首页 > 最新文献

Forensic Science International-Digital Investigation最新文献

英文 中文
Advanced forensic recovery of deleted file data in F2FS 高级取证恢复已删除的文件数据在F2FS
IF 2.2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-01 Epub Date: 2025-11-03 DOI: 10.1016/j.fsidi.2025.301976
Junghoon Oh, Hyunuk Hwang
Flash-Friendly File System (F2FS) is a file system optimized for flash memory-based storage devices and is used in a wide range of devices including Android smartphones, drones, in-vehicle infotainment systems and embedded devices. Therefore, from a digital forensic perspective, a recovery technology for deleted file data in F2FS is needed. However, as far as research on deleted data recovery from F2FS is concerned, only basic research has been conducted on deleted data recovery from F2FS, and no specific recovery algorithms have been published. Even in the case of tools that support deleted file data recovery from F2FS, a significant proportion of deleted file data could not be recovered in tests, which limits their usefulness in real-world digital forensic investigations. Therefore, this paper proposes a deleted file data recovery algorithm based on file system metadata carving and virtual address table creation to overcome the limitations of existing research and tools. The proposed recovery algorithm is implemented as a recovery tool and used for performance evaluation with existing forensic and data recovery tools. The performance evaluation results proved the superiority of the recovery algorithm, with the proposed algorithm showing superior recovery performance compared to existing tools.
flash - friendly File System (F2FS)是一种针对基于闪存的存储设备进行优化的文件系统,广泛应用于Android智能手机、无人机、车载信息娱乐系统和嵌入式设备等设备。因此,从数字取证的角度来看,需要一种F2FS中被删除文件数据的恢复技术。但是,对于从F2FS中恢复已删除数据的研究,目前仅对从F2FS中恢复已删除数据进行了基础研究,并没有发表具体的恢复算法。即使使用支持从F2FS中恢复已删除文件数据的工具,也有很大一部分已删除文件数据无法在测试中恢复,这限制了它们在实际数字取证调查中的用处。因此,本文提出了一种基于文件系统元数据雕刻和虚拟地址表创建的被删除文件数据恢复算法,以克服现有研究和工具的局限性。提出的恢复算法作为恢复工具实现,并与现有的取证和数据恢复工具一起用于性能评估。性能评价结果证明了恢复算法的优越性,与现有工具相比,所提算法的恢复性能更优。
{"title":"Advanced forensic recovery of deleted file data in F2FS","authors":"Junghoon Oh,&nbsp;Hyunuk Hwang","doi":"10.1016/j.fsidi.2025.301976","DOIUrl":"10.1016/j.fsidi.2025.301976","url":null,"abstract":"<div><div>Flash-Friendly File System (F2FS) is a file system optimized for flash memory-based storage devices and is used in a wide range of devices including Android smartphones, drones, in-vehicle infotainment systems and embedded devices. Therefore, from a digital forensic perspective, a recovery technology for deleted file data in F2FS is needed. However, as far as research on deleted data recovery from F2FS is concerned, only basic research has been conducted on deleted data recovery from F2FS, and no specific recovery algorithms have been published. Even in the case of tools that support deleted file data recovery from F2FS, a significant proportion of deleted file data could not be recovered in tests, which limits their usefulness in real-world digital forensic investigations. Therefore, this paper proposes a deleted file data recovery algorithm based on file system metadata carving and virtual address table creation to overcome the limitations of existing research and tools. The proposed recovery algorithm is implemented as a recovery tool and used for performance evaluation with existing forensic and data recovery tools. The performance evaluation results proved the superiority of the recovery algorithm, with the proposed algorithm showing superior recovery performance compared to existing tools.</div></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"54 ","pages":"Article 301976"},"PeriodicalIF":2.2,"publicationDate":"2025-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145424488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tool type identification for forensic digital document examination 法医数字文件检验工具类型识别
IF 2.2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-01 Epub Date: 2025-08-04 DOI: 10.1016/j.fsidi.2025.301972
Muhammad Abdul Moiz Zia, Oluwasola Mary Adedayo
Digital documents have become a significant part of our everyday lives. From identity documents to various legal agreements and business communications, the ability to determine the authenticity and origin of different types of documents is incredibly important. In the physical domain, this need is addressed by forensic document examiners. Although many of the analysis methods used in the physical domain do not apply in the digital realm, the forensic analysis processes in both realms still address similar objectives. In this paper, we focus on the objective of identifying the tool that created a digital document to support answering questions about the origin of a document. In contrast to many existing works on the forensic analysis of digital documents which focus on file type identification, this paper focuses on identifying the tool that is used to create a document. This is particularly relevant for forensic digital document examination (FDDE). The paper explores the use of different machine learning algorithms to analyze PDF documents to determine the tool that created the document. Given that traditional methods for digital document analysis often rely on metadata and visible content that can be tampered with, we used a structural analysis approach that builds on methods that have previously been used for file type identification. We explored the use of byte histograms and entropy measurements in developing models capable of identifying the specific software used to create PDF documents using several machine learning models. Our results showed that Convolutional Neural Networks (CNNs) outperformed other models. In further experiments, we explored the use of the same approach to identify the version of a specific tool used to create a document and alternative ways of creating PDFs from a tool. Our results confirm the feasibility of this approach for digital document tool type identification with a high level of accuracy.
