首页 > 最新文献

Forensic Science International-Digital Investigation最新文献

英文 中文
On the inadequacy of open-source application logs for digital forensics 论开源应用程序日志在数字取证方面的不足
IF 2 4区 医学 Pub Date : 2024-04-25 DOI: 10.1016/j.fsidi.2024.301750
Afiqah Azahari, Davide Balzarotti

This study explores the challenges with utilizing application logs for incident response or forensic analysis. Application logs have the potential to significantly enhance security analysis as sometimes they provide information regarding user actions, error messages, and performance metrics of the application. Although these logs can offer vital information about user activities, errors, and application performance, their use for security needs better understanding. We looked at the current logging implementation of 60 open-source applications. We checked the logs to see if they could help with five key security tasks: making timelines, linking events, separating different actions, spotting misuse, and detecting attacks. By examining source code, extracting log statements, and evaluating them for security relevance, we found many logs lacked essential elements. Specifically, 29 applications omitted timestamps, crucial for identifying the timing of actions. Furthermore, logs frequently missed unique identifiers (UIDs) for event correlation, with 23 not noting UIDs for new activities. Inconsistent logging of user activities and an absence of logs detailing successful attacks indicate current application logs need significant enhancements to be effective for security checks. The findings of our research suggest that current application logs are inadequately equipped for in-depth security analysis. Enhancements are imperative for their optimal utility. This investigation underscores the inherent challenges in leveraging logs for security and emphasizes the pressing need for refining logging methodologies.

本研究探讨了利用应用程序日志进行事件响应或取证分析所面临的挑战。应用程序日志有可能大大加强安全分析,因为它们有时会提供有关用户操作、错误信息和应用程序性能指标的信息。虽然这些日志可以提供有关用户活动、错误和应用程序性能的重要信息,但需要更好地了解它们在安全方面的用途。我们研究了 60 个开源应用程序当前的日志实施情况。我们检查了日志,看它们是否有助于完成五项关键的安全任务:制作时间轴、链接事件、区分不同的操作、发现误用和检测攻击。通过检查源代码、提取日志语句并评估其安全相关性,我们发现许多日志都缺少基本要素。具体来说,29 个应用程序遗漏了时间戳,而时间戳对于确定操作时间至关重要。此外,日志还经常遗漏用于事件关联的唯一标识符(UID),其中有 23 个日志没有记录新活动的 UID。不一致的用户活动日志和缺乏详细记录成功攻击的日志表明,当前的应用程序日志需要大幅改进才能有效地进行安全检查。我们的研究结果表明,当前的应用程序日志不足以进行深入的安全分析。为了使其发挥最大效用,必须对其进行改进。这项调查凸显了利用日志进行安全检查的内在挑战,并强调了改进日志记录方法的迫切需要。
{"title":"On the inadequacy of open-source application logs for digital forensics","authors":"Afiqah Azahari,&nbsp;Davide Balzarotti","doi":"10.1016/j.fsidi.2024.301750","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301750","url":null,"abstract":"<div><p>This study explores the challenges with utilizing application logs for incident response or forensic analysis. Application logs have the potential to significantly enhance security analysis as sometimes they provide information regarding user actions, error messages, and performance metrics of the application. Although these logs can offer vital information about user activities, errors, and application performance, their use for security needs better understanding. We looked at the current logging implementation of 60 open-source applications. We checked the logs to see if they could help with five key security tasks: making timelines, linking events, separating different actions, spotting misuse, and detecting attacks. By examining source code, extracting log statements, and evaluating them for security relevance, we found many logs lacked essential elements. Specifically, 29 applications omitted timestamps, crucial for identifying the timing of actions. Furthermore, logs frequently missed unique identifiers (UIDs) for event correlation, with 23 not noting UIDs for new activities. Inconsistent logging of user activities and an absence of logs detailing successful attacks indicate current application logs need significant enhancements to be effective for security checks. The findings of our research suggest that current application logs are inadequately equipped for in-depth security analysis. Enhancements are imperative for their optimal utility. This investigation underscores the inherent challenges in leveraging logs for security and emphasizes the pressing need for refining logging methodologies.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301750"},"PeriodicalIF":2.0,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140644366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A dual descriptor combined with frequency domain reconstruction learning for face forgery detection in deepfake videos 结合频域重构学习的双描述符,用于深度伪造视频中的人脸伪造检测
IF 2 4区 医学 Pub Date : 2024-04-18 DOI: 10.1016/j.fsidi.2024.301747
Xin Jin , Nan Wu , Qian Jiang , Yuru Kou , Hanxian Duan , Puming Wang , Shaowen Yao

