Abstract
Given the considerable amount of data (including sensitive and personal information) collected, stored, disseminated by mobile devices, there is a need to ensure that such devices can be securely wiped when they are misplaced, stolen or disposed. Hence, in this paper we evaluate the effectiveness of three categories of wiping applications: Factory Reset, Remote Reset, Data Wiping Applications (apps). Specifically, we study two popular wiping apps (i.e., Shreddit – Data Eraser by PalmTronix, and Secure Wipe by Pinellas CodeWorks) and install both apps on three test devices, namely: Samsung S5 (Android 6.0.1), Samsung S5 Active (OS version 6.0.1), and an iPhone 6S (iOS 13.2.2). We then study the extent of data that can be recovered, from the three categories of wiping, using two popular commercial mobile forensic software, namely: Mobile Phone Examiner Plus (MPE+) from Accessdata, and MOBILedit from Compelson labs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Jones, B.H., Chin, A.: On the efficacy of smartphone security: a critical analysis of modifications in business students’ practices over time. Int. J. Inf. Manag. 35(5), 561–571 (2015). https://doi.org/10.1016/j.ijinfomgt.2015.06.003. Accessed 17 Oct 2019
Allam, S., Flowerday, S., Flowerday, E.: Smartphone information security awareness: a victim of operational pressures. Comput. Secur. 42, 56–65 (2014). https://doi.org/10.1016/j.cose.2014.01.005. Accessed 17 Oct 2019
Cardwell, G.: Residual Network Data Structures in Android Devices, Masters, Naval Postgraduate School (2011)
Yao, M., Chuang, M., Hsu, C.: The kano model analysis of features for mobile security applications. Comput. Secur. 78, 336–346 (2018). https://doi.org/10.1016/j.cose.2018.07.008. Accessed 17 Oct 2019
Blancco Technology Group: Analysis of Data Remanence After Factory Reset, and Sophisticated Attacks on Memory Chips. Blancco Technology Group (2019)
Bransfield-Garth, S.: Mobile phone calls as a business risk. Network Secur. 2010(9), 4–11 (2010). https://doi.org/10.1016/s1353-4858(10)70114-8. Accessed 17 Oct 2019
Korenis, P., Billick, S.: Forensic Implications: adolescent sexting and cyberbullying. Psychiatric Quart. 85(1), 97–101 (2013). https://doi.org/10.1007/s11126-013-9277-z. Accessed 17 Oct 2019
Ehatisham-ul-Haq, M., Azam, M., Naeem, U., Rѐhman, S., Khalid, A.: Identifying smartphone users based on their activity patterns via mobile sensing. Procedia Comput. Sci. 113, 202–209 (2017). https://doi.org/10.1016/j.procs.2017.08.349. Accessed 17 Oct 2019
Narayanan, S.V.: Myths and fallacies of “Personally Identifiable Information”. Commun. ACM 53(6), 24 (2010). https://doi.org/10.1145/1743546.1743558. Accessed 17 Oct 2019
Wilbanks, L.: The impact of personally identifiable information. IT Professional 9(4), 62–64 (2007). https://doi.org/10.1109/mitp.2007.77. Accessed 17 Oct 2019
Gámez-Guadix, M., Mateos-Pérez, E.: Longitudinal and reciprocal relationships between sexting, online sexual solicitations, and cyberbullying among minors. Comput. Hum. Behav. 94, 70–76 (2019). https://doi.org/10.1016/j.chb.2019.01.004.. Accessed 17 Oct 2019
Barker, Cosmo Survey: 9 out of 10 Millennial Women Take Naked Photos. Cosmopolitan (2014). https://www.cosmopolitan.com/sex-love/advice/a30675/ninety-percent-millennial-women-take-nude-photos-cosmo-survey/. Accessed 17 Oct 2019
Milne, G., Pettinico, G., Hajjat, F., Markos, E.: Information sensitivity typology: mapping the degree and type of risk consumers perceive in personal data sharing. J. Consumer Affairs 51(1), 133–161 (2016). https://doi.org/10.1111/joca.12111. Accessed 17 Oct 2019
Tankard, C.: The security issues of the Internet of Things. Comput. Fraud Secur. 201(9), 11–14 (2015) https://doi.org/10.1016/s1361-3723(15)30084-1. Accessed 17 Oct 2019
Yang, L., Wei, T., Zhang, F., Ma, J.: SADUS: secure data deletion in user space for mobile devices. Comput. Secur. 77, 612–626 (2018). https://doi.org/10.1016/j.cose.2018.05.013.Accessed 17 Oct 2019
Reardon, J., Basin, D., Capkun, S.: SoK: secure data deletion. In: 2013 IEEE Symposium on Security and Privacy (2013). https://doi.org/10.1109/sp.2013.28. Accessed 17 Oct 2019
Di Leom, M.: Remote Wiping in Android. University of South Australia, Masters (2015)
Kissel, R., Regenscheid, A., Scholl, M., Stine, K.: Guidelines for Media Sanitization (2014). https://doi.org/10.6028/nist.sp.800-88r1. Accessed 17 Oct 2019
