AFAUC -- Anti-forensics of Storage Devices by Alternative Use of Communication Channels

Harald Baier, J. Knauer
{"title":"AFAUC -- Anti-forensics of Storage Devices by Alternative Use of Communication Channels","authors":"Harald Baier, J. Knauer","doi":"10.1109/IMF.2014.11","DOIUrl":null,"url":null,"abstract":"Since the end of the 1990ies side channel attacks became a very prominent branch of cryptography. In other areas of computer security, however, side channels are not well studied. It is the primary goal of this paper to raise the awareness of the community about the potential existence of side channels during a forensic investigation. We present a concept called AFAUC - anti-forensics of data storage by alternative use of communication channels. The general idea is to confuse the investigator by abusing a communication channel for unintended purposes. As a concrete example of AFAUC, we access a storage device through its diagnostic interface to obfuscate data on that device. More precisely, we analyse if it is feasible in practice to abuse an existing communication channel, which was designed for a different purpose, to hide data in an area of a hard disc drive (HDD), which is not accessible by an investigator and which is different from the well-known Host Protected Area and Device Configuration Overlay, respectively. The basic idea is to access the HDD via its diagnostic interface in an unintended manner and to manipulate its size in the firmware setting. We show that this is possible even without any expensive tool for a Samsung HDD. Evaluation including a test in a law enforcement laboratory revealed that the hidden data would not be detected in an ordinary case. Hence AFAUC may be used by skilled, but not well-funded users. Although AFAUC is a classical dual-use technology, we would like to initiate the community to come up with further alternative use cases of communication channels to support users in oppressive countries to defend themselves. In contrast to the underground economy these users are typically not well-funded and thus depend on reliable anti-forensic methods.","PeriodicalId":419890,"journal":{"name":"2014 Eighth International Conference on IT Security Incident Management & IT Forensics","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 Eighth International Conference on IT Security Incident Management & IT Forensics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMF.2014.11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

Since the end of the 1990ies side channel attacks became a very prominent branch of cryptography. In other areas of computer security, however, side channels are not well studied. It is the primary goal of this paper to raise the awareness of the community about the potential existence of side channels during a forensic investigation. We present a concept called AFAUC - anti-forensics of data storage by alternative use of communication channels. The general idea is to confuse the investigator by abusing a communication channel for unintended purposes. As a concrete example of AFAUC, we access a storage device through its diagnostic interface to obfuscate data on that device. More precisely, we analyse if it is feasible in practice to abuse an existing communication channel, which was designed for a different purpose, to hide data in an area of a hard disc drive (HDD), which is not accessible by an investigator and which is different from the well-known Host Protected Area and Device Configuration Overlay, respectively. The basic idea is to access the HDD via its diagnostic interface in an unintended manner and to manipulate its size in the firmware setting. We show that this is possible even without any expensive tool for a Samsung HDD. Evaluation including a test in a law enforcement laboratory revealed that the hidden data would not be detected in an ordinary case. Hence AFAUC may be used by skilled, but not well-funded users. Although AFAUC is a classical dual-use technology, we would like to initiate the community to come up with further alternative use cases of communication channels to support users in oppressive countries to defend themselves. In contrast to the underground economy these users are typically not well-funded and thus depend on reliable anti-forensic methods.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
AFAUC—通过替代使用通信渠道对存储设备进行反取证
自20世纪90年代末以来,侧信道攻击成为密码学的一个非常突出的分支。然而,在计算机安全的其他领域,侧信道并没有得到很好的研究。本文的主要目标是提高社区对法医调查过程中可能存在的侧通道的认识。我们提出了一个概念,称为AFAUC -反取证数据存储的替代使用通信渠道。一般的想法是通过滥用通信渠道来达到意想不到的目的,从而使调查人员感到困惑。作为AFAUC的具体示例,我们通过其诊断接口访问存储设备以混淆该设备上的数据。更准确地说,我们分析了在实践中滥用现有的通信通道是否可行,该通道是为不同目的而设计的,将数据隐藏在硬盘驱动器(HDD)的一个区域中,该区域无法被调查人员访问,并且不同于众所周知的主机保护区和设备配置覆盖。基本思想是以一种意想不到的方式通过其诊断接口访问HDD,并在固件设置中操纵其大小。我们表明,这是可能的,即使没有任何昂贵的工具为三星硬盘。包括在执法实验室进行测试在内的评估显示,在普通案件中无法发现隐藏的数据。因此,AFAUC可能被技术熟练但资金不足的用户使用。虽然AFAUC是一种经典的军民两用技术,但我们希望发起社区提出进一步的通信渠道替代用例,以支持压迫国家的用户保护自己。与地下经济相比,这些用户通常资金不足,因此依赖于可靠的反取证方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Assuming a State of Compromise: A Best Practise Approach for SMEs on Incident Response Management Information Security Incident Management: Planning for Failure Post-Mortem Memory Analysis of Cold-Booted Android Devices The Humming Hum: Background Noise as a Carrier of ENF Artifacts in Mobile Device Audio Recordings AFAUC -- Anti-forensics of Storage Devices by Alternative Use of Communication Channels
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1