Conventional face forgery detectors have primarily relied on image artifacts produced by deepfake video generation models. These methods have performed well when the training and test sets were derived from the same deepfake algorithm, but accuracy and generalizability remain a challenge for diverse datasets. In this study, both supervised and unsupervised approaches are proposed for more accurate detection in in-domain and cross-domain experiments. Specifically, two descriptors are introduced to extract rich information in the spatial domain to achieve higher accuracy. A frequency domain reconstruction module is then included to expand the representation space for facial features. A reconstruction method based on an auto-encoder was also applied to obtain a frequency domain coding vector. In this process, reconstruction learning was sufficient for extracting unknown information, while a combination with classification learning provided essential high-frequency pixel differences between real and fake samples, thus facilitating forgery identification. A series of validation experiments with large-scale benchmark datasets demonstrated that the proposed technique was superior to existing methods.

传统的人脸伪造检测器主要依赖于深度伪造视频生成模型产生的图像伪影。当训练集和测试集来自相同的深度伪造算法时,这些方法表现良好,但对于不同的数据集,准确性和通用性仍是一个挑战。本研究提出了有监督和无监督两种方法,以便在域内和跨域实验中进行更精确的检测。具体来说,我们引入了两个描述符来提取空间域中的丰富信息,以达到更高的准确性。然后加入频域重建模块,以扩展面部特征的表示空间。此外,还应用了一种基于自动编码器的重构方法,以获得频域编码向量。在这一过程中,重构学习足以提取未知信息,而与分类学习相结合则提供了真假样本之间必不可少的高频像素差异,从而促进了伪造识别。利用大规模基准数据集进行的一系列验证实验表明,所提出的技术优于现有方法。
{"title":"A dual descriptor combined with frequency domain reconstruction learning for face forgery detection in deepfake videos","authors":"Xin Jin ,&nbsp;Nan Wu ,&nbsp;Qian Jiang ,&nbsp;Yuru Kou ,&nbsp;Hanxian Duan ,&nbsp;Puming Wang ,&nbsp;Shaowen Yao","doi":"10.1016/j.fsidi.2024.301747","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301747","url":null,"abstract":"<div><p>Conventional face forgery detectors have primarily relied on image artifacts produced by deepfake video generation models. These methods have performed well when the training and test sets were derived from the same deepfake algorithm, but accuracy and generalizability remain a challenge for diverse datasets. In this study, both supervised and unsupervised approaches are proposed for more accurate detection in in-domain and cross-domain experiments. Specifically, two descriptors are introduced to extract rich information in the spatial domain to achieve higher accuracy. A frequency domain reconstruction module is then included to expand the representation space for facial features. A reconstruction method based on an auto-encoder was also applied to obtain a frequency domain coding vector. In this process, reconstruction learning was sufficient for extracting unknown information, while a combination with classification learning provided essential high-frequency pixel differences between real and fake samples, thus facilitating forgery identification. A series of validation experiments with large-scale benchmark datasets demonstrated that the proposed technique was superior to existing methods.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301747"},"PeriodicalIF":2.0,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140605627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative study of IoT forensic frameworks 物联网取证框架比较研究
IF 2 4区 医学 Pub Date : 2024-04-04 DOI: 10.1016/j.fsidi.2024.301748
Haroon Mahmood , Maliha Arshad , Irfan Ahmed , Sana Fatima , Hafeez ur Rehman

Internet of Things (IoT) systems often consist of heterogeneous, resource-constrained devices that generate massive amounts of data. This data is important for assessments, behaviour analysis, and decision-making. However, IoT devices are also susceptible to cyber-attacks, such as information theft, personal device intervention, and privacy invasion. In case of an incident, these devices are subject to digital forensic investigation to identify and analyze crimes and misuse. Over the years, several forensic frameworks and techniques have been proposed to facilitate the investigation of IoT networks and devices, but finding a perfect solution that covers the diversity of IoT devices and networks is still a research challenge.

In this study, we present a comparative analysis of existing forensic investigation frameworks and identify their strengths and weaknesses in handling forensic challenges of IoT devices. The study uses evaluation metrics of ten important parameters, including heterogeneity, scalability, and chain of custody, to thoroughly audit the effectiveness of these models. Our analysis concludes that the existing investigation frameworks do not cater to all requirements and aspects of IoT forensics. It further highlights the need for standard mechanisms to acquire and analyze digital artifacts in IoT devices.

