Pub Date : 2024-07-01DOI: 10.1016/j.fsidi.2024.301765
Antonio Artur Moura , Napoleão Nepomuceno , Vasco Furtado
This paper introduces an approach that supports speaker identification in criminal investigations, specifically addressing challenges associated with large volumes of audio recordings featuring unknown speaker identities. Our approach clusters related recordings – potentially from the same person – based on representative voice embeddings extracted using the ECAPA-TDNN speaker recognition model. Grouping audio recordings from the same person enhances variability and richness in voice patterns, thereby improving confidence in automatic speaker recognition. We propose a combination of cosine similarity and a rank-based adjustment function to determine matches of audio clusters with individuals in an enrollment database. Our approach was validated through experiments on a Common Voice-based synthesized dataset and a real-life application involving cell phones seized in prisons, which contained thousands of conversational audio recordings. Results demonstrated satisfactory performance and stability, consistently reducing the pool of candidate speakers for subsequent analysis by a human investigator.
{"title":"Enhancing speaker identification in criminal investigations through clusterization and rank-based scoring","authors":"Antonio Artur Moura , Napoleão Nepomuceno , Vasco Furtado","doi":"10.1016/j.fsidi.2024.301765","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301765","url":null,"abstract":"<div><p>This paper introduces an approach that supports speaker identification in criminal investigations, specifically addressing challenges associated with large volumes of audio recordings featuring unknown speaker identities. Our approach clusters related recordings – potentially from the same person – based on representative voice embeddings extracted using the ECAPA-TDNN speaker recognition model. Grouping audio recordings from the same person enhances variability and richness in voice patterns, thereby improving confidence in automatic speaker recognition. We propose a combination of cosine similarity and a rank-based adjustment function to determine matches of audio clusters with individuals in an enrollment database. Our approach was validated through experiments on a Common Voice-based synthesized dataset and a real-life application involving cell phones seized in prisons, which contained thousands of conversational audio recordings. Results demonstrated satisfactory performance and stability, consistently reducing the pool of candidate speakers for subsequent analysis by a human investigator.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301765"},"PeriodicalIF":2.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724000842/pdfft?md5=5c54ecf083c31c2d3dfc285faf7d7b1c&pid=1-s2.0-S2666281724000842-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-01DOI: 10.1016/j.fsidi.2024.301754
Karley M. Waguespack , Kaitlyn J. Smith , Olame A. Muliri , Ramyapandian Vijayakanthan , Aisha Ali-Gombe
The proliferation of Internet of Things (IoT) devices across homes, businesses, and industrial landscapes has significantly increased our capability to gather data and automate tasks. Despite their ubiquity, these devices are notably resource-constrained and frequently lack robust security defenses, presenting a substantial risk of intrusion and cyber threats. To address these concerns, we propose a novel anomaly-based host intrusion detection system specifically designed for IoT devices, titled MARS (Memory Anomaly Recognition System). MARS is designed to function as a crucial component in the incident response framework, acting as an early detection system for potential security breaches within an organization’s network or systems. The fundamental architecture of MARS leverages the device’s memory as a key indicator for monitoring system-level events. To enhance its security and integrity, MARS is embedded within a Trusted Execution Environment—a secure, hardware-isolated region of a microcontroller protected from untrusted software. This design choice not only makes MARS tamper-proof but also ensures reliable monitoring of the device’s memory. Deviations from established memory baselines, indicative of a security compromise, are detected through an anomaly detection algorithm hosted on a remote server. Our evaluation of the MARS prototype on STM32L562QEI6QU showed our proposed architecture can achieve decent scalability while maintaining trust, accuracy, and robustness of memory changes.