数字文档已经成为我们日常生活中重要的一部分。从身份文件到各种法律协议和商业通信,确定不同类型文件的真实性和来源的能力是非常重要的。在物理领域,这一需求由法医文件审查员解决。尽管物理领域中使用的许多分析方法并不适用于数字领域,但这两个领域的取证分析过程仍然解决类似的目标。在本文中,我们关注的目标是识别创建数字文档的工具,以支持回答有关文档起源的问题。与许多现有的专注于文件类型识别的数字文档取证分析工作不同,本文侧重于识别用于创建文档的工具。这与法医数字文件检查(FDDE)特别相关。本文探讨了使用不同的机器学习算法来分析PDF文档,以确定创建文档的工具。考虑到数字文档分析的传统方法通常依赖于可以被篡改的元数据和可见内容,我们使用了一种结构分析方法,该方法建立在以前用于文件类型识别的方法之上。我们探索了字节直方图和熵测量在开发模型中的使用,这些模型能够识别用于使用几个机器学习模型创建PDF文档的特定软件。我们的研究结果表明,卷积神经网络(cnn)优于其他模型。在进一步的实验中,我们探索了使用相同的方法来识别用于创建文档的特定工具的版本,以及从工具创建pdf的替代方法。我们的结果证实了这种方法在数字文档工具类型识别方面的可行性,并且具有很高的准确性。
{"title":"Tool type identification for forensic digital document examination","authors":"Muhammad Abdul Moiz Zia,&nbsp;Oluwasola Mary Adedayo","doi":"10.1016/j.fsidi.2025.301972","DOIUrl":"10.1016/j.fsidi.2025.301972","url":null,"abstract":"<div><div>Digital documents have become a significant part of our everyday lives. From identity documents to various legal agreements and business communications, the ability to determine the authenticity and origin of different types of documents is incredibly important. In the physical domain, this need is addressed by forensic document examiners. Although many of the analysis methods used in the physical domain do not apply in the digital realm, the forensic analysis processes in both realms still address similar objectives. In this paper, we focus on the objective of identifying the tool that created a digital document to support answering questions about the origin of a document. In contrast to many existing works on the forensic analysis of digital documents which focus on file type identification, this paper focuses on identifying the tool that is used to create a document. This is particularly relevant for forensic digital document examination (FDDE). The paper explores the use of different machine learning algorithms to analyze PDF documents to determine the tool that created the document. Given that traditional methods for digital document analysis often rely on metadata and visible content that can be tampered with, we used a structural analysis approach that builds on methods that have previously been used for file type identification. We explored the use of byte histograms and entropy measurements in developing models capable of identifying the specific software used to create PDF documents using several machine learning models. Our results showed that Convolutional Neural Networks (CNNs) outperformed other models. In further experiments, we explored the use of the same approach to identify the version of a specific tool used to create a document and alternative ways of creating PDFs from a tool. Our results confirm the feasibility of this approach for digital document tool type identification with a high level of accuracy.</div></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"54 ","pages":"Article 301972"},"PeriodicalIF":2.2,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144766757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital forensics in law enforcement: A case study of LLM-driven evidence analysis 执法中的数字取证:法学硕士驱动的证据分析案例研究
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-01 Epub Date: 2025-05-28 DOI: 10.1016/j.fsidi.2025.301939
Kyung-Jong Kim , Chan-Hwi Lee , So-Eun Bae , Ju-Hyun Choi , Wook Kang
The advent of digital technology and the ubiquity of mobile devices in today's society has led to a significant increase in the importance of mobile forensics in criminal investigations. Responding to the escalating volume and complexity of data due to enhanced smartphone capabilities and pervasive messaging apps, law enforcement agencies face challenges in data analysis. This study explores improving investigative efficiency through LLM-driven analysis of text from mobile messenger communications. We have conducted experiments on anonymized data collected from real crime scenes by employing three state-of-the-art LLM models, namely GPT-4o, Gemini 1.5 and Claude 3.5. The study focuses on optimizing model performance by employing prompt engineering, interpreting expressions embedded with hidden meanings such as slang, and contextually inferring ambiguous word usage. Finally, model performance is quantitatively evaluated using metrics such as precision, recall, F1 score, and hallucination rate.