物联网(IoT)系统通常由异构、资源受限的设备组成,这些设备会产生海量数据。这些数据对于评估、行为分析和决策非常重要。然而,物联网设备也容易受到网络攻击,如信息窃取、个人设备干预和隐私侵犯。在发生事故时,这些设备需要接受数字取证调查,以识别和分析犯罪行为和滥用行为。在本研究中,我们对现有的取证调查框架进行了比较分析,并找出了它们在应对物联网设备取证挑战方面的优缺点。研究采用了十个重要参数的评估指标,包括异构性、可扩展性和监管链,以全面审核这些模型的有效性。我们的分析得出结论,现有的调查框架无法满足物联网取证的所有要求和方面。它进一步强调了对标准机制的需求,以获取和分析物联网设备中的数字工件。
{"title":"Comparative study of IoT forensic frameworks","authors":"Haroon Mahmood ,&nbsp;Maliha Arshad ,&nbsp;Irfan Ahmed ,&nbsp;Sana Fatima ,&nbsp;Hafeez ur Rehman","doi":"10.1016/j.fsidi.2024.301748","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301748","url":null,"abstract":"<div><p>Internet of Things (IoT) systems often consist of heterogeneous, resource-constrained devices that generate massive amounts of data. This data is important for assessments, behaviour analysis, and decision-making. However, IoT devices are also susceptible to cyber-attacks, such as information theft, personal device intervention, and privacy invasion. In case of an incident, these devices are subject to digital forensic investigation to identify and analyze crimes and misuse. Over the years, several forensic frameworks and techniques have been proposed to facilitate the investigation of IoT networks and devices, but finding a perfect solution that covers the diversity of IoT devices and networks is still a research challenge.</p><p>In this study, we present a comparative analysis of existing forensic investigation frameworks and identify their strengths and weaknesses in handling forensic challenges of IoT devices. The study uses evaluation metrics of ten important parameters, including heterogeneity, scalability, and chain of custody, to thoroughly audit the effectiveness of these models. Our analysis concludes that the existing investigation frameworks do not cater to all requirements and aspects of IoT forensics. It further highlights the need for standard mechanisms to acquire and analyze digital artifacts in IoT devices.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301748"},"PeriodicalIF":2.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140346838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Letter to editor regarding article, “digital forensics in healthcare: An analysis of data associated with a CPAP machine” 致编辑的信,内容涉及 "医疗保健领域的数字取证:CPAP机相关数据分析"
IF 2 4区 医学 Pub Date : 2024-03-29 DOI: 10.1016/j.fsidi.2024.301749
Nishchal Soni, Chitra Barotia
{"title":"Letter to editor regarding article, “digital forensics in healthcare: An analysis of data associated with a CPAP machine”","authors":"Nishchal Soni,&nbsp;Chitra Barotia","doi":"10.1016/j.fsidi.2024.301749","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301749","url":null,"abstract":"","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301749"},"PeriodicalIF":2.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140328041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial intelligence in mobile forensics: A survey of current status, a use case analysis and AI alignment objectives 移动取证中的人工智能:现状调查、用例分析和人工智能调整目标
IF 2 4区 医学 Pub Date : 2024-03-22 DOI: 10.1016/j.fsidi.2024.301737
Alexandros Vasilaras , Nikolaos Papadoudis , Panagiotis Rizomiliotis

As the capabilities and utility of Artificial Intelligence and Machine Learning systems continue to improve, they are expected to have an increasingly powerful influence in the digital forensic investigation process. The concurrent proliferation of mobile devices and rapid increase of forensic value of related artifacts creates the requirement for a comprehensive review of the current status of artificial intelligence software usage and usefulness in Mobile Forensics. In this context, we conducted a survey to evaluate the characteristics and properties of AI functions in mobile forensic software from the practitioners' perspective and enhance understanding to the work in the field. In this study, we evaluated the performance of image categorization software in digital forensics using a variety of evaluation metrics including accuracy, precision, recall, and F1-score, as well as the confusion matrix. In this research we also identify and integrate theoretical principles to conceptualize an AI Alignment framework pertaining to Mobile Forensics and Digital Forensics in general, in order to accurately determine specific AI strategy objectives and potential solutions to the current technical and administrative landscape. We emphasized the importance of interpretability and transparency in AI systems and the need for a comprehensive approach to understanding the reasoning behind the software's decisions. Additionally, we highlighted the importance of robustness in image categorization software, as well as the consideration of AI governance and standardized procedures concepts. Our results show that the accuracy and robustness of the image categorization software have a significant impact on the outcome of legal cases and that the software should be designed with interpretability, transparency, and robustness in mind. Through the examination of the survey responses, the evaluation of the image categorization software and research literature, we explore existing and potential approaches to aligned Artificial Intelligence and analyze their contribution to the forensic examination of cases.

