首页 > 最新文献

Forensic Science International-Digital Investigation最新文献

英文 中文
The role of R&D in combating digital deception 研发在打击数字欺骗中的作用
IF 2 4区 医学 Pub Date : 2024-03-01 DOI: 10.1016/j.fsidi.2024.301732
{"title":"The role of R&D in combating digital deception","authors":"","doi":"10.1016/j.fsidi.2024.301732","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301732","url":null,"abstract":"","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"48 ","pages":"Article 301732"},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724000489/pdfft?md5=d484925faa482caa4cb5d4eb7198123b&pid=1-s2.0-S2666281724000489-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140000309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forensic implications of stacked file systems 堆叠文件系统的取证影响
IF 2 4区 医学 Pub Date : 2024-03-01 DOI: 10.1016/j.fsidi.2023.301678
Jan-Niclas Hilgert, Martin Lambertz, Daniel Baier

While file system analysis is a cornerstone of forensic investigations and has been extensively studied, certain file system classes have not yet been thoroughly examined from a forensic perspective. Stacked file systems, which use an underlying file system for data storage instead of a volume, are a prominent example. With the growth of cloud infrastructure and big data, it is increasingly likely that investigators will encounter distributed stacked file systems, such as MooseFS and the Hadoop File System, that employ this architecture. However, current standard models and tools for file system analysis fall short of addressing the complexities of stacked file systems. This paper highlights the forensic challenges and implications associated with stacked file systems, discussing their unique characteristics in the context of forensic analyses. We provide insights through three analyses of different stacked file systems, illustrating their operational details and emphasizing the necessity of understanding this file system category during forensic investigations. For this purpose, we present general considerations that must be made when dealing with the analysis of stacked file systems.

虽然文件系统分析是法证调查的基石并已被广泛研究,但某些文件系统类别尚未从法证角度进行彻底研究。堆叠文件系统就是一个突出的例子,它使用底层文件系统而不是卷来存储数据。随着云基础设施和大数据的发展,调查人员越来越有可能遇到采用这种架构的分布式堆叠文件系统,如 MooseFS 和 Hadoop 文件系统。然而,当前用于文件系统分析的标准模型和工具无法应对堆叠文件系统的复杂性。本文强调了与堆叠文件系统相关的取证挑战和影响,讨论了它们在取证分析中的独特性。我们通过对不同堆叠文件系统的三项分析提供见解,说明其操作细节,并强调在取证调查过程中了解该文件系统类别的必要性。为此,我们介绍了在分析堆叠文件系统时必须考虑的一般因素。
{"title":"Forensic implications of stacked file systems","authors":"Jan-Niclas Hilgert,&nbsp;Martin Lambertz,&nbsp;Daniel Baier","doi":"10.1016/j.fsidi.2023.301678","DOIUrl":"https://doi.org/10.1016/j.fsidi.2023.301678","url":null,"abstract":"<div><p>While file system analysis is a cornerstone of forensic investigations and has been extensively studied, certain file system classes have not yet been thoroughly examined from a forensic perspective. Stacked file systems, which use an underlying file system for data storage instead of a volume, are a prominent example. With the growth of cloud infrastructure and big data, it is increasingly likely that investigators will encounter distributed stacked file systems, such as MooseFS and the Hadoop File System, that employ this architecture. However, current standard models and tools for file system analysis fall short of addressing the complexities of stacked file systems. This paper highlights the forensic challenges and implications associated with stacked file systems, discussing their unique characteristics in the context of forensic analyses. We provide insights through three analyses of different stacked file systems, illustrating their operational details and emphasizing the necessity of understanding this file system category during forensic investigations. For this purpose, we present general considerations that must be made when dealing with the analysis of stacked file systems.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"48 ","pages":"Article 301678"},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266628172300197X/pdfft?md5=9c76c4773a2d4b6e6105a47e0cd439ce&pid=1-s2.0-S266628172300197X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140133974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DFRWS USA 2024 Baton Rouge DFRWS 美国 2024 巴吞鲁日
IF 2 4区 医学 Pub Date : 2024-03-01 DOI: 10.1016/S2666-2817(24)00016-7
{"title":"DFRWS USA 2024 Baton Rouge","authors":"","doi":"10.1016/S2666-2817(24)00016-7","DOIUrl":"https://doi.org/10.1016/S2666-2817(24)00016-7","url":null,"abstract":"","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"48 ","pages":"Article 301704"},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724000167/pdfft?md5=624b78a6875c14b2ce4c511bda82e3f4&pid=1-s2.0-S2666281724000167-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140133975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
So fresh, so clean: Cloud forensic analysis of the Amazon iRobot Roomba vacuum 如此清新,如此洁净:亚马逊 iRobot Roomba 真空吸尘器的云取证分析
IF 2 4区 医学 Pub Date : 2024-03-01 DOI: 10.1016/j.fsidi.2023.301686
Abdur Rahman Onik , Ruba Alsmadi , Ibrahim Baggili , Andrew M. Webb