Simon, L., Anderson, R.: Security Analysis of Android Factory Resets. University of Cambridge (2015)
Patel, N.: Utilisation of Flash Storage Memory, no. 2018 (2018). https://doi.org/10.13140/RG.2.2.35672.34565.. Accessed 17 Oct 2019
Brown, Almost ALL iPhones Are Encrypted, Almost ALL Android Smartphones Are NOT, Express.co.uk (2019). https://www.express.co.uk/life-style/science-technology/653099/iPhone-iOS-Encryption-Android-OS-Google-Smartphone. Accessed 17 Oct 2019
Miller, J.: Google and Apple to Introduce Default Encryption, BBC News (2014). https://www.bbc.com/news/technology-29276955. Accessed 17 Oct 2019
Gómez-Miralles, L., Arnedo-Moreno, J.: Hardening iOS devices against remote forensic investigation. Security and Resilience in Intelligent Data-Centric Systems and Communication Networks, pp. 261–283 (2018). https://doi.org/10.1016/b978-0-12-811373-8.00012-4. Accessed 17 Oct 2019
Kingsley-Hughes, Here's How to Securely Wipe Your Android Smartphone for Resale, ZDNet (2019). https://www.zdnet.com/article/heres-how-to-securely-wipe-your-android-smartphone-for-resale/. Accessed 17 Oct 2019
Altuwaijri, H., Ghouzali, S.: Android data storage security: a review. J. King Saud University – Comput. Inf. Sci. (2018). https://doi.org/10.1016/j.jksuci.2018.07.004. Accessed 17 Oct 2019
Meckley, T.: An Empirical Comparison of Smartphone Factory-Resets to Remote Deletion Applications. University of South Alabama, Masters (2019)
UZ, The Effectiveness of Remote Wipe as a Valid Defense for Enterprises Implementing a BYOD Policy, Masters, University of Ottawa (2019)
Pollitt, M., Shenoi, S. (eds.): DigitalForensics 2005. ITIFIP, vol. 194. Springer, Boston (2005). https://doi.org/10.1007/0-387-31163-7
Barmpatsalou, K., Cruz, T., Monteiro, E., Simoes, P.: Current and future trends in mobile device forensics. ACM Comput. Surv. 51(3), 1–31 (2018). https://doi.org/10.1145/3177847. Accessed 17 Oct 2019
Thomas, D.: How to delete files on android so they can't ever be recovered. Gadget Hacks (2016). https://android.gadgethacks.com/how-to/delete-files-android-so-they-cant-ever-be-recovered-0169550/. Accessed 17 Oct 2019
Bilić, D.: How to delete your smartphone data securely before selling your device. WeLiveSecurity (2016). https://www.welivesecurity.com/2016/06/03/how-do-you-delete-your-data-securely-before-selling-your-cell-phone/. Accessed 17 Oct 2019
Glisson, W., Storer, T., Blyth, A., Grispos, G., Campbell, M.: In-the-wild residual data research and privacy. J. Digital Forens. Secur. Law 11(1) (2016). https://doi.org/10.15394/jdfsl.2016.1371
Yu, X., Wang, Z., Sun, K., Zhu, W., Gao, N., Jing, J.: Remotely wiping sensitive data on stolen smartphones. In: Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security - ASIA CCS 2014, no. 2014, pp. 537–542 (2014). https://doi.org/10.1145/2590296.2590318.. Accessed 17 Oct 2019
Di Leom, M., Choo, K., Hunt, R.: Remote wiping and secure deletion on mobile devices: a review. J. Foren. Sci. 61(6), 1473–1492 (2016). https://doi.org/10.1111/1556-4029.13203. Accessed 17 Oct 2019
Apple Inc. Remotely Locating and Commanding a Mobile Device, US 2018/0337974 A1 (2018)
AirWatch LLC, Device Back and Wipe, US 2019 / 0073271 A1 (2019)
Hoffman, Why Deleted Files Can Be Recovered, and How You Can Prevent It. How-To Geek (2019). https://www.howtogeek.com/125521/htg-explains-why-deleted-files-can-be-recovered-and-how-you-can-prevent-it/. Accessed 17 Oct 2019
Acknowledgement
We would like to express our gratitude to Compelson Labs for the support and making MobilEdit available to our research. We would also like to acknowledge the contributions of Andrew Mendoza in the research of background and related work, and testing.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Jochims, K., Bello, A., Choo, KK.R. (2021). Effectiveness of Mobile Wiping Applications. In: Perakovic, D., Knapcikova, L. (eds) Future Access Enablers for Ubiquitous and Intelligent Infrastructures. FABULOUS 2021. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 382. Springer, Cham. https://doi.org/10.1007/978-3-030-78459-1_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-78459-1_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78458-4
Online ISBN: 978-3-030-78459-1
eBook Packages: Computer ScienceComputer Science (R0)