随着人工智能和机器学习系统的能力和实用性不断提高,预计它们将在数字取证调查过程中产生越来越强大的影响。同时,移动设备的激增和相关人工制品取证价值的快速增长,要求对人工智能软件在移动取证中的使用和实用性现状进行全面审查。在此背景下,我们开展了一项调查,从从业人员的角度评估移动取证软件中人工智能功能的特点和属性,加深对该领域工作的理解。在这项研究中,我们使用准确率、精确度、召回率和 F1 分数以及混淆矩阵等多种评价指标评估了数字取证中图像分类软件的性能。在这项研究中,我们还确定并整合了理论原则,构思了与移动取证和一般数字取证相关的人工智能对齐框架,以准确确定具体的人工智能战略目标和当前技术与管理环境下的潜在解决方案。我们强调了人工智能系统可解释性和透明度的重要性,并强调需要采用综合方法来理解软件决策背后的推理。此外,我们还强调了图像分类软件稳健性的重要性,以及对人工智能管理和标准化程序概念的考虑。我们的研究结果表明,图像分类软件的准确性和稳健性对法律案件的结果有重大影响,软件的设计应考虑到可解释性、透明度和稳健性。通过对调查反馈、图像分类软件评估和研究文献的研究,我们探索了现有和潜在的人工智能调整方法,并分析了它们对案件法证检验的贡献。
{"title":"Artificial intelligence in mobile forensics: A survey of current status, a use case analysis and AI alignment objectives","authors":"Alexandros Vasilaras ,&nbsp;Nikolaos Papadoudis ,&nbsp;Panagiotis Rizomiliotis","doi":"10.1016/j.fsidi.2024.301737","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301737","url":null,"abstract":"<div><p>As the capabilities and utility of Artificial Intelligence and Machine Learning systems continue to improve, they are expected to have an increasingly powerful influence in the digital forensic investigation process. The concurrent proliferation of mobile devices and rapid increase of forensic value of related artifacts creates the requirement for a comprehensive review of the current status of artificial intelligence software usage and usefulness in Mobile Forensics. In this context, we conducted a survey to evaluate the characteristics and properties of AI functions in mobile forensic software from the practitioners' perspective and enhance understanding to the work in the field. In this study, we evaluated the performance of image categorization software in digital forensics using a variety of evaluation metrics including accuracy, precision, recall, and F1-score, as well as the confusion matrix. In this research we also identify and integrate theoretical principles to conceptualize an AI Alignment framework pertaining to Mobile Forensics and Digital Forensics in general, in order to accurately determine specific AI strategy objectives and potential solutions to the current technical and administrative landscape. We emphasized the importance of interpretability and transparency in AI systems and the need for a comprehensive approach to understanding the reasoning behind the software's decisions. Additionally, we highlighted the importance of robustness in image categorization software, as well as the consideration of AI governance and standardized procedures concepts. Our results show that the accuracy and robustness of the image categorization software have a significant impact on the outcome of legal cases and that the software should be designed with interpretability, transparency, and robustness in mind. Through the examination of the survey responses, the evaluation of the image categorization software and research literature, we explore existing and potential approaches to aligned Artificial Intelligence and analyze their contribution to the forensic examination of cases.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301737"},"PeriodicalIF":2.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140187930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video source camera identification using fusion of texture features and noise fingerprint 利用纹理特征和噪声指纹融合技术识别视频源摄像头
IF 2 4区 医学 Pub Date : 2024-03-18 DOI: 10.1016/j.fsidi.2024.301746
Tigga Anmol, K. Sitara

In Video forensics, the objective of Source Camera Identification (SCI) is to identify and verify the origin of a video that is under investigation. This aids the investigator to trace the video to its owner or narrow down the search space for identifying the offender. Nowadays, it is easy to record and share videos via internet or social media with smartphones. The availability of sophisticated video editing tools and software allow offenders to modify video's context. Thus, identifying the right source camera that was used to capture the video becomes complicated and strenuous. Existing methods based on video metadata information are no longer reliable as it could be modified or stripped off. Better forensic procedures are therefore required to prove the authenticity and integrity of the video that will be used as evidence in court of law. Certain inherent camera sensor properties such as, subtle traces of Photo Response Non-Uniformity (PRNU) are present in all captured videos due to unnoticeable defect during the manufacture of camera's sensor. These properties are used in SCI to classify devices or models as they are unique. In this work, we focus on SCI from videos or Video Source Camera Identification (VSCI) to verify the authenticity of videos. PRNU can be affected by highly textured content or post-processing when computed from a set of flat field images. To mitigate these effects, Higher Order Wavelet Statistics (HOWS) information from PRNU of a video I-frame is combined with information from two other texture features i.e., Local Binary Pattern (LBP) and Gray Level Co-occurrence Matrix (GLCM). The extracted feature vector is fused via concatenation and fed to Support Vector Machine (SVM) classifier to perform training and testing for VSCI. Experimental evaluation of our proposed method on videos from different publicly available datasets show the effectiveness of our method in terms of accuracy, resource efficiency, and complexity.