物联网(IoT)设备在家庭、企业和工业领域的普及大大提高了我们收集数据和自动执行任务的能力。尽管这些设备无处不在,但它们的资源明显有限,而且经常缺乏强大的安全防御功能,从而带来了巨大的入侵和网络威胁风险。为了解决这些问题,我们提出了一种专门针对物联网设备设计的新型异常主机入侵检测系统,名为 MARS(内存异常识别系统)。MARS 的设计初衷是作为事件响应框架中的重要组成部分,充当组织网络或系统中潜在安全漏洞的早期检测系统。MARS 的基本架构利用设备内存作为监控系统级事件的关键指标。为了增强其安全性和完整性,MARS 被嵌入了一个可信执行环境--一个微控制器的安全、硬件隔离区域,不受不受信任软件的影响。这种设计选择不仅使 MARS 防篡改,还确保了对设备内存的可靠监控。通过远程服务器上的异常检测算法,可以检测到与既定内存基线的偏差,这表明存在安全隐患。我们在 STM32L562QEI6QU 上对 MARS 原型进行了评估,结果表明我们提出的架构可以实现良好的可扩展性,同时保持内存变化的可信度、准确性和稳健性。
{"title":"MARS: The first line of defense for IoT incident response","authors":"Karley M. Waguespack , Kaitlyn J. Smith , Olame A. Muliri , Ramyapandian Vijayakanthan , Aisha Ali-Gombe","doi":"10.1016/j.fsidi.2024.301754","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301754","url":null,"abstract":"<div><p>The proliferation of Internet of Things (IoT) devices across homes, businesses, and industrial landscapes has significantly increased our capability to gather data and automate tasks. Despite their ubiquity, these devices are notably resource-constrained and frequently lack robust security defenses, presenting a substantial risk of intrusion and cyber threats. To address these concerns, we propose a novel anomaly-based host intrusion detection system specifically designed for IoT devices, titled <em>MARS</em> (Memory Anomaly Recognition System). <em>MARS</em> is designed to function as a crucial component in the incident response framework, acting as an early detection system for potential security breaches within an organization’s network or systems. The fundamental architecture of <em>MARS</em> leverages the device’s memory as a key indicator for monitoring system-level events. To enhance its security and integrity, <em>MARS</em> is embedded within a Trusted Execution Environment—a secure, hardware-isolated region of a microcontroller protected from untrusted software. This design choice not only makes <em>MARS</em> tamper-proof but also ensures reliable monitoring of the device’s memory. Deviations from established memory baselines, indicative of a security compromise, are detected through an anomaly detection algorithm hosted on a remote server. Our evaluation of the <em>MARS</em> prototype on STM32L562QEI6QU showed our proposed architecture can achieve decent scalability while maintaining trust, accuracy, and robustness of memory changes.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301754"},"PeriodicalIF":2.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724000738/pdfft?md5=09a1fb9a920fb8dccb2a5090d50aa3bd&pid=1-s2.0-S2666281724000738-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141540829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper examines the impact of cognitive biases on decision-making in forensics and digital forensics, exploring biases such as confirmation bias, anchoring bias, and hindsight bias. It assesses existing methods to mitigate biases and improve decision-making, introducing the novel “Impostor Bias”, which arises as a systematic tendency to question the authenticity of multimedia content, such as audio, images, and videos, often assuming they are generated by AI tools. This bias goes beyond evaluators' knowledge levels, as it can lead to erroneous judgments and false accusations, undermining the reliability and credibility of forensic evidence. Impostor Bias stems from an a priori assumption rather than an objective content assessment, and its impact is expected to grow with the increasing realism of AI-generated multimedia products. The paper discusses the potential causes and consequences of Impostor Bias, suggesting strategies for prevention and counteraction. By addressing these topics, this paper aims to provide valuable insights, enhance the objectivity and validity of forensic investigations, and offer recommendations for future research and practical applications to ensure the integrity and reliability of forensic practices.
{"title":"GenAI mirage: The impostor bias and the deepfake detection challenge in the era of artificial illusions","authors":"Mirko Casu , Luca Guarnera , Pasquale Caponnetto , Sebastiano Battiato","doi":"10.1016/j.fsidi.2024.301795","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301795","url":null,"abstract":"<div><p>This paper examines the impact of cognitive biases on decision-making in forensics and digital forensics, exploring biases such as confirmation bias, anchoring bias, and hindsight bias. It assesses existing methods to mitigate biases and improve decision-making, introducing the novel “Impostor Bias”, which arises as a systematic tendency to question the authenticity of multimedia content, such as audio, images, and videos, often assuming they are generated by AI tools. This bias goes beyond evaluators' knowledge levels, as it can lead to erroneous judgments and false accusations, undermining the reliability and credibility of forensic evidence. Impostor Bias stems from an a priori assumption rather than an objective content assessment, and its impact is expected to grow with the increasing realism of AI-generated multimedia products. The paper discusses the potential causes and consequences of Impostor Bias, suggesting strategies for prevention and counteraction. By addressing these topics, this paper aims to provide valuable insights, enhance the objectivity and validity of forensic investigations, and offer recommendations for future research and practical applications to ensure the integrity and reliability of forensic practices.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"50 ","pages":"Article 301795"},"PeriodicalIF":2.0,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724001197/pdfft?md5=075f46e013a9e23ee24722c1470c6e5d&pid=1-s2.0-S2666281724001197-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141429084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-15DOI: 10.1016/j.fsidi.2024.301794
Pankaj Sharma , Lalit Kumar Awasthi
People often dispose of their useless smart digital gadgets without realizing the potential presence of useful information inside these devices. This is also true for faulty smart bulbs, which cybercriminals might exploit to gain unauthorized access to a smart home and manipulate or steal private information. This research delves into the potential security risks associated with smart bulbs and provides recommendations for mitigating such risks. Through a comprehensive analysis of the functionality of smart bulbs, this study introduced the data extraction framework DEF-IoTF for collecting both hardware and application-level digital artifacts from smart bulbs. This paper presents the FIvM-IoT model for collecting and analyzing evidence from companion app data on mobile phones and Wifi modules at the hardware level. We conduct examinations on the smart bulb's Wifi module and extract its firmware using the developed Wifi_Cred tool. These include evidence related to user credentials, log time stamps, Wifi details, potential forensic information, and investigation procedures for IoT devices. Finally, this study provides prominent IoT forensic use cases along with the key requirements for hardware-level forensic investigation of Wifi modules.