The advent of the smart home has been made possible by Internet of Things (IoT) devices that continually collect and transmit private user data. In this paper, we explore how data from these devices can be accessed and applied for forensic investigations. Our research focuses on the iRobot Roomba autonomous vacuum cleaner. Through detailed analysis of Roomba's cloud infrastructure, we discovered undocumented Application Program Interfaces (APIs). Leveraging these APIs, we developed PyRoomba – an open-source Python application that acquires a Roomba's complete mission history and navigational data. From this information, PyRoomba generates detailed mission logs and maps of navigated spaces, informing the user about mission duration, detected objects, degree of coverage, and encrypted image captures. We compared the outcomes of PyRoomba with Roomba's mobile application across six navigation runs in two environments of different sizes. We found that PyRoomba provides more detailed environmental information. A simulated crime scene case study demonstrated PyRoomba's ability to detect environmental changes, such as bodies and knives, which were identified as hazards or obstacles. PyRoomba offers a more forensically sound approach to cloud acquisition compared to Roomba's standard mobile application, minimizing the risk of inadvertently triggering the device during a crime scene investigation.

物联网(IoT)设备不断收集和传输用户私人数据,使智能家居的出现成为可能。在本文中,我们将探讨如何访问这些设备的数据并将其应用于取证调查。我们的研究重点是 iRobot Roomba 自主真空吸尘器。通过详细分析 Roomba 的云基础设施,我们发现了未记录的应用程序接口 (API)。利用这些应用程序接口,我们开发了 PyRoomba--一个开源 Python 应用程序,用于获取 Roomba 的完整任务历史和导航数据。根据这些信息,PyRoomba 生成详细的任务日志和导航空间地图,并告知用户任务持续时间、检测到的物体、覆盖程度和加密图像捕获。我们比较了 PyRoomba 和 Roomba 移动应用程序在两个不同大小的环境中进行六次导航的结果。我们发现 PyRoomba 能提供更详细的环境信息。一个模拟犯罪现场的案例研究表明,PyRoomba 能够检测到环境变化,如尸体和刀具,这些都被识别为危险或障碍物。与 Roomba 的标准移动应用程序相比,PyRoomba 提供了一种更符合法医要求的云采集方法,最大限度地降低了在犯罪现场调查期间无意中触发设备的风险。
{"title":"So fresh, so clean: Cloud forensic analysis of the Amazon iRobot Roomba vacuum","authors":"Abdur Rahman Onik ,&nbsp;Ruba Alsmadi ,&nbsp;Ibrahim Baggili ,&nbsp;Andrew M. Webb","doi":"10.1016/j.fsidi.2023.301686","DOIUrl":"https://doi.org/10.1016/j.fsidi.2023.301686","url":null,"abstract":"<div><p>The advent of the smart home has been made possible by Internet of Things (IoT) devices that continually collect and transmit private user data. In this paper, we explore how data from these devices can be accessed and applied for forensic investigations. Our research focuses on the iRobot Roomba autonomous vacuum cleaner. Through detailed analysis of Roomba's cloud infrastructure, we discovered undocumented Application Program Interfaces (APIs). Leveraging these APIs, we developed PyRoomba – an open-source Python application that acquires a Roomba's complete mission history and navigational data. From this information, PyRoomba generates detailed mission logs and maps of navigated spaces, informing the user about mission duration, detected objects, degree of coverage, and encrypted image captures. We compared the outcomes of PyRoomba with Roomba's mobile application across six navigation runs in two environments of different sizes. We found that PyRoomba provides more detailed environmental information. A simulated crime scene case study demonstrated PyRoomba's ability to detect environmental changes, such as bodies and knives, which were identified as hazards or obstacles. PyRoomba offers a more forensically sound approach to cloud acquisition compared to Roomba's standard mobile application, minimizing the risk of inadvertently triggering the device during a crime scene investigation.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"48 ","pages":"Article 301686"},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281723002056/pdfft?md5=1c89d48540f77b7767d9dc8b2df83b01&pid=1-s2.0-S2666281723002056-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140134307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PHASER: Perceptual hashing algorithms evaluation and results - An open source forensic framework PHASER:感知散列算法评估与结果--一个开源取证框架
IF 2 4区 医学 Pub Date : 2024-03-01 DOI: 10.1016/j.fsidi.2023.301680
Sean McKeown, Peter Aaby, Andreas Steyven