在视频取证中,源相机识别 (SCI) 的目的是识别和验证正在调查的视频的来源。这有助于调查人员将视频追踪到其所有者,或缩小搜索空间以识别罪犯。如今,使用智能手机通过互联网或社交媒体录制和分享视频非常方便。先进的视频编辑工具和软件使犯罪者可以修改视频内容。因此,识别用于捕捉视频的正确源相机变得复杂而艰难。基于视频元数据信息的现有方法不再可靠,因为这些信息可能被修改或删除。因此,需要更好的取证程序来证明将作为法庭证据的视频的真实性和完整性。由于相机传感器在制造过程中存在不易察觉的缺陷,因此所有捕获的视频中都存在某些固有的相机传感器属性,如微妙的照片响应不均匀性(PRNU)痕迹。在 SCI 中,这些特性被用于对设备或模型进行分类,因为它们是独一无二的。在这项工作中,我们将重点放在视频的 SCI 或视频源相机识别(VSCI)上,以验证视频的真实性。当从一组平场图像计算时,PRNU 会受到高纹理内容或后处理的影响。为了减轻这些影响,视频 I 帧 PRNU 的高阶小波统计(HOWS)信息与其他两个纹理特征(即局部二进制模式(LBP)和灰度共现矩阵(GLCM))的信息相结合。提取的特征向量通过连接进行融合,并输入支持向量机(SVM)分类器,以执行 VSCI 的训练和测试。在不同公开数据集的视频上对我们提出的方法进行的实验评估表明,我们的方法在准确性、资源效率和复杂性方面都很有效。
{"title":"Video source camera identification using fusion of texture features and noise fingerprint","authors":"Tigga Anmol,&nbsp;K. Sitara","doi":"10.1016/j.fsidi.2024.301746","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301746","url":null,"abstract":"<div><p>In Video forensics, the objective of Source Camera Identification (SCI) is to identify and verify the origin of a video that is under investigation. This aids the investigator to trace the video to its owner or narrow down the search space for identifying the offender. Nowadays, it is easy to record and share videos via internet or social media with smartphones. The availability of sophisticated video editing tools and software allow offenders to modify video's context. Thus, identifying the right source camera that was used to capture the video becomes complicated and strenuous. Existing methods based on video metadata information are no longer reliable as it could be modified or stripped off. Better forensic procedures are therefore required to prove the authenticity and integrity of the video that will be used as evidence in court of law. Certain inherent camera sensor properties such as, subtle traces of Photo Response Non-Uniformity (PRNU) are present in all captured videos due to unnoticeable defect during the manufacture of camera's sensor. These properties are used in SCI to classify devices or models as they are unique. In this work, we focus on SCI from videos or Video Source Camera Identification (VSCI) to verify the authenticity of videos. PRNU can be affected by highly textured content or post-processing when computed from a set of flat field images. To mitigate these effects, Higher Order Wavelet Statistics (HOWS) information from PRNU of a video I-frame is combined with information from two other texture features i.e., Local Binary Pattern (LBP) and Gray Level Co-occurrence Matrix (GLCM). The extracted feature vector is fused via concatenation and fed to Support Vector Machine (SVM) classifier to perform training and testing for VSCI. Experimental evaluation of our proposed method on videos from different publicly available datasets show the effectiveness of our method in terms of accuracy, resource efficiency, and complexity.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301746"},"PeriodicalIF":2.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140159952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Letter to editor regarding article, “The effects of document's format, size, and storage media on memory forensics” 就文章 "文件格式、大小和存储介质对内存取证的影响 "致编辑的信
IF 2 4区 医学 Pub Date : 2024-03-14 DOI: 10.1016/j.fsidi.2024.301745
Nishchal Soni
{"title":"Letter to editor regarding article, “The effects of document's format, size, and storage media on memory forensics”","authors":"Nishchal Soni","doi":"10.1016/j.fsidi.2024.301745","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301745","url":null,"abstract":"","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301745"},"PeriodicalIF":2.0,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140122260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECo-Bag: An elastic container based on merkle tree as a universal digital evidence bag 电子证据袋:基于梅克尔树的弹性容器,作为通用数字证据袋
IF 2 4区 医学 Pub Date : 2024-03-13 DOI: 10.1016/j.fsidi.2024.301725
Jaehyeok Han , Mee Lan Han , Sangjin Lee , Jungheum Park