数字技术的出现和移动设备在当今社会的无处不在,使得移动取证在刑事调查中的重要性显著增加。由于智能手机功能的增强和无处不在的消息应用程序,数据量和复杂性不断增加,执法机构在数据分析方面面临挑战。本研究探讨了通过法学硕士驱动的移动信使通信文本分析来提高调查效率。我们利用三种最先进的法学硕士模型,即gpt - 40, Gemini 1.5和Claude 3.5,对从真实犯罪现场收集的匿名数据进行了实验。该研究的重点是通过使用提示工程,解释包含隐藏含义的表达(如俚语)以及上下文推断歧义词的使用来优化模型性能。最后,使用精度、召回率、F1分数和幻觉率等指标对模型性能进行定量评估。
{"title":"Digital forensics in law enforcement: A case study of LLM-driven evidence analysis","authors":"Kyung-Jong Kim ,&nbsp;Chan-Hwi Lee ,&nbsp;So-Eun Bae ,&nbsp;Ju-Hyun Choi ,&nbsp;Wook Kang","doi":"10.1016/j.fsidi.2025.301939","DOIUrl":"10.1016/j.fsidi.2025.301939","url":null,"abstract":"<div><div>The advent of digital technology and the ubiquity of mobile devices in today's society has led to a significant increase in the importance of mobile forensics in criminal investigations. Responding to the escalating volume and complexity of data due to enhanced smartphone capabilities and pervasive messaging apps, law enforcement agencies face challenges in data analysis. This study explores improving investigative efficiency through LLM-driven analysis of text from mobile messenger communications. We have conducted experiments on anonymized data collected from real crime scenes by employing three state-of-the-art LLM models, namely GPT-4o, Gemini 1.5 and Claude 3.5. The study focuses on optimizing model performance by employing prompt engineering, interpreting expressions embedded with hidden meanings such as slang, and contextually inferring ambiguous word usage. Finally, model performance is quantitatively evaluated using metrics such as precision, recall, F1 score, and hallucination rate.</div></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"54 ","pages":"Article 301939"},"PeriodicalIF":2.0,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144154363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Thumb: A forensic automation framework leveraging MLLMs and OCR on Android device Thumb:在Android设备上利用mlm和OCR的取证自动化框架
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-01 Epub Date: 2025-06-17 DOI: 10.1016/j.fsidi.2025.301949
Dingjie Shang, Amin Sakzad, Stuart W. Hall
The forensic of Android devices is challenging due to automated thumbnail generation by applications and the operating system, complicating attribution to specific user actions. This paper presents the design, implementation, and evaluation of a forensic framework, Thumb, which performs real-time experiments on physical Android devices. Thumb integrates multimodal large language models (MLLM) and Optical Character Recognition (OCR) to capture on-screen information and simulate user interactions, while extracting data from internal storage to monitor changes in cached and thumbnail files. A proof-of-concept implementation demonstrates the framework's accuracy across various applications, highlighting its potential to simplify Android forensic analysis. However, current MLLM limitations and the framework's structure pose challenges in complex scenarios and detailed data analysis.
Android设备的取证具有挑战性,因为应用程序和操作系统会自动生成缩略图,这使得对特定用户行为的归因变得复杂。本文介绍了一个取证框架Thumb的设计、实现和评估,该框架可以在物理Android设备上进行实时实验。Thumb集成了多模态大语言模型(MLLM)和光学字符识别(OCR)来捕捉屏幕上的信息并模拟用户交互,同时从内部存储中提取数据以监控缓存和缩略图文件的变化。概念验证实现演示了该框架在各种应用程序中的准确性,突出了其简化Android取证分析的潜力。然而,当前MLLM的局限性和框架的结构给复杂场景和详细数据分析带来了挑战。
{"title":"Thumb: A forensic automation framework leveraging MLLMs and OCR on Android device","authors":"Dingjie Shang,&nbsp;Amin Sakzad,&nbsp;Stuart W. Hall","doi":"10.1016/j.fsidi.2025.301949","DOIUrl":"10.1016/j.fsidi.2025.301949","url":null,"abstract":"<div><div>The forensic of Android devices is challenging due to automated thumbnail generation by applications and the operating system, complicating attribution to specific user actions. This paper presents the design, implementation, and evaluation of a forensic framework, Thumb, which performs real-time experiments on physical Android devices. Thumb integrates multimodal large language models (MLLM) and Optical Character Recognition (OCR) to capture on-screen information and simulate user interactions, while extracting data from internal storage to monitor changes in cached and thumbnail files. A proof-of-concept implementation demonstrates the framework's accuracy across various applications, highlighting its potential to simplify Android forensic analysis. However, current MLLM limitations and the framework's structure pose challenges in complex scenarios and detailed data analysis.</div></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"54 ","pages":"Article 301949"},"PeriodicalIF":2.0,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital forensic approaches to Intel and AMD firmware RAID systems 英特尔和AMD固件RAID系统的数字取证方法
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-01 Epub Date: 2025-07-07 DOI: 10.1016/j.fsidi.2025.301971
Woosung Yun , Jeuk Kang , Sangjin Lee, Jungheum Park
In recent years, as the amount of data that individuals deal with has increased, CPU manufacturers (Intel and AMD) have developed RAID systems that are readily available on desktop PCs. This is referred to as firmware RAID. In contrast to RAID systems on servers and network-attached storage (NAS) devices, which require a relatively complex configuration process, firmware RAID is relatively straightforward and easy to set up via the basic input/output system (BIOS). Intel supports this technology on the majority of its motherboards, with the exception of a few minor models released since 2020, under the name of Intel Rapid Storage Technology (IRST). Similarly, AMD has provided for this technology to all motherboard chipsets released since 2017 under the name of RAIDXpert. From the perspective of digital forensics, a disk with a firmware RAID is recognized by the operating system as a single physical disk and is typically connected to the motherboard without any additional devices. Consequently, during a digital forensics investigation, investigators barely recognize its application, and, as a result, a significant amount of data could be omitted without intention, or could be lost through simple anti-forensic behavior by a malicious user. At present, there are no publicly available techniques for identifying or reconstructing disks in a firmware RAID system, despite the fact that this system is available on nearly every desktop PC. In this paper, we present an analysis of the operational patterns and structures of firmware RAID supported by Intel and AMD. Our approach has led to the development of X-raid, a digital forensic tool capable of identifying firmware-based volumes within a system and reconstructing normal or deleted virtual disks. Furthermore, we propose a methodological digital forensic framework for investigating computer systems with considerations of firmware RAID.