The automated comparison of visual content is a contemporary solution to scale the detection of illegal media and extremist material, both for detection on individual devices and in the cloud. However, the problem is difficult, and perceptual similarity algorithms often have weaknesses and anomalous edge cases that may not be clearly documented. Additionally, it is a complex task to perform an evaluation of such tools in order to best utilise them. To address this, we present PHASER, a still-image perceptual hashing framework enabling forensics specialists and scientists to conduct experiments on bespoke datasets for their individual deployment scenarios. The framework utilises a modular approach, allowing users to specify and define a perceptual hash/image transform/distance metric triplet, which can be explored to better understand their behaviour and interactions. PHASER is open-source and we demonstrate its utility via case studies which briefly explore setting an appropriate dataset size and the potential to optimise the performance of existing algorithms by utilising learned weight vectors for comparing hashes.

视觉内容的自动比较是当代扩大非法媒体和极端主义材料检测范围的一种解决方案,既可用于单个设备上的检测,也可用于云中的检测。然而,这个问题很难解决,感知相似性算法往往存在弱点和异常边缘情况,而这些弱点和异常边缘情况可能没有明确的记录。此外,对这些工具进行评估以便更好地加以利用也是一项复杂的任务。为了解决这个问题,我们推出了 PHASER,这是一个静态图像感知散列框架,使取证专家和科学家能够在定制数据集上针对各自的部署方案进行实验。该框架采用模块化方法,允许用户指定和定义感知散列/图像变换/距离度量三元组,并对其进行探索,以更好地了解它们的行为和相互作用。PHASER 是开源的,我们通过案例研究展示了它的实用性,案例研究简要探讨了如何设置适当的数据集大小,以及通过利用学习到的权重向量比较哈希值来优化现有算法性能的潜力。
{"title":"PHASER: Perceptual hashing algorithms evaluation and results - An open source forensic framework","authors":"Sean McKeown,&nbsp;Peter Aaby,&nbsp;Andreas Steyven","doi":"10.1016/j.fsidi.2023.301680","DOIUrl":"https://doi.org/10.1016/j.fsidi.2023.301680","url":null,"abstract":"<div><p>The automated comparison of visual content is a contemporary solution to scale the detection of illegal media and extremist material, both for detection on individual devices and in the cloud. However, the problem is difficult, and perceptual similarity algorithms often have weaknesses and anomalous edge cases that may not be clearly documented. Additionally, it is a complex task to perform an evaluation of such tools in order to best utilise them. To address this, we present PHASER, a still-image perceptual hashing framework enabling forensics specialists and scientists to conduct experiments on bespoke datasets for their individual deployment scenarios. The framework utilises a modular approach, allowing users to specify and define a perceptual hash/image transform/distance metric triplet, which can be explored to better understand their behaviour and interactions. PHASER is open-source and we demonstrate its utility via case studies which briefly explore setting an appropriate dataset size and the potential to optimise the performance of existing algorithms by utilising learned weight vectors for comparing hashes.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"48 ","pages":"Article 301680"},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281723001993/pdfft?md5=bf4f7f2cae2a9401e3c7e72438aaf79a&pid=1-s2.0-S2666281723001993-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140134334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ChatGPT, Llama, can you write my report? An experiment on assisted digital forensics reports written using (local) large language models ChatGPT, Llama, 你能帮我写报告吗?使用(本地)大型语言模型撰写辅助数字取证报告的实验
IF 2 4区 医学 Pub Date : 2024-03-01 DOI: 10.1016/j.fsidi.2023.301683
Gaëtan Michelet, Frank Breitinger

Generative AIs, especially Large Language Models (LLMs) such as ChatGPT or Llama, have advanced significantly, positioning them as valuable tools for digital forensics. While initial studies have explored the potential of ChatGPT in the context of investigations, the question of to what extent LLMs can assist the forensic report writing process remains unresolved. To answer the question, this article first examines forensic reports with the goal of generalization (e.g., finding the ‘average structure’ of a report). We then evaluate the strengths and limitations of LLMs for generating the different parts of the forensic report using a case study. This work thus provides valuable insights into the automation of report writing, a critical facet of digital forensics investigations. We conclude that combined with thorough proofreading and corrections, LLMs may assist practitioners during the report writing process but at this point cannot replace them.