Unique traits generated automatically or artificially, such as firewall logs, OS event logs, and various metadata, are well hidden in the digital evidence that cannot be easily perceived by the investigator in some cases. Digital data is invisible, and it is necessary that attention is focused on traditional management with integrity because of the involvement of various stakeholders in the secure preservation and analysis of the forensic process. Similar to file formats, digital evidence bags (DEB), such as E01 and L01, are widely used to contain digital data for certain facilities in a raw format, which also include metadata. The DEB can provide a way to obtain data through selective imaging, extracting and collecting only the parts necessary from the extensive data for proof. However, it cannot flexibly handle information obtained from large amounts of data or when sensitive data is involved or destroy superfluous materials that must be protected. Therefore, in this study, we propose a new container format based on the Merkle tree, which is used as a universal DEB. The proposed ECo-Bag can store physical and logical images from the storage medium, bit streams transmitted over networks, file segments in the cloud or distributed system, secondary outcomes, and metadata. Furthermore, it can support operations to destruct or seal the data initially collected while verifying the data integrity and tracking the provenance within the chain of custody. Thus, it is expected to contribute to the elastic management of addition and deletion of evidence in digital investigation and e-discovery.

自动或人为生成的独特特征,如防火墙日志、操作系统事件日志和各种元数据,都很好地隐藏在数字证据中,在某些情况下调查人员不易察觉。数字数据是不可见的,由于各利益相关方都参与了取证过程的安全保存和分析,因此有必要关注传统的完整性管理。与文件格式类似,数字证据包(DEB),如 E01 和 L01,被广泛用于包含某些设施的原始格式数字数据,其中还包括元数据。数字证据包可以提供一种通过选择性成像获取数据的方法,从大量数据中只提取和收集必要的部分作为证据。但是,它无法灵活处理从大量数据中获取的信息或涉及敏感数据时的信息,也无法销毁必须保护的多余材料。因此,在本研究中,我们提出了一种基于梅克尔树的新容器格式,并将其用作通用的 DEB。所提出的 ECo-Bag 可以存储来自存储介质的物理和逻辑图像、通过网络传输的比特流、云或分布式系统中的文件段、二次结果和元数据。此外,它还能支持销毁或封存最初收集的数据的操作,同时验证数据的完整性并跟踪监管链中的出处。因此,它有望为数字调查和电子取证中证据添加和删除的弹性管理做出贡献。
{"title":"ECo-Bag: An elastic container based on merkle tree as a universal digital evidence bag","authors":"Jaehyeok Han ,&nbsp;Mee Lan Han ,&nbsp;Sangjin Lee ,&nbsp;Jungheum Park","doi":"10.1016/j.fsidi.2024.301725","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301725","url":null,"abstract":"<div><p>Unique traits generated automatically or artificially, such as firewall logs, OS event logs, and various metadata, are well hidden in the digital evidence that cannot be easily perceived by the investigator in some cases. Digital data is invisible, and it is necessary that attention is focused on traditional management with integrity because of the involvement of various stakeholders in the secure preservation and analysis of the forensic process. Similar to file formats, digital evidence bags (DEB), such as E01 and L01, are widely used to contain digital data for certain facilities in a raw format, which also include metadata. The DEB can provide a way to obtain data through selective imaging, extracting and collecting only the parts necessary from the extensive data for proof. However, it cannot flexibly handle information obtained from large amounts of data or when sensitive data is involved or destroy superfluous materials that must be protected. Therefore, in this study, we propose a new container format based on the Merkle tree, which is used as a universal DEB. The proposed ECo-Bag can store physical and logical images from the storage medium, bit streams transmitted over networks, file segments in the cloud or distributed system, secondary outcomes, and metadata. Furthermore, it can support operations to destruct or seal the data initially collected while verifying the data integrity and tracking the provenance within the chain of custody. Thus, it is expected to contribute to the elastic management of addition and deletion of evidence in digital investigation and e-discovery.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301725"},"PeriodicalIF":2.0,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140122261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some areas where digital forensics can support the addressing of legal challenges linked to forensic genetic genealogy 数字取证可支持应对与法医遗传系谱有关的法律挑战的一些领域
IF 2 4区 医学 Pub Date : 2024-03-07 DOI: 10.1016/j.fsidi.2024.301696
Mònika Nogel