近年来,随着个人处理的数据量的增加,CPU制造商(英特尔和AMD)已经开发出可以在台式电脑上使用的RAID系统。这被称为固件RAID。服务器和网络附加存储(NAS)设备上的RAID系统需要相对复杂的配置过程,而固件RAID则相对简单,易于通过基本输入/输出系统(BIOS)进行设置。英特尔在其大多数主板上支持这项技术,除了自2020年以来发布的几款小型型号,这些型号以英特尔快速存储技术(IRST)的名义发布。同样,AMD已经为自2017年以来以RAIDXpert的名义发布的所有主板芯片组提供了这项技术。从数字取证的角度来看,具有固件RAID的磁盘被操作系统识别为单个物理磁盘,并且通常连接到主板上,而不需要任何额外的设备。因此,在数字取证调查期间,调查人员几乎无法识别其应用,因此,大量数据可能无意中被遗漏,或者可能因恶意用户的简单反取证行为而丢失。目前,还没有公开可用的技术来识别或重建固件RAID系统中的磁盘,尽管几乎每个桌面PC都可以使用该系统。本文分析了Intel和AMD支持的固件RAID的工作模式和结构。我们的方法导致了X-raid的开发,这是一种数字取证工具,能够识别系统中基于固件的卷,并重建正常或已删除的虚拟磁盘。此外,我们提出了一种方法学数字取证框架,用于调查考虑固件RAID的计算机系统。
{"title":"Digital forensic approaches to Intel and AMD firmware RAID systems","authors":"Woosung Yun ,&nbsp;Jeuk Kang ,&nbsp;Sangjin Lee,&nbsp;Jungheum Park","doi":"10.1016/j.fsidi.2025.301971","DOIUrl":"10.1016/j.fsidi.2025.301971","url":null,"abstract":"<div><div>In recent years, as the amount of data that individuals deal with has increased, CPU manufacturers (Intel and AMD) have developed RAID systems that are readily available on desktop PCs. This is referred to as firmware RAID. In contrast to RAID systems on servers and network-attached storage (NAS) devices, which require a relatively complex configuration process, firmware RAID is relatively straightforward and easy to set up via the basic input/output system (BIOS). Intel supports this technology on the majority of its motherboards, with the exception of a few minor models released since 2020, under the name of Intel Rapid Storage Technology (IRST). Similarly, AMD has provided for this technology to all motherboard chipsets released since 2017 under the name of RAIDXpert. From the perspective of digital forensics, a disk with a firmware RAID is recognized by the operating system as a single physical disk and is typically connected to the motherboard without any additional devices. Consequently, during a digital forensics investigation, investigators barely recognize its application, and, as a result, a significant amount of data could be omitted without intention, or could be lost through simple anti-forensic behavior by a malicious user. At present, there are no publicly available techniques for identifying or reconstructing disks in a firmware RAID system, despite the fact that this system is available on nearly every desktop PC. In this paper, we present an analysis of the operational patterns and structures of firmware RAID supported by Intel and AMD. Our approach has led to the development of <em>X-raid</em>, a digital forensic tool capable of identifying firmware-based volumes within a system and reconstructing normal or deleted virtual disks. Furthermore, we propose a methodological digital forensic framework for investigating computer systems with considerations of firmware RAID.</div></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"54 ","pages":"Article 301971"},"PeriodicalIF":2.0,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144569858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Autocrime - open multimodal platform for combating organized crime 自动犯罪-打击有组织犯罪的开放式多模式平台
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-01 Epub Date: 2025-06-03 DOI: 10.1016/j.fsidi.2025.301937
Srikanth Madikeri , Petr Motlicek , Dairazalia Sanchez-Cortes , Pradeep Rangappa , Joshua Hughes , Jakub Tkaczuk , Alejandra Sanchez Lara , Driss Khalil , Johan Rohdin , Dawei Zhu , Aravind Krishnan , Dietrich Klakow , Zahra Ahmadi , Marek Kováč , Dominik Boboš , Costas Kalogiros , Andreas Alexopoulos , Denis Marraud
A criminal investigation is a labor-intensive work requiring expert knowledge from several disciplines. Due to a large amount of heterogeneous data available from several modalities (i.e., audio/speech, text, video, non-content data), its processing raises many challenges. It may become impossible for law enforcement agents to deal with large amounts of highly-diverse data, especially for cross-border investigations focused on organized crime. ROXANNE EC H2020 project developed an all-in-one investigation platform for processing such diverse data. The platform mainly focuses on analyzing lawfully intercepted telephone conversations extended by non-content data (e.g., metadata related to the calls, time/spatial positions, and data collected from social media). Several state-of-the-art components are integrated into the pipeline, including speaker identification, automatic speech recognition, and named entity detection. With information extracted from this pipeline, the platform builds multiple knowledge graphs that capture phone and speaker criminal network interactions, including the central network and their clans. After hands-on sessions, law enforcement agents found the Autocrime platform easy to understand and highlighted its innovative, multi-technology functionalities that streamline forensic investigations, reducing manual effort. The AI-powered platform marks a significant first step toward creating an open investigative tool that combines advanced speech, text, and video processing algorithms with criminal network analysis, aimed at mitigating organized crime.