生成式人工智能,尤其是大型语言模型(LLM),如 ChatGPT 或 Llama,已经取得了长足的进步,成为数字取证的重要工具。虽然已有初步研究探索了 ChatGPT 在调查中的潜力,但 LLM 在多大程度上能协助法证报告撰写过程这一问题仍未解决。为了回答这个问题,本文首先以归纳为目标(例如,找到报告的 "平均结构")对法医报告进行了研究。然后,我们通过案例研究评估了 LLM 在生成法证报告不同部分时的优势和局限性。因此,这项工作为报告撰写自动化提供了宝贵的见解,而报告撰写自动化是数字取证调查的一个重要方面。我们的结论是,结合全面的校对和修正,LLM 可以在报告撰写过程中为从业人员提供帮助,但目前还不能取代他们。
{"title":"ChatGPT, Llama, can you write my report? An experiment on assisted digital forensics reports written using (local) large language models","authors":"Gaëtan Michelet,&nbsp;Frank Breitinger","doi":"10.1016/j.fsidi.2023.301683","DOIUrl":"https://doi.org/10.1016/j.fsidi.2023.301683","url":null,"abstract":"<div><p>Generative AIs, especially Large Language Models (LLMs) such as ChatGPT or Llama, have advanced significantly, positioning them as valuable tools for digital forensics. While initial studies have explored the potential of ChatGPT in the context of investigations, the question of to what extent LLMs can assist the forensic report writing process remains unresolved. To answer the question, this article first examines forensic reports with the goal of generalization (e.g., finding the ‘average structure’ of a report). We then evaluate the strengths and limitations of LLMs for generating the different parts of the forensic report using a case study. This work thus provides valuable insights into the automation of report writing, a critical facet of digital forensics investigations. We conclude that combined with thorough proofreading and corrections, LLMs may assist practitioners during the report writing process but at this point cannot replace them.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"48 ","pages":"Article 301683"},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281723002020/pdfft?md5=7fa170169dea7b2b53ba42a635e6e67e&pid=1-s2.0-S2666281723002020-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140133965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Well Played, Suspect! – Forensic examination of the handheld gaming console “Steam Deck” 玩得好,嫌疑犯!- 对掌上游戏机 "Steam Deck "的法医鉴定
IF 2 4区 医学 Pub Date : 2024-03-01 DOI: 10.1016/j.fsidi.2023.301688
Maximilian Eichhorn, Janine Schneider, Gaston Pugliese

The video game industry has been experiencing consistent growth, accompanied by an increase in the number of players. After the remarkable success of the Nintendo Switch, it comes as no surprise that various other manufacturers have ventured into developing their own handheld gaming consoles. As a consequence, it is likely that these types of devices will be found more frequently in households in the near future and that they will start to play a more important role in forensic investigations. In light of this, we conducted a forensic examination of Valve's recent Steam Deck console to assist forensic investigators in retrieving and interpreting digital evidence obtained from such devices. The Steam Deck console runs on SteamOS and ships with a custom version of Valve's highly popular Steam gaming platform. Our examination encompasses exploring the console's architecture, the SteamOS operating system, and the pre-installed cross-platform Steam client. Using differential forensic analysis, we systematically identify forensically relevant artifacts on the handheld console and report on their locations and contents. Based on our findings, we developed Autopsy plugins for the automated extraction of forensic artifacts from images taken of Steam Deck devices.