Forensic genetic genealogy (FGG), also known as investigative genetic genealogy (IGG), produces investigative leads in criminal cases where unidentified DNA is discovered at the crime scene and does not match any profiles in criminal databases. It works by comparing crime scene DNA samples to public or private genealogical databases to identify potential familial relationships and narrow down suspects or identify unknown individuals. Although the fields of FGG and digital forensics (DF) work with different types of evidence and techniques, and consequently develop independently, they share several common characteristics. This study aims to demonstrate that despite their independent development and differences, the experiences of progress in DF field can be utilized in some respects, especially concerning the protection of the rights of the individuals concerned. The aim of this article is to outline some areas where DF can provide assistance in dealing with ethical and social challenges that FGG must address.

法医遗传系谱学(FGG)又称调查遗传系谱学(IGG),在犯罪现场发现身份不明的 DNA 且与犯罪数据库中的任何资料不匹配的情况下,为刑事案件提供调查线索。其工作原理是将犯罪现场 DNA 样本与公共或私人家谱数据库进行比对,以确定潜在的家族关系,缩小嫌疑人范围或识别未知个人。虽然 FGG 和数字取证(DF)领域使用不同类型的证据和技术,因此各自独立发展,但它们有几个共同的特点。本研究旨在说明,尽管它们各自独立发展并存在差异,但数字取证领域的进步经验在某些方面是可以借鉴的,特别是在保护相关个人权利方面。本文的目的是概述 DF 可以在哪些领域提供帮助,以应对 FGG 必须应对的伦理和社会挑战。
{"title":"Some areas where digital forensics can support the addressing of legal challenges linked to forensic genetic genealogy","authors":"Mònika Nogel","doi":"10.1016/j.fsidi.2024.301696","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301696","url":null,"abstract":"<div><p>Forensic genetic genealogy (FGG), also known as investigative genetic genealogy (IGG), produces investigative leads in criminal cases where unidentified DNA is discovered at the crime scene and does not match any profiles in criminal databases. It works by comparing crime scene DNA samples to public or private genealogical databases to identify potential familial relationships and narrow down suspects or identify unknown individuals. Although the fields of FGG and digital forensics (DF) work with different types of evidence and techniques, and consequently develop independently, they share several common characteristics. This study aims to demonstrate that despite their independent development and differences, the experiences of progress in DF field can be utilized in some respects, especially concerning the protection of the rights of the individuals concerned. The aim of this article is to outline some areas where DF can provide assistance in dealing with ethical and social challenges that FGG must address.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301696"},"PeriodicalIF":2.0,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140052429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WARNE: A stalkerware evidence collection tool WARNE:跟踪软件证据收集工具
IF 2 4区 医学 Pub Date : 2024-03-01 DOI: 10.1016/j.fsidi.2023.301677
Philippe Mangeard, Bhaskar Tejaswi, Mohammad Mannan, Amr Youssef

Intimate partner violence (IPV) is a form of abuse in romantic relationships, more frequently, against the female partner. IPV can vary in severity and frequency, ranging from emotional abuse or stalking to recurring and severe violent episodes over a long period. Easy access to stalkerware apps helps foster such behaviors by allowing non-tech-savvy individuals to spy on their victims. These apps offer features for discreetly monitoring and remotely controlling compromised mobile devices, thereby infringing the victim's privacy and the security of their data. In this work, we investigate methods for gathering evidence about an abuser and the stalkerware they employ on a victim's device. We develop a semi-automated tool intended for use by investigators, helping them to analyze Android phones for potential threats in cases of IPV stalkerware. As a first step towards this goal, we perform an experimental privacy and security study to investigate currently available stalkerware apps. We specifically study the vectors through which vulnerabilities found in stalkerware apps could be exploited by investigators, allowing them to gather information about the IPV services, IPV abusers, and the victims' stolen data. We then design and implement a tool called WARNE, leveraging the identified flaws to facilitate the information and evidence collection process. In our experiments, we identified 50 unique stalkerware apps and their corresponding download websites that are still reachable, including one available on the Google Play Store. Among these apps, we found 30 that were free or offered a free trial. We enumerated and experimentally verified several invasive capabilities offered by these apps to clearly identify the severe privacy risks posed by them. We also found that most stalkerware apps store private information locally on the compromised device, potentially giving away information about the abuser. Our evidence-gathering tool found data related to the abuser and/or the stalkerware company, such as account credentials, dashboard URLs, and API tokens in 20 apps out of 30 tested apps. We hope our tool will help IPV victims and investigators against the growing threat of stalkerware abuse.