刑事侦查是一项劳动密集型的工作,需要多个学科的专业知识。由于来自多种模式的大量异构数据(即音频/语音、文本、视频、非内容数据),其处理提出了许多挑战。执法人员可能无法处理大量高度多样化的数据,特别是针对有组织犯罪的跨境调查。ROXANNE EC H2020项目开发了一个一体化的调查平台来处理这些多样化的数据。该平台主要侧重于分析合法截获的非内容数据(如与通话相关的元数据、时间/空间位置、社交媒体收集的数据)扩展的电话对话。几个最先进的组件集成到管道中,包括说话人识别、自动语音识别和命名实体检测。通过从这个管道中提取的信息,该平台建立了多个知识图谱,捕捉电话和扬声器犯罪网络的相互作用,包括中央网络和他们的宗族。在实践环节后,执法人员发现Autocrime平台易于理解,并强调其创新的多技术功能,简化了法医调查,减少了人工工作。这个由人工智能驱动的平台标志着朝着创建一个开放的调查工具迈出了重要的第一步,该工具将先进的语音、文本和视频处理算法与犯罪网络分析相结合,旨在减轻有组织犯罪。
{"title":"Autocrime - open multimodal platform for combating organized crime","authors":"Srikanth Madikeri ,&nbsp;Petr Motlicek ,&nbsp;Dairazalia Sanchez-Cortes ,&nbsp;Pradeep Rangappa ,&nbsp;Joshua Hughes ,&nbsp;Jakub Tkaczuk ,&nbsp;Alejandra Sanchez Lara ,&nbsp;Driss Khalil ,&nbsp;Johan Rohdin ,&nbsp;Dawei Zhu ,&nbsp;Aravind Krishnan ,&nbsp;Dietrich Klakow ,&nbsp;Zahra Ahmadi ,&nbsp;Marek Kováč ,&nbsp;Dominik Boboš ,&nbsp;Costas Kalogiros ,&nbsp;Andreas Alexopoulos ,&nbsp;Denis Marraud","doi":"10.1016/j.fsidi.2025.301937","DOIUrl":"10.1016/j.fsidi.2025.301937","url":null,"abstract":"<div><div>A criminal investigation is a labor-intensive work requiring expert knowledge from several disciplines. Due to a large amount of heterogeneous data available from several modalities (i.e., audio/speech, text, video, non-content data), its processing raises many challenges. It may become impossible for law enforcement agents to deal with large amounts of highly-diverse data, especially for cross-border investigations focused on organized crime. ROXANNE EC H2020 project developed an all-in-one investigation platform for processing such diverse data. The platform mainly focuses on analyzing lawfully intercepted telephone conversations extended by non-content data (e.g., metadata related to the calls, time/spatial positions, and data collected from social media). Several state-of-the-art components are integrated into the pipeline, including speaker identification, automatic speech recognition, and named entity detection. With information extracted from this pipeline, the platform builds multiple knowledge graphs that capture phone and speaker criminal network interactions, including the central network and their clans. After hands-on sessions, law enforcement agents found the Autocrime platform easy to understand and highlighted its innovative, multi-technology functionalities that streamline forensic investigations, reducing manual effort. The AI-powered platform marks a significant first step toward creating an open investigative tool that combines advanced speech, text, and video processing algorithms with criminal network analysis, aimed at mitigating organized crime.</div></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"54 ","pages":"Article 301937"},"PeriodicalIF":2.0,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144205090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decrypting messages: Extracting digital evidence from signal desktop for windows 解密消息:从windows的信号桌面中提取数字证据
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-01 Epub Date: 2025-06-10 DOI: 10.1016/j.fsidi.2025.301941
Gonçalo Paulino , Miguel Negrão , Miguel Frade , Patrício Domingues
With growing concerns over the security and privacy of personal conversations, end-to-end encrypted instant messaging applications have become a key focus of forensic research. This study presents a detailed methodology along with an automated Python script for decrypting and analyzing forensic artifacts from Signal Desktop for Windows. The methodology is divided into two phases: i) decryption of locally stored data and ii) analysis and documentation of forensic artifacts. To ensure data integrity, the proposed approach enables retrieval without launching Signal Desktop, preventing potential alterations. Additionally, a reporting module organizes extracted data for forensic investigators, enhancing usability. Our approach is effective in extracting and analyzing encrypted Signal artifacts, providing a reliable method for forensic investigations.