{"title":"Unveiling the hidden dangers: Security risks and forensic analysis of smart bulbs","authors":"Pankaj Sharma , Lalit Kumar Awasthi","doi":"10.1016/j.fsidi.2024.301794","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301794","url":null,"abstract":"<div><p>People often dispose of their useless smart digital gadgets without realizing the potential presence of useful information inside these devices. This is also true for faulty smart bulbs, which cybercriminals might exploit to gain unauthorized access to a smart home and manipulate or steal private information. This research delves into the potential security risks associated with smart bulbs and provides recommendations for mitigating such risks. Through a comprehensive analysis of the functionality of smart bulbs, this study introduced the data extraction framework DEF-IoTF for collecting both hardware and application-level digital artifacts from smart bulbs. This paper presents the FIvM-IoT model for collecting and analyzing evidence from companion app data on mobile phones and Wifi modules at the hardware level. We conduct examinations on the smart bulb's Wifi module and extract its firmware using the developed Wifi_Cred tool. These include evidence related to user credentials, log time stamps, Wifi details, potential forensic information, and investigation procedures for IoT devices. Finally, this study provides prominent IoT forensic use cases along with the key requirements for hardware-level forensic investigation of Wifi modules.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"50 ","pages":"Article 301794"},"PeriodicalIF":2.0,"publicationDate":"2024-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141328313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Social media and mobile communications in general are an extremely rich source of digital forensic information. We present our new framework for analysing this resource with an innovative combination of time series and text mining methods. The framework is intended to create a tool to analyse and operationally summarise extended trails of social media messages, thus enabling investigators for the first time to drill down into specific moments at which sentiment analysis has detected a change of tone indicative of a particularly strong and significant response. Crucially, the method will give investigators an opportunity to reduce the time and resource commitment required for ongoing and hands-on analysis of digital communications on media such as Texts/SMS, WhatsApp and Messenger.
{"title":"Sentiment and time-series analysis of direct-message conversations","authors":"Martyn Harris, Jessica Jacobson, Alessandro Provetti","doi":"10.1016/j.fsidi.2024.301753","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301753","url":null,"abstract":"<div><p>Social media and mobile communications in general are an extremely rich source of digital forensic information. We present our new framework for analysing this resource with an innovative combination of time series and text mining methods. The framework is intended to create a tool to analyse and operationally summarise extended trails of social media messages, thus enabling investigators for the first time to drill down into specific moments at which sentiment analysis has detected a change of tone indicative of a particularly strong and significant response. Crucially, the method will give investigators an opportunity to reduce the time and resource commitment required for ongoing and hands-on analysis of digital communications on media such as Texts/SMS, WhatsApp and Messenger.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301753"},"PeriodicalIF":2.0,"publicationDate":"2024-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724000726/pdfft?md5=f20b9f2665013212a0a6b432cbde19ac&pid=1-s2.0-S2666281724000726-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141068459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-14DOI: 10.1016/j.fsidi.2024.301769
Dominic Schmutz, Robin Rapp, Benjamin Fehrensen
This publication presents a thorough forensic investigation of the banking malware known as Hook, shedding light on its intricate functionalities and providing valuable insights into the broader realm of banking malware. Given the persistent evolution of Android malware, particularly in the context of banking threats, this research explores the ongoing development of these malicious entities. In particular, it emphasizes the prevalent “malware as a service” (MaaS) model, which engenders a competitive environment where malware developers continually strive to enhance their capabilities. Consequently, this investigation serves as a vital benchmark for evaluating the current state of banking MaaS capabilities in July 2023, enabling researchers and practitioners to gauge the advancements and trends within the field.