伴随着玩家数量的增加,电子游戏产业一直在持续增长。在任天堂 Switch 取得巨大成功后,其他制造商也纷纷涉足开发自己的掌上游戏机,这一点也不足为奇。因此,在不久的将来,这类设备可能会更频繁地出现在家庭中,并开始在法医调查中发挥更重要的作用。有鉴于此,我们对 Valve 最近推出的 Steam Deck 控制台进行了法证检验,以协助法证调查人员检索和解释从此类设备中获取的数字证据。Steam Deck 控制台在 SteamOS 上运行,并搭载了 Valve 广受欢迎的 Steam 游戏平台的定制版本。我们的检查包括探索控制台的架构、SteamOS 操作系统和预装的跨平台 Steam 客户端。利用差分取证分析,我们系统地识别了手持控制台上与取证相关的人工制品,并报告了它们的位置和内容。根据我们的研究结果,我们开发了 Autopsy 插件,用于从 Steam Deck 设备拍摄的图像中自动提取取证工件。
{"title":"Well Played, Suspect! – Forensic examination of the handheld gaming console “Steam Deck”","authors":"Maximilian Eichhorn,&nbsp;Janine Schneider,&nbsp;Gaston Pugliese","doi":"10.1016/j.fsidi.2023.301688","DOIUrl":"https://doi.org/10.1016/j.fsidi.2023.301688","url":null,"abstract":"<div><p>The video game industry has been experiencing consistent growth, accompanied by an increase in the number of players. After the remarkable success of the Nintendo Switch, it comes as no surprise that various other manufacturers have ventured into developing their own handheld gaming consoles. As a consequence, it is likely that these types of devices will be found more frequently in households in the near future and that they will start to play a more important role in forensic investigations. In light of this, we conducted a forensic examination of Valve's recent Steam Deck console to assist forensic investigators in retrieving and interpreting digital evidence obtained from such devices. The Steam Deck console runs on SteamOS and ships with a custom version of Valve's highly popular Steam gaming platform. Our examination encompasses exploring the console's architecture, the SteamOS operating system, and the pre-installed cross-platform Steam client. Using differential forensic analysis, we systematically identify forensically relevant artifacts on the handheld console and report on their locations and contents. Based on our findings, we developed Autopsy plugins for the automated extraction of forensic artifacts from images taken of Steam Deck devices.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"48 ","pages":"Article 301688"},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266628172300207X/pdfft?md5=4942e4f1f339b7f090d006e561f314ce&pid=1-s2.0-S266628172300207X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140134363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DFRWS EU 10-year review and future directions in Digital Forensic Research DFRWS 欧盟数字取证研究十年回顾与未来方向
IF 2 4区 医学 Pub Date : 2024-03-01 DOI: 10.1016/j.fsidi.2023.301685
Frank Breitinger , Jan-Niclas Hilgert , Christopher Hargreaves , John Sheppard , Rebekah Overdorf , Mark Scanlon

Conducting a systematic literature review and comprehensive analysis, this paper surveys all 135 peer-reviewed articles published at the Digital Forensics Research Conference Europe (DFRWS EU) spanning the decade since its inaugural running (2014–2023). This comprehensive study of DFRWS EU articles encompasses sub-disciplines such as digital forensic science, device forensics, techniques and fundamentals, artefact forensics, multimedia forensics, memory forensics, and network forensics. Quantitative analysis of the articles’ co-authorships, geographical spread and citation metrics are outlined. The analysis presented offers insights into the evolution of digital forensic research efforts over these ten years and informs some identified future research directions.

本文通过系统的文献回顾和综合分析,调查了欧洲数字取证研究会议(DFRWS EU)自首次举办以来的十年间(2014-2023年)发表的所有135篇同行评审文章。这项对欧洲数字取证研究会议文章的综合研究涵盖了数字取证科学、设备取证、技术与基础、人工制品取证、多媒体取证、内存取证和网络取证等子学科。对文章的合著者、地理分布和引用指标进行了定量分析。所做的分析有助于深入了解这十年来数字取证研究工作的演变,并为一些已确定的未来研究方向提供信息。
{"title":"DFRWS EU 10-year review and future directions in Digital Forensic Research","authors":"Frank Breitinger ,&nbsp;Jan-Niclas Hilgert ,&nbsp;Christopher Hargreaves ,&nbsp;John Sheppard ,&nbsp;Rebekah Overdorf ,&nbsp;Mark Scanlon","doi":"10.1016/j.fsidi.2023.301685","DOIUrl":"https://doi.org/10.1016/j.fsidi.2023.301685","url":null,"abstract":"<div><p>Conducting a systematic literature review and comprehensive analysis, this paper surveys all 135 peer-reviewed articles published at the Digital Forensics Research Conference Europe (DFRWS EU) spanning the decade since its inaugural running (2014–2023). This comprehensive study of DFRWS EU articles encompasses sub-disciplines such as digital forensic science, device forensics, techniques and fundamentals, artefact forensics, multimedia forensics, memory forensics, and network forensics. Quantitative analysis of the articles’ co-authorships, geographical spread and citation metrics are outlined. The analysis presented offers insights into the evolution of digital forensic research efforts over these ten years and informs some identified future research directions.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"48 ","pages":"Article 301685"},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281723002044/pdfft?md5=593bd091397c0cfd0b34cd03281a4eb5&pid=1-s2.0-S2666281723002044-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140133967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Welcome to the 11th annual DFRWS Europe conference! 欢迎参加第 11 届 DFRWS 欧洲年会!
IF 2 4区 医学 Pub Date : 2024-03-01 DOI: 10.1016/j.fsidi.2024.301694
{"title":"Welcome to the 11th annual DFRWS Europe conference!","authors":"","doi":"10.1016/j.fsidi.2024.301694","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301694","url":null,"abstract":"","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"48 ","pages":"Article 301694"},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140134309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting RPMB authentication in a closed source TEE implementation 在封闭源 TEE 实施中利用 RPMB 身份验证
IF 2 4区 医学 Pub Date : 2024-03-01 DOI: 10.1016/j.fsidi.2023.301682
Aya Fukami , Richard Buurke , Zeno Geradts