随着人们对个人对话的安全性和隐私性的日益关注,端到端加密即时通讯应用程序已成为法医研究的重点。这项研究提出了一个详细的方法,以及一个自动的Python脚本,用于解密和分析来自Signal Desktop for Windows的取证工件。该方法分为两个阶段:i)本地存储数据的解密和ii)法医文物的分析和记录。为了确保数据的完整性,所提出的方法可以在不启动Signal Desktop的情况下进行检索,从而防止潜在的更改。此外,报告模块为法医调查人员组织提取的数据,增强了可用性。该方法有效地提取和分析了加密信号伪影,为法医调查提供了可靠的方法。
{"title":"Decrypting messages: Extracting digital evidence from signal desktop for windows","authors":"Gonçalo Paulino ,&nbsp;Miguel Negrão ,&nbsp;Miguel Frade ,&nbsp;Patrício Domingues","doi":"10.1016/j.fsidi.2025.301941","DOIUrl":"10.1016/j.fsidi.2025.301941","url":null,"abstract":"<div><div>With growing concerns over the security and privacy of personal conversations, end-to-end encrypted instant messaging applications have become a key focus of forensic research. This study presents a detailed methodology along with an automated Python script for decrypting and analyzing forensic artifacts from Signal Desktop for Windows. The methodology is divided into two phases: i) decryption of locally stored data and ii) analysis and documentation of forensic artifacts. To ensure data integrity, the proposed approach enables retrieval without launching Signal Desktop, preventing potential alterations. Additionally, a reporting module organizes extracted data for forensic investigators, enhancing usability. Our approach is effective in extracting and analyzing encrypted Signal artifacts, providing a reliable method for forensic investigations.</div></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"54 ","pages":"Article 301941"},"PeriodicalIF":2.0,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144243118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on smartphone image source identification based on PRNU features collected multivariate sampling strategy 基于PRNU特征采集多元采样策略的智能手机图像源识别研究
IF 2.2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-01 Epub Date: 2025-08-26 DOI: 10.1016/j.fsidi.2025.301991
Fu-Yuan Liang, Shu-Hui Gao, Liang-Ju Xu
Photo Response Non-Uniformity (PRNU)-based image source attribution is one of the core methods for identifying the imaging device of a given picture, and has significant applications in the field of digital media forensics. However, with the increasing complexity of smartphone imaging systems, PRNU features extracted from smartphone images exhibit greater instability compared to those from traditional cameras. This instability can lead to performance degradation in conventional single-sample extraction strategies when applied to smartphone image source attribution. To address this challenge, this paper proposes a robust multi-sample enhancement scheme. To verify its generalizability, we employ both a non–data-driven wavelet-domain decomposition algorithm and a deep U-shaped residual neural network (DRUNet) as noise extractors, and conduct experiments on the FODB dataset. Experimental results demonstrate that the proposed multi-sample framework exhibits superior performance in improving feature stability, providing a new technical pathway for digital image source attribution in smart terminal devices. Furthermore, we perform PCE distribution statistics on positive and negative samples in the dataset and quantitatively analyze the regional instability of PRNU features.
基于照片响应非均匀性(PRNU)的图像源归属是识别给定图像的成像设备的核心方法之一,在数字媒体取证领域具有重要应用。然而,随着智能手机成像系统的日益复杂,与传统相机相比,从智能手机图像中提取的PRNU特征表现出更大的不稳定性。当应用于智能手机图像源归属时,这种不稳定性会导致传统单样本提取策略的性能下降。为了解决这一挑战,本文提出了一种鲁棒的多样本增强方案。为了验证其泛化性,我们采用了非数据驱动的小波域分解算法和深度u形残差神经网络(DRUNet)作为噪声提取器,并在FODB数据集上进行了实验。实验结果表明,所提出的多样本框架在提高特征稳定性方面表现出优异的性能,为智能终端设备中数字图像源归属提供了新的技术途径。此外,我们对数据集中的正、负样本进行PCE分布统计,定量分析PRNU特征的区域不稳定性。
{"title":"Research on smartphone image source identification based on PRNU features collected multivariate sampling strategy","authors":"Fu-Yuan Liang,&nbsp;Shu-Hui Gao,&nbsp;Liang-Ju Xu","doi":"10.1016/j.fsidi.2025.301991","DOIUrl":"10.1016/j.fsidi.2025.301991","url":null,"abstract":"<div><div>Photo Response Non-Uniformity (PRNU)-based image source attribution is one of the core methods for identifying the imaging device of a given picture, and has significant applications in the field of digital media forensics. However, with the increasing complexity of smartphone imaging systems, PRNU features extracted from smartphone images exhibit greater instability compared to those from traditional cameras. This instability can lead to performance degradation in conventional single-sample extraction strategies when applied to smartphone image source attribution. To address this challenge, this paper proposes a robust multi-sample enhancement scheme. To verify its generalizability, we employ both a non–data-driven wavelet-domain decomposition algorithm and a deep U-shaped residual neural network (DRUNet) as noise extractors, and conduct experiments on the FODB dataset. Experimental results demonstrate that the proposed multi-sample framework exhibits superior performance in improving feature stability, providing a new technical pathway for digital image source attribution in smart terminal devices. Furthermore, we perform PCE distribution statistics on positive and negative samples in the dataset and quantitatively analyze the regional instability of PRNU features.</div></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"54 ","pages":"Article 301991"},"PeriodicalIF":2.2,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144896324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DrIfTeR: A Drone Identification Technique using RF signals 一种使用射频信号的无人机识别技术
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-01 Epub Date: 2025-06-16 DOI: 10.1016/j.fsidi.2025.301948
Pankaj Choudhary , Vikas Sihag , Gaurav Choudhary , Nicola Dragoni
The civilian drone market is experiencing explosive growth, with projections estimating it will hit USD 54.81 billion by 2030. This surge in drone numbers brings with it significant privacy and security challenges. To defend critical infrastructure and safeguard personal privacy from misuse, an effective drone detection system has become essential. There is a demand for detection solution that is not only efficient and accurate but also robust, cost-effective, and scalable to meet the evolving needs of this rapidly expanding field. In this paper, we present DrIfTeR, a drone detection, identification and classification model based on the radio frequency signals. Firstly we employ wavelet domain extraction and 3-stage wavelet decomposition during RF signal preprocessing. Secondly, we employ traditional machine learning, deep learning and ensemble learning models to evaluate effectiveness. Thirdly, we evaluate performance of DrIfTeR against drone detection, drone manufacturer identification and drone model identification. The performance of the approach is evaluated against benchmark dataset and is found to be effective and accurate.
