of digital data analysis obtained on smartphone.

Author Biography

Imam Riadi, Universitas Ahmad Dahlan



N. Anwar and I. Riadi, “Analisis Investigasi Forensik WhatsApp Messanger Smartphone Terhadap WhatsApp Berbasis Web,” J. Ilm. Tek. Elektro Komput. dan Inform., vol. 3, no. 1, p. 1, 2017, doi: 10.26555/jiteki.v3i1.6643.

H. H. Lwin, W. P. Aung, and K. K. Lin, “Comparative Analysis of Android Mobile Forensics Tools,” 2020 IEEE Conf. Comput. Appl. ICCA 2020, 2020, doi: 10.1109/ICCA49400.2020.9022838.

“• Most used social media 2021 | Statista.” (accessed May 19, 2022).

M. R. Ramadhani and A. R. Pratama, “Analisis Kesadaran Cybersecurity Pada Pengguna Media Sosial Di Indonesia,” Journal.Uii.Ac.Id, vol. 1, no. 2, pp. 1–8, 2020.

Irhash Ainur Rafiq, Imam Riadi, and Herman, “Perbandingan Forensic Tools pada Instagram Menggunakan Metode NIST,” JISKA (Jurnal Inform. Sunan Kalijaga), vol. 7, no. 2, pp. 134–142, 2022, doi: 10.14421/jiska.2022.7.2.134-142.

S. Pambayun and I. Riadi, “Investigation on Instagram Android-based using Digital Forensics Research Workshop Framework,” Int. J. Comput. Appl., vol. 175, no. 35, pp. 15–21, 2020, doi: 10.5120/ijca2020920904.

R. G. Prasetya et al., “Forensic tools performance analysis on android-based blackberry messenger using NIST measurements,” Cyber Secur. dan Forensik Digit., vol. 7, no. 3, pp. 3991–4003, 2018, doi: 10.11591/ijece.v8i5.pp3991-4003.

K. D. O. Mahendra and I. K. Ari Mogi, “Digital Forensic Analysis Of Michat Application On Android As Digital Proof In Handling Online Prostitution Cases,” JELIKU (Jurnal Elektron. Ilmu Komput. Udayana), vol. 9, no. 3, p. 381, 2021, doi: 10.24843/jlk.2021.v09.i03.p09.

I. Zuhriyanto, Anton Yudhana, and Imam Riadi, “Comparative analysis of Forensic Tools on Twitter applications using the DFRWS method,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 4, no. 5, pp. 829–836, 2020, doi: 10.29207/resti.v4i5.2152.

“•Monthly mobile cyber attacks 2021 | Statista.” (accessed Jun. 08, 2022).

N. Chakraborty, “Framework for Data Extraction and Analysis of Damaged Android Mobile Device,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 7, no. 5, pp. 306–311, 2019, doi: 10.22214/ijraset.2019.5050.

C. Anglano, M. Canonico, and M. Guazzone, “The Android Forensics Automator (AnForA): A tool for the Automated Forensic Analysis of Android Applications,” Comput. Secur., vol. 88, no. January, 2020, doi: 10.1016/j.cose.2019.101650.

S. Yadav, S. Prakash, N. Dayal, and V. Singh, “Forensics Analysis of WhatsApp in Android Mobile Phone,” SSRN Electron. J., 2020, doi: 10.2139/ssrn.3576379.

R. Umar, A. Yudhana, and M. N. Faiz, “Experimental analysis of web browser sessions using live forensics method,” Int. J. Electr. Comput. Eng., vol. 8, no. 5, pp. 2951–2958, 2018, doi: 10.11591/ijece.v8i5.pp.2951-2958.

A. K. Kubi, S. Saleem, and O. Popov, “Evaluation of some tools for extracting e-evidence from mobile devices,” 2011 5th Int. Conf. Appl. Inf. Commun. Technol. AICT 2011, no. 10, 2011, doi: 10.1109/ICAICT.2011.6110999.

B. R. Anjan K Koundinya, Srivatsa Raju, “Gathering Evidence from Android OS for Mobile Forensics,” Int. J. Comput. Sci. Netw., vol. 9, no. 4, pp. 163–166, 2020.

R. A. K. N. Bintang, R. Umar, and U. Yudhana, “Perancangan perbandingan live forensics pada keamanan media sosial Instagram, Facebook dan Twitter di Windows 10,” Pros. SNST ke-9 Tahun 2018 Fak. Tek. Univ. Wahid Hasyim, pp. 125–128, 2018.

M. N. Faiz, R. Umar, and A. Yudhana, “Analisis Live Forensics Untuk Perbandingan Kemananan Email Pada Sistem Operasi Proprietary,” Ilk. J. Ilm., vol. 8, no. 3, pp. 242–247, 2016, doi: 10.33096/ilkom.v8i3.79.242-247.

R. Umar, A. Yudhana, and M. Nur Faiz, “Analisis Kinerja Metode Live Forensics Untuk Investigasi Random Access Memory Pada Sistem Proprietary,” Pros. Konf. Nas. Ke- 4 Asos. Progr. Pascasarj. Perguru. Tinggi Muhammadiyah, pp. 207–211, 2016.

T. Rochmadi, Y. Wicaksono, and N. D. Nisa, “Digital Evidence Identification of Android Device using Live Forensics Acquisition on Cloud Storage (iDrive),” Int. J. Comput. Appl., vol. 175, no. 26, pp. 40–43, 2020, doi: 10.5120/ijca2020920815.