Analisis Digital Artifak Aplikasi Signal Messenger Pada Sistem Operasi Android dengan metode NIST

Feryan Lutfie Nafila(1*), Yudi prayudi(2),

(1) Universitas Islam Indonesia
(2) Universitas Islam Indonesia
(*) Corresponding Author


Message applications have now become a part of today's society. Beside from features, security and privacy are important things for users. Security and privacy are important because some users of this application are worried if the message their send will misused by the company. This concern is heightened after a new rule issued by a popular instant messaging application company where data from the messaging application will be linked to other applications for business purposes, some popular messenger users are worried about their privacy choosing to switch to other messaging applications that are considered more secure and offers privacy. One of the applications of choice is Signal Messenger becouse this application is more secure in maintaining privacy. This is a concern if applications that offer more privacy become a means to commit crimes. Consider that, the research work will focused on conducting forensic testing and analysis of the Android-based Signal Messenger application. The test will carried out on SMA530F and RedmiNote 4 smartphone devices. The scenario that will applied is by installing the Signal Messenger application on each smartphone, then communication between the two smartphones is such as sending text messages, images, and videos. From these activities, the mobile forensics stage using the NIST method such as making acquisitions and then analysis to obtain digital evidence. The test results will be expect for a reference for the authorities and related parties if there is a case using the Signal Messenger application and it is hoped that this research can add to the literature in the field of digital forensics, especially mobile forensics

Full Text:



S. H. S. Halim, “Panduan Praktis Dijital Forensik,” 2012.

L. Daniel and L. Daniel, “Digital Forensics for Legal Professionals,” Digital Forensics for Legal Professionals. 2012, doi: 10.1016/C2010-0-67122-7.

R. Ayers, S. Brothers, and W. Jansen, “Guidelines on Cell Phone Forensics Guidelines on Mobile Device Forensics,” Arch. NIST Tech. Ser. Publ. Arch. Publ., vol. 1, 2007, [Online]. Available:

E. Casey, Digital Evidence and Computer Crime. Elsevier Science, 2011.

R. J. Hsieh, “Digital evidence and computer forensics,” Introd. to Forensic Sci. Crim., pp. 201–221, 2019, doi: 10.4324/9781315119175-9.

R. Umar, I. Riadi, and G. M. Zamroni, “Mobile forensic tools evaluation for digital crime investigation,” Int. J. Adv. Sci. Eng. Inf. Technol., vol. 8, no. 3, pp. 949–955, 2018, doi: 10.18517/ijaseit.8.3.3591.

Muhammad Kukuh Tri Haryanto, “Analisa Forensics Terhadap Database Sqlite pada Aplikasi IMO Berbasis Android,” p. 17, 2018.

J. Choi, J. Park, and H. Kim, “Forensic analysis of the backup database file in KakaoTalk messenger,” 2017 IEEE Int. Conf. Big Data Smart Comput. BigComp 2017, pp. 156–161, 2017, doi: 10.1109/BIGCOMP.2017.7881732.

M. N. Fadillah, R. Umar, and A. Yudhana, “Rancangan Metode Nist Untuk Forensik Aplikasi Mobile Payment Berbasis Android,” Semin. Nas. Inform. 2018 (semnasIF 2018), vol. 2018, no. November, pp. 115–119, 2018, [Online]. Available:

M. Praset yo Aji, I. Riadi, A. Fadlil, and A. Fauzan, “Evidence Gathering and Identification of LINE Messenger on Android Device,” Messenger Using NIST Mob. Foren… J. Comput er Sci. IJCSIS J. Comput er Sci., vol. 16, no. 5, pp. 201–205, 2018, [Online]. Available:

N. M. Latuconsina and P. W. Yunanto, “Pembuatan Bank Soal Dan Analisis Butir Soal Mata Kuliah Kriptografi Untuk Mahasiswa Program Studi Pendidikan Teknik Informatika Dan Komputer Universitas Negeri Jakarta,” PINTER J. Pendidik. Tek. Inform. dan Komput., vol. 1, no. 2, pp. 142–145, 2017, doi: 10.21009/pinter.1.2.7.



  • There are currently no refbacks.

J-SAKTI (Jurnal Sains Komputer & Informatika)
Published Papers Indexed/Abstracted By:

Jumlah Kunjungan :

View My Stats