民用无人机市场正在经历爆炸式增长,预计到2030年将达到548.1亿美元。无人机数量的激增带来了重大的隐私和安全挑战。为了保护关键基础设施和保护个人隐私不被滥用,一个有效的无人机检测系统变得至关重要。对检测解决方案的需求不仅是高效和准确的,而且是强大的,具有成本效益的,可扩展的,以满足这个快速扩展的领域不断变化的需求。本文提出了一种基于射频信号的无人机检测、识别和分类模型DrIfTeR。首先在射频信号预处理中采用小波域提取和三级小波分解。其次,我们采用传统的机器学习、深度学习和集成学习模型来评估有效性。第三,我们评估了DrIfTeR在无人机检测、无人机制造商识别和无人机型号识别方面的性能。针对基准数据集对该方法的性能进行了评估,结果表明该方法是有效和准确的。
{"title":"DrIfTeR: A Drone Identification Technique using RF signals","authors":"Pankaj Choudhary ,&nbsp;Vikas Sihag ,&nbsp;Gaurav Choudhary ,&nbsp;Nicola Dragoni","doi":"10.1016/j.fsidi.2025.301948","DOIUrl":"10.1016/j.fsidi.2025.301948","url":null,"abstract":"<div><div>The civilian drone market is experiencing explosive growth, with projections estimating it will hit USD 54.81 billion by 2030. This surge in drone numbers brings with it significant privacy and security challenges. To defend critical infrastructure and safeguard personal privacy from misuse, an effective drone detection system has become essential. There is a demand for detection solution that is not only efficient and accurate but also robust, cost-effective, and scalable to meet the evolving needs of this rapidly expanding field. In this paper, we present DrIfTeR, a drone detection, identification and classification model based on the radio frequency signals. Firstly we employ wavelet domain extraction and 3-stage wavelet decomposition during RF signal preprocessing. Secondly, we employ traditional machine learning, deep learning and ensemble learning models to evaluate effectiveness. Thirdly, we evaluate performance of DrIfTeR against drone detection, drone manufacturer identification and drone model identification. The performance of the approach is evaluated against benchmark dataset and is found to be effective and accurate.</div></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"54 ","pages":"Article 301948"},"PeriodicalIF":2.0,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144290613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting database storage for data exfiltration 利用数据库存储进行数据泄露
IF 2.2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-07-01 Epub Date: 2025-08-01 DOI: 10.1016/j.fsidi.2025.301934
James Wagner , Alexander Rasin , Vassil Roussev
Steganography is a technique for hiding messages in plain sight – typically by embedding the message within commonly shared files (e.g., images or video) or within file system slack space. Database management systems (DBMSes) are the de facto centralized data repositories for both personal and business use. As ubiquitous repositories that already offer shared data access to many different users, DBMSes have the potential to be a powerful channel to discretely deliver messages through steganography.
In this paper we present a method, Hidden Database Records (HiDR), that adapts steganography techniques to all relational row-store DBMSes. HiDR is particularly effective for hiding data within a DBMS because it adds data to the database state without leaving an audit trail in the DBMS (i.e., without executing SQL commands that may be logged and traced to the sender). While sending a message in this way requires administrative privileges from the sender, it also offers them much more control enabling the sender to erase the original message just as easily as it was created. We demonstrate how HiDR keeps data from being unintentionally discovered but at the same time makes that data easy to access using SQL queries from a non-privileged account.
