Niken Cahyani
Unknown Affiliation

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Digital Forensic Analysis on iDevice : Jailbreak iOS 12.1.1 as a Case Study Amin Aenurahman Ali; Niken Cahyani; Erwin Jadied
Indonesia Journal on Computing (Indo-JC) Vol. 4 No. 2 (2019): September, 2019
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34818/INDOJC.2019.4.2.349

Abstract

Jailbreak has an issue in data alteration, as it modifies file(s) in the device to allow user to extract more data than without jailbreaking. This issue raises controversy of the use of jailbreaking in digital forensic investigation, as data integrity is a prominent requirement in a court proceeding. This study aims to analyze the process of jailbreak, what is actually done by the jailbreak code in a device, and what data is actually modified by the jailbreak code. By using the latest version of iOS system, this study uses the voucher_swap exploit as a representation of semi-tethered jailbreaking method to investigate the effects of jailbreak on data integrity on a idevice. The investigation is conducted based on to what extent data can be extracted from the jailbreak device, hash value comparison of the data, and source code analysis to scrutinize the effect of jailbreak to the system and user data inside the device. Results of this study suggest that jailbreak is acceptable to prepare idevice in digital forensic investigations to acquire more data, as it maintains the integrity of user data. These results may help forensic communities in their decision about the acceptability of jailbreaking in idevide forensic investigations.
Static Code Analysis on The Effect of Virtual Secure Mode on Memory Acquisition with IDA Nadja Adryana; Niken Cahyani; Erwid Jadied
International Journal on Information and Communication Technology (IJoICT) Vol. 9 No. 1 (2023): June 2023
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/ijoict.v9i1.688

Abstract

Memory acquisition process is one of digital forensics act. There are several tools that support memory acquisition process. At this time, there is a feature named secure mode that can caused crash or error in memory acquisition tools system and caused the tools to be unusable, also the loss of the computer memory. This research is focusing on analyzing the acquisition tools that has error or crash when the device that is being used for memory acquisition is in secure mode. The analysis is being carried out using static code analysis method, which is one of the techniques of reverse engineering, using IDA. This study aims to find the cause of the crash or error in memory acquisition tools. The purpose of this study is to be useful for digital forensic tester in understanding the potential risk of the secure mode impact in acquisition process. The results of this study indicate that different operating system and different kernel which runs in the device are the reasons that memory acquisition tools cannot run properly on VSM environment being turned on.
An Impact Analysis of Damage Level caused by Malware with Dynamic Analysis Approach Christopher Arden Anugerah; Erwid Musthofa Jadied; Niken Cahyani
International Journal on Information and Communication Technology (IJoICT) Vol. 10 No. 1 (2024): Vol. 10 No.1 June 2024
Publisher : School of Computing, Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21108/ijoict.v10i1.940

Abstract

Malware, short for malicious software, is software or code specifically designed to damage, disrupt computer systems, or gain unauthorized access to sensitive information. Based on type classification, one of the well-known types of malware is ransomware. Usually, ransomware will encrypt the files on a computer system and then demand a ransom from the owner of the computer system so that the owner can regain access to the encrypted files. Sometimes in some cases, ransomware is able to delete files without input from the computer system owner. This research includes the analysis process of three ransomware samples that are known for successfully causing losses to many computer systems throughout the world, namely WannaCry, Locky, and Jigsaw, using a dynamic approach and the use of tools to track the processes carried out by the ransomware. The purpose of this research is to determine which of the three samples has the highest to lowest level of damage based on metrics based on file access capabilities and file modification capabilities for various types of files such as system files, boot-related files, program files, etc. The findings of this research indicate that WannaCry has the highest impact followed by Locky and then Jigsaw.