{"title":"Forensic analysis of hook Android malware","authors":"Dominic Schmutz, Robin Rapp, Benjamin Fehrensen","doi":"10.1016/j.fsidi.2024.301769","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301769","url":null,"abstract":"<div><p>This publication presents a thorough forensic investigation of the banking malware known as Hook, shedding light on its intricate functionalities and providing valuable insights into the broader realm of banking malware. Given the persistent evolution of Android malware, particularly in the context of banking threats, this research explores the ongoing development of these malicious entities. In particular, it emphasizes the prevalent “malware as a service” (MaaS) model, which engenders a competitive environment where malware developers continually strive to enhance their capabilities. Consequently, this investigation serves as a vital benchmark for evaluating the current state of banking MaaS capabilities in July 2023, enabling researchers and practitioners to gauge the advancements and trends within the field.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301769"},"PeriodicalIF":2.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266628172400088X/pdfft?md5=194dd9b7991e93a51071b247dc3d33ac&pid=1-s2.0-S266628172400088X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140947007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-14DOI: 10.1016/j.fsidi.2024.301768
Sabrina Friedl, Günther Pernul
The Internet of Things (IoT) is increasingly becoming a part of people's lives and is progressively revolutionizing our lives and businesses. From a Digital Forensics (DF) point of view, this connection turns an IoT environment into a valuable source of evidence containing diverse artifacts that could significantly aid DF investigations. Therefore, DF must adapt to the characteristics of IoT Forensics (IoTF). With the increasing deployment of IoT, organizations are compelled to revise their approaches to planning, developing, and implementing Information Technology (IT) security strategies. The IoT presents new business opportunities but also simultaneously creates various challenges related to cyber-attacks and their resolution. For optimal preparedness in the face of future incidents, companies should consider implementing Forensics Readiness (FR). This paper thus examines the factors that influence IoT-FR within organizations. By systematically analyzing research efforts from 2010 to 2023, we identified the following factors influencing IoT-FR: (1) Legal Aspect, (2) Standardization Approach, (3) Technological Resource and Technique, (4) Management Process and (5) Human Factor. Furthermore, these influencing factors are not only considered individually but also in terms of the dependencies between them. This results in the creation of a holistic model including the interdependencies and influences of the factors to provide a novel overview and enhance the integrated perspective on IoT-FR. The knowledge of factors influencing the integration of IoT-FR into organizations is valuable. It thus can be of enormous importance, as it can save time and money in the event of a subsequent incident. Additionally, alongside these factors, various challenges, techniques, models, and frameworks are highlighted to offer profound insights into the relatively novel subject of IoT-FR and to inspire future research.
{"title":"IoT Forensics Readiness - influencing factors","authors":"Sabrina Friedl, Günther Pernul","doi":"10.1016/j.fsidi.2024.301768","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301768","url":null,"abstract":"<div><p>The Internet of Things (IoT) is increasingly becoming a part of people's lives and is progressively revolutionizing our lives and businesses. From a Digital Forensics (DF) point of view, this connection turns an IoT environment into a valuable source of evidence containing diverse artifacts that could significantly aid DF investigations. Therefore, DF must adapt to the characteristics of IoT Forensics (IoTF). With the increasing deployment of IoT, organizations are compelled to revise their approaches to planning, developing, and implementing Information Technology (IT) security strategies. The IoT presents new business opportunities but also simultaneously creates various challenges related to cyber-attacks and their resolution. For optimal preparedness in the face of future incidents, companies should consider implementing Forensics Readiness (FR). This paper thus examines the factors that influence IoT-FR within organizations. By systematically analyzing research efforts from 2010 to 2023, we identified the following factors influencing IoT-FR: (1) Legal Aspect, (2) Standardization Approach, (3) Technological Resource and Technique, (4) Management Process and (5) Human Factor. Furthermore, these influencing factors are not only considered individually but also in terms of the dependencies between them. This results in the creation of a holistic model including the interdependencies and influences of the factors to provide a novel overview and enhance the integrated perspective on IoT-FR. The knowledge of factors influencing the integration of IoT-FR into organizations is valuable. It thus can be of enormous importance, as it can save time and money in the event of a subsequent incident. Additionally, alongside these factors, various challenges, techniques, models, and frameworks are highlighted to offer profound insights into the relatively novel subject of IoT-FR and to inspire future research.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301768"},"PeriodicalIF":2.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724000878/pdfft?md5=012b90db92b8d36ae8ae211993009d99&pid=1-s2.0-S2666281724000878-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140947006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}