隐写术是一种隐藏信息的技术,通常通过将信息嵌入到公共共享文件(例如,图像或视频)或文件系统空闲空间中来实现。数据库管理系统(dbms)实际上是个人和企业使用的集中式数据存储库。作为已经向许多不同用户提供共享数据访问的无处不在的存储库,dbms有潜力成为通过隐写术离散地传递消息的强大通道。在本文中,我们提出了一种方法,隐藏数据库记录(HiDR),该方法将隐写技术应用于所有关系行存储dbms。HiDR对于在DBMS中隐藏数据特别有效,因为它将数据添加到数据库状态而不会在DBMS中留下审计跟踪(即,不执行可能被记录和跟踪到发送者的SQL命令)。虽然以这种方式发送消息需要发件人的管理权限,但它也为发件人提供了更多的控制权,使发件人能够像创建原始消息一样轻松地删除原始消息。我们将演示HiDR如何防止数据被无意中发现,同时使数据易于从非特权帐户使用SQL查询访问。
{"title":"Exploiting database storage for data exfiltration","authors":"James Wagner ,&nbsp;Alexander Rasin ,&nbsp;Vassil Roussev","doi":"10.1016/j.fsidi.2025.301934","DOIUrl":"10.1016/j.fsidi.2025.301934","url":null,"abstract":"<div><div>Steganography is a technique for hiding messages in plain sight – typically by embedding the message within commonly shared files (e.g., images or video) or within file system slack space. Database management systems (DBMSes) are the de facto centralized data repositories for both personal and business use. As ubiquitous repositories that already offer shared data access to many different users, DBMSes have the potential to be a powerful channel to discretely deliver messages through steganography.</div><div>In this paper we present a method, Hidden Database Records (<span>HiDR</span>), that adapts steganography techniques to all relational row-store DBMSes. <span>HiDR</span> is particularly effective for hiding data within a DBMS because it adds data to the database state without leaving an audit trail in the DBMS (i.e., without executing SQL commands that may be logged and traced to the sender). While sending a message in this way requires administrative privileges from the sender, it also offers them much more control enabling the sender to erase the original message just as easily as it was created. We demonstrate how <span>HiDR</span> keeps data from being unintentionally discovered but at the same time makes that data easy to access using SQL queries from a non-privileged account.</div></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"53 ","pages":"Article 301934"},"PeriodicalIF":2.2,"publicationDate":"2025-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144748997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Forensic Science International-Digital Investigation
全部 ACTA GEOL POL Atmos. Meas. Tech. Geobiology Ecol. Monogr. ACTA ORTHOP Communications Earth & Environment [1993] Proceedings Eighth Annual IEEE Symposium on Logic in Computer Science Atmos. Res. GEOLOGY COMP BIOCHEM PHYS C Contrib. Plasma Phys. GROUNDWATER Am. J. Sci. Condens. Matter Phys. 2009 IEEE Congress on Evolutionary Computation Astrophys. J. Suppl. Ser. 2012 IEEE International Workshop on Antenna Technology (iWAT) Geosci. J. ACTA NEUROBIOL EXP Environ. Eng. Res. Revista Colombiana de Obstetricia y Ginecologia Hu Li Za Zhi Acta Pharmacol. Sin. Acta Neurol. Scand. 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT) ERN: Other Macroeconomics: Aggregative Models (Topic) Leading Edge 非金属矿 J. Cosmol. Astropart. Phys. Int. J. Geomech. 2011 IEEE International Conference of Electron Devices and Solid-State Circuits Engineering Science and Technology, an International Journal J. Hydrol. Stanovnistvo Front. Phys. EUR PHYS J-APPL PHYS 电力系统及其自动化学报 New J. Phys. 2013 IEEE 39th Photovoltaic Specialists Conference (PVSC) Acta pharmaceutica Sinica 2010 International Conference on Mechanic Automation and Control Engineering Prog. Oceanogr. J MICRO-NANOLITH MEM J. Environ. Eng. Geophys. Azerbaidzhanskii Meditsinskii Zhurnal ADV WOUND CARE Environmental Progress 2010 International Conference on Challenges in Environmental Science and Computer Engineering CRIT REV ENV SCI TEC Crit. Rev. Eukaryotic Gene Express Equine veterinary journal. Supplement Geochim. Cosmochim. Acta Journal of Forensic Medicine and Toxicology Ocean Dyn. Geosci. Front. Journal of Semiconductors Miner. Deposita SCI CHINA EARTH SCI Conserv. Biol. ACTA CYTOL 2007 IEEE International Test Conference AM J EPIDEMIOL Am. J. Phys. Anthropol. IEEE Trans. Appl. Supercond. 2011 International Conference on Infrared, Millimeter, and Terahertz Waves ASTRON ASTROPHYS Archaeol. Anthropol. Sci. Acta Oceanolog. Sin. ACTA VIROL Aquat. Geochem. PHYS REV C Environ. Prog. Sustainable Energy Appl. Geochem. Adv. Meteorol. Round Table Chem. Ecol. Annu. Rev. Earth Planet. Sci. ACTA GEOL SIN-ENGL Transp. Sci. Appl. Clay Sci. Carbon Balance Manage. IZV-PHYS SOLID EART+ Atmos. Chem. Phys. 2008 Conference on Lasers and Electro-Optics and 2008 Conference on Quantum Electronics and Laser Science Contrib. Mineral. Petrol. Ann. Glaciol. AAPG Bull. ATMOSPHERE-BASEL Acta Geochimica Chin. Phys. B Acta Geophys. J. Atmos. Chem. Asia-Pac. J. Atmos. Sci. Int. J. Biometeorol. ARCHAEOMETRY ECOLOGY ARCT ANTARCT ALP RES Chin. J. Phys. Am. Mineral. Can. J. Phys.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1