亲密伴侣暴力(IPV)是恋爱关系中的一种虐待形式,更常见的是对女性伴侣的虐待。IPV 的严重程度和频率各不相同,从情感虐待或跟踪到长期反复发生的严重暴力事件。跟踪软件应用程序很容易获取,允许不懂技术的人监视受害者,从而助长了这种行为。这些应用程序提供了隐蔽监控和远程控制受损移动设备的功能,从而侵犯了受害者的隐私和数据安全。在这项工作中,我们研究了收集有关施暴者及其在受害者设备上使用的跟踪软件的证据的方法。我们开发了一种供调查人员使用的半自动化工具,帮助他们分析安卓手机在 IPV 跟踪软件案件中的潜在威胁。作为实现这一目标的第一步,我们进行了一项隐私和安全实验研究,以调查目前可用的跟踪软件应用程序。我们特别研究了跟踪软件应用程序中发现的漏洞可被调查人员利用的途径,使他们能够收集有关 IPV 服务、IPV 施暴者和受害者被盗数据的信息。然后,我们设计并实施了一款名为 WARNE 的工具,利用已发现的漏洞促进信息和证据收集过程。在我们的实验中,我们发现了 50 个独特的跟踪软件应用程序及其相应的下载网站,其中包括一个可在 Google Play 商店下载的网站。在这些应用程序中,我们发现了 30 个免费或提供免费试用的应用程序。我们列举并通过实验验证了这些应用程序提供的几种入侵功能,以清楚地识别它们带来的严重隐私风险。我们还发现,大多数跟踪软件都会在受损设备上本地存储私人信息,从而有可能泄露施暴者的信息。我们的证据收集工具在 30 个测试应用程序中的 20 个应用程序中发现了与施暴者和/或跟踪软件公司相关的数据,如帐户凭据、仪表板 URL 和 API 标记。我们希望我们的工具能够帮助 IPV 受害者和调查人员应对日益严重的跟踪软件侵权威胁。
{"title":"WARNE: A stalkerware evidence collection tool","authors":"Philippe Mangeard,&nbsp;Bhaskar Tejaswi,&nbsp;Mohammad Mannan,&nbsp;Amr Youssef","doi":"10.1016/j.fsidi.2023.301677","DOIUrl":"https://doi.org/10.1016/j.fsidi.2023.301677","url":null,"abstract":"<div><p>Intimate partner violence (IPV) is a form of abuse in romantic relationships, more frequently, against the female partner. IPV can vary in severity and frequency, ranging from emotional abuse or stalking to recurring and severe violent episodes over a long period. Easy access to stalkerware apps helps foster such behaviors by allowing non-tech-savvy individuals to spy on their victims. These apps offer features for discreetly monitoring and remotely controlling compromised mobile devices, thereby infringing the victim's privacy and the security of their data. In this work, we investigate methods for gathering evidence about an abuser and the stalkerware they employ on a victim's device. We develop a semi-automated tool intended for use by investigators, helping them to analyze Android phones for potential threats in cases of IPV stalkerware. As a first step towards this goal, we perform an experimental privacy and security study to investigate currently available stalkerware apps. We specifically study the vectors through which vulnerabilities found in stalkerware apps could be exploited by investigators, allowing them to gather information about the IPV services, IPV abusers, and the victims' stolen data. We then design and implement a tool called <span>WARNE</span>, leveraging the identified flaws to facilitate the information and evidence collection process. In our experiments, we identified 50 unique stalkerware apps and their corresponding download websites that are still reachable, including one available on the Google Play Store. Among these apps, we found 30 that were free or offered a free trial. We enumerated and experimentally verified several invasive capabilities offered by these apps to clearly identify the severe privacy risks posed by them. We also found that most stalkerware apps store private information locally on the compromised device, potentially giving away information about the abuser. Our evidence-gathering tool found data related to the abuser and/or the stalkerware company, such as account credentials, dashboard URLs, and API tokens in 20 apps out of 30 tested apps. We hope our tool will help IPV victims and investigators against the growing threat of stalkerware abuse.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"48 ","pages":"Article 301677"},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281723001968/pdfft?md5=1b6f141e02aa6980d7dac8f91ca37e2d&pid=1-s2.0-S2666281723001968-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140134333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Forensic Science International-Digital Investigation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1