Embedded Multimedia Cards (eMMCs) provide a protected memory area called the Replay Protected Memory Block (RPMB). eMMCs are commonly used as storage media in modern smartphones. In order to protect these devices from unauthorized access, important data is stored in the RPMB area in an authenticated manner. Modification of the RPMB data requires a pre-shared authentication key. An unauthorized user cannot change the stored data.

On modern devices, this pre-shared key is generated and used exclusively within a Trusted Execution Environment (TEE) preventing attackers from access. In this paper, we investigate how the authentication key for RPMB is programmed on the eMMC. We found that this key can be extracted directly from the target memory chip. Once obtained, the authentication key can be used to manipulate stored data. In addition, poor implementation of certain security features, aimed at preventing replay attacks using RPMB on the host system can be broken by an attacker. We show how the authentication key can be extracted and how it can be used to break the anti-rollback protection to enable data restoration even after a data wipe operation has been completed.

Our findings show that non-secure RPMB implementations can enable forensic investigators to break security features implemented on modern smartphones.

嵌入式多媒体卡(eMMC)提供一个名为 "重放保护内存块"(RPMB)的受保护内存区域。为了保护这些设备免遭未经授权的访问,重要数据以验证方式存储在 RPMB 区域。修改 RPMB 数据需要预先共享的验证密钥。在现代设备上,这种预共享密钥只在可信执行环境(TEE)中生成和使用,以防止攻击者访问。在本文中,我们研究了 RPMB 的验证密钥是如何在 eMMC 上编程的。我们发现,该密钥可直接从目标存储芯片中提取。一旦获取,认证密钥就可用于操作存储的数据。此外,某些旨在防止主机系统使用 RPMB 进行重放攻击的安全功能执行不力,也会被攻击者破解。我们的研究结果表明,不安全的 RPMB 实现可以让取证调查人员破解现代智能手机上实现的安全功能。
{"title":"Exploiting RPMB authentication in a closed source TEE implementation","authors":"Aya Fukami ,&nbsp;Richard Buurke ,&nbsp;Zeno Geradts","doi":"10.1016/j.fsidi.2023.301682","DOIUrl":"https://doi.org/10.1016/j.fsidi.2023.301682","url":null,"abstract":"<div><p>Embedded Multimedia Cards (eMMCs) provide a protected memory area called the Replay Protected Memory Block (RPMB). eMMCs are commonly used as storage media in modern smartphones. In order to protect these devices from unauthorized access, important data is stored in the RPMB area in an authenticated manner. Modification of the RPMB data requires a pre-shared authentication key. An unauthorized user cannot change the stored data.</p><p>On modern devices, this pre-shared key is generated and used exclusively within a Trusted Execution Environment (TEE) preventing attackers from access. In this paper, we investigate how the authentication key for RPMB is programmed on the eMMC. We found that this key can be extracted directly from the target memory chip. Once obtained, the authentication key can be used to manipulate stored data. In addition, poor implementation of certain security features, aimed at preventing replay attacks using RPMB on the host system can be broken by an attacker. We show how the authentication key can be extracted and how it can be used to break the anti-rollback protection to enable data restoration even after a data wipe operation has been completed.</p><p>Our findings show that non-secure RPMB implementations can enable forensic investigators to break security features implemented on modern smartphones.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"48 ","pages":"Article 301682"},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281723002019/pdfft?md5=fb11101f9e02b7ee1646a53366d1bf42&pid=1-s2.0-S2666281723002019-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140134362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Forensic Science International-Digital Investigation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1