A cloud-based forensics tracking scheme for online social network clients Feng-Yu Lin, Chien-Cheng Huang, Pei-Ying Chang Forensic Science International Volume 255, Pages 64-71 (October 2015) DOI: 10.1016/j.forsciint.2015.08.011 Copyright © 2015 Elsevier Ireland Ltd Terms and Conditions
Fig. 1 The CloudTracker framework. Forensic Science International 2015 255, 64-71DOI: (10.1016/j.forsciint.2015.08.011) Copyright © 2015 Elsevier Ireland Ltd Terms and Conditions
Fig. 2 MITM proxy defeat HTTPS Model. Forensic Science International 2015 255, 64-71DOI: (10.1016/j.forsciint.2015.08.011) Copyright © 2015 Elsevier Ireland Ltd Terms and Conditions
Fig. 3 HTTPS MITM (TLS/SSL proxy). Forensic Science International 2015 255, 64-71DOI: (10.1016/j.forsciint.2015.08.011) Copyright © 2015 Elsevier Ireland Ltd Terms and Conditions
Fig. 4 Correlation information chains for SRI location measurement. Forensic Science International 2015 255, 64-71DOI: (10.1016/j.forsciint.2015.08.011) Copyright © 2015 Elsevier Ireland Ltd Terms and Conditions
Fig. 5 Correlation information chains of 3G UMTS network. Forensic Science International 2015 255, 64-71DOI: (10.1016/j.forsciint.2015.08.011) Copyright © 2015 Elsevier Ireland Ltd Terms and Conditions
Fig. 6 Implementation of CloudTracker mechanism in 3/3.5G network. (Inline Redirection model) Forensic Science International 2015 255, 64-71DOI: (10.1016/j.forsciint.2015.08.011) Copyright © 2015 Elsevier Ireland Ltd Terms and Conditions
Fig. 7 Decoding result of encrypted content of Facebook Messenger using standard SSL/TLS encrypted communication protocol. Forensic Science International 2015 255, 64-71DOI: (10.1016/j.forsciint.2015.08.011) Copyright © 2015 Elsevier Ireland Ltd Terms and Conditions
Fig. 8 Historical movement track of target client using OSNs (Cell-ID based). Forensic Science International 2015 255, 64-71DOI: (10.1016/j.forsciint.2015.08.011) Copyright © 2015 Elsevier Ireland Ltd Terms and Conditions