Security Vulnerability Assessment on Threads Application Through Digital Forensics Analysis

Furkejuvvon:
Bibliográfalaš dieđut
Publikašuvnnas:European Conference on Cyber Warfare and Security (Jun 2025), p. 528-538
Váldodahkki: Perera, Wadduwage Shanika
Eará dahkkit: Islam, Ahsan, Varol, Cihan
Almmustuhtton:
Academic Conferences International Limited
Fáttát:
Liŋkkat:Citation/Abstract
Full Text
Full Text - PDF
Fáddágilkorat: Lasit fáddágilkoriid
Eai fáddágilkorat, Lasit vuosttaš fáddágilkora!

MARC

LEADER 00000nab a2200000uu 4500
001 3244089535
003 UK-CbPIL
035 |a 3244089535 
045 2 |b d20250601  |b d20250630 
084 |a 142231  |2 nlm 
100 1 |a Perera, Wadduwage Shanika 
245 1 |a Security Vulnerability Assessment on Threads Application Through Digital Forensics Analysis 
260 |b Academic Conferences International Limited  |c Jun 2025 
513 |a Conference Proceedings 
520 3 |a The rapid emergence of new social media applications has introduced fresh vectors for cybercrime, highlighting the need for timely security vulnerability assessments. This paper presents a comprehensive security vulnerability assessment of Threads, a newly emerging social networking application, by examining its behaviour and data handling through a digital forensic analysis. The study followed a structured experiment which involved installing the the Universal Windows Platform (UWP) applications for Instagram and Threads on a Windows 11 device, conducting typical user activities between two test accounts, acquiring forensic disk images and memory dumps, capturing network traffic, followed by a digital forensic analysis of the discovered artifacts. The primary motivation behind this analysis is to uncover potential security vulnerabilities of the application through a forensic examination of data remnants left by the application. Data acquisition and analysis were carried out using tools such as FTK Imager, Autopsy, Belkasoft Evidence Center, Volatility 3 and Wireshark. The study revealed a range of security and privacy concerns related to the application's data storage, memory usage, and network utilization. For instance, user-generated content and application metadata were found in application files without adequate encryption and sensitive user credentials were discovered, in plaintext. Additionally, insecure handling of backend communications and permissive CORS configurations were observed, introducing risks such as session hijacking and Cross-Site Scripting (XSS) vulnerabilities. Findings of this research underscore the need for improved security mechanisms in modern social media applications. This study provides valuable insights for developers, cybersecurity professionals, and digital forensic investigators to strengthen the security posture of current social networking applications. 
653 |a Operating systems 
653 |a Evidence 
653 |a Business communications 
653 |a Data integrity 
653 |a User behavior 
653 |a Data acquisition 
653 |a Forensic sciences 
653 |a Social networks 
653 |a Autopsies 
653 |a Communications traffic 
653 |a User generated content 
653 |a Image acquisition 
653 |a False information 
653 |a Data storage 
653 |a Criminal investigations 
653 |a Privacy 
653 |a Cybercrime 
653 |a Computer forensics 
653 |a Cybersecurity 
653 |a Forensic computing 
653 |a Digital media 
653 |a Forensic analysis 
653 |a Artifacts 
653 |a Autopsy 
653 |a Vulnerability 
653 |a Hijacking 
653 |a Credentials 
653 |a Data 
653 |a Motivation 
653 |a Social media 
653 |a Social security 
653 |a Cryptography 
653 |a Mass media 
653 |a Networking 
653 |a Evaluation 
653 |a Application 
653 |a Memory 
653 |a Forensic science 
653 |a Data encryption 
653 |a Storage 
700 1 |a Islam, Ahsan 
700 1 |a Varol, Cihan 
773 0 |t European Conference on Cyber Warfare and Security  |g (Jun 2025), p. 528-538 
786 0 |d ProQuest  |t Political Science Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3244089535/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/3244089535/fulltext/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3244089535/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch