首页 > 最新文献

Forensic Science International-Digital Investigation最新文献

英文 中文
Enhancing speaker identification in criminal investigations through clusterization and rank-based scoring 通过聚类和基于等级的评分加强刑事调查中的说话者识别
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/j.fsidi.2024.301765
Antonio Artur Moura , Napoleão Nepomuceno , Vasco Furtado

This paper introduces an approach that supports speaker identification in criminal investigations, specifically addressing challenges associated with large volumes of audio recordings featuring unknown speaker identities. Our approach clusters related recordings – potentially from the same person – based on representative voice embeddings extracted using the ECAPA-TDNN speaker recognition model. Grouping audio recordings from the same person enhances variability and richness in voice patterns, thereby improving confidence in automatic speaker recognition. We propose a combination of cosine similarity and a rank-based adjustment function to determine matches of audio clusters with individuals in an enrollment database. Our approach was validated through experiments on a Common Voice-based synthesized dataset and a real-life application involving cell phones seized in prisons, which contained thousands of conversational audio recordings. Results demonstrated satisfactory performance and stability, consistently reducing the pool of candidate speakers for subsequent analysis by a human investigator.

本文介绍了一种支持刑事调查中说话者识别的方法,特别是解决了与大量说话者身份未知的录音相关的挑战。我们的方法基于使用 ECAPA-TDNN 说话者识别模型提取的代表性语音嵌入,对可能来自同一人的相关录音进行分组。对来自同一人的录音进行分组可增强语音模式的可变性和丰富性,从而提高自动识别说话者的可信度。我们建议结合余弦相似度和基于等级的调整函数来确定音频集群与注册数据库中的个人是否匹配。我们的方法在一个基于通用语音的合成数据集和一个涉及在监狱缴获的手机的实际应用中得到了验证,其中包含数千段对话录音。实验结果表明,该方法的性能和稳定性令人满意,可持续减少候选发言人的数量,供人类调查员进行后续分析。
{"title":"Enhancing speaker identification in criminal investigations through clusterization and rank-based scoring","authors":"Antonio Artur Moura ,&nbsp;Napoleão Nepomuceno ,&nbsp;Vasco Furtado","doi":"10.1016/j.fsidi.2024.301765","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301765","url":null,"abstract":"<div><p>This paper introduces an approach that supports speaker identification in criminal investigations, specifically addressing challenges associated with large volumes of audio recordings featuring unknown speaker identities. Our approach clusters related recordings – potentially from the same person – based on representative voice embeddings extracted using the ECAPA-TDNN speaker recognition model. Grouping audio recordings from the same person enhances variability and richness in voice patterns, thereby improving confidence in automatic speaker recognition. We propose a combination of cosine similarity and a rank-based adjustment function to determine matches of audio clusters with individuals in an enrollment database. Our approach was validated through experiments on a Common Voice-based synthesized dataset and a real-life application involving cell phones seized in prisons, which contained thousands of conversational audio recordings. Results demonstrated satisfactory performance and stability, consistently reducing the pool of candidate speakers for subsequent analysis by a human investigator.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301765"},"PeriodicalIF":2.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724000842/pdfft?md5=5c54ecf083c31c2d3dfc285faf7d7b1c&pid=1-s2.0-S2666281724000842-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MARS: The first line of defense for IoT incident response MARS:物联网事件响应的第一道防线
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/j.fsidi.2024.301754
Karley M. Waguespack , Kaitlyn J. Smith , Olame A. Muliri , Ramyapandian Vijayakanthan , Aisha Ali-Gombe

The proliferation of Internet of Things (IoT) devices across homes, businesses, and industrial landscapes has significantly increased our capability to gather data and automate tasks. Despite their ubiquity, these devices are notably resource-constrained and frequently lack robust security defenses, presenting a substantial risk of intrusion and cyber threats. To address these concerns, we propose a novel anomaly-based host intrusion detection system specifically designed for IoT devices, titled MARS (Memory Anomaly Recognition System). MARS is designed to function as a crucial component in the incident response framework, acting as an early detection system for potential security breaches within an organization’s network or systems. The fundamental architecture of MARS leverages the device’s memory as a key indicator for monitoring system-level events. To enhance its security and integrity, MARS is embedded within a Trusted Execution Environment—a secure, hardware-isolated region of a microcontroller protected from untrusted software. This design choice not only makes MARS tamper-proof but also ensures reliable monitoring of the device’s memory. Deviations from established memory baselines, indicative of a security compromise, are detected through an anomaly detection algorithm hosted on a remote server. Our evaluation of the MARS prototype on STM32L562QEI6QU showed our proposed architecture can achieve decent scalability while maintaining trust, accuracy, and robustness of memory changes.

物联网(IoT)设备在家庭、企业和工业领域的普及大大提高了我们收集数据和自动执行任务的能力。尽管这些设备无处不在,但它们的资源明显有限,而且经常缺乏强大的安全防御功能,从而带来了巨大的入侵和网络威胁风险。为了解决这些问题,我们提出了一种专门针对物联网设备设计的新型异常主机入侵检测系统,名为 MARS(内存异常识别系统)。MARS 的设计初衷是作为事件响应框架中的重要组成部分,充当组织网络或系统中潜在安全漏洞的早期检测系统。MARS 的基本架构利用设备内存作为监控系统级事件的关键指标。为了增强其安全性和完整性,MARS 被嵌入了一个可信执行环境--一个微控制器的安全、硬件隔离区域,不受不受信任软件的影响。这种设计选择不仅使 MARS 防篡改,还确保了对设备内存的可靠监控。通过远程服务器上的异常检测算法,可以检测到与既定内存基线的偏差,这表明存在安全隐患。我们在 STM32L562QEI6QU 上对 MARS 原型进行了评估,结果表明我们提出的架构可以实现良好的可扩展性,同时保持内存变化的可信度、准确性和稳健性。
{"title":"MARS: The first line of defense for IoT incident response","authors":"Karley M. Waguespack ,&nbsp;Kaitlyn J. Smith ,&nbsp;Olame A. Muliri ,&nbsp;Ramyapandian Vijayakanthan ,&nbsp;Aisha Ali-Gombe","doi":"10.1016/j.fsidi.2024.301754","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301754","url":null,"abstract":"<div><p>The proliferation of Internet of Things (IoT) devices across homes, businesses, and industrial landscapes has significantly increased our capability to gather data and automate tasks. Despite their ubiquity, these devices are notably resource-constrained and frequently lack robust security defenses, presenting a substantial risk of intrusion and cyber threats. To address these concerns, we propose a novel anomaly-based host intrusion detection system specifically designed for IoT devices, titled <em>MARS</em> (Memory Anomaly Recognition System). <em>MARS</em> is designed to function as a crucial component in the incident response framework, acting as an early detection system for potential security breaches within an organization’s network or systems. The fundamental architecture of <em>MARS</em> leverages the device’s memory as a key indicator for monitoring system-level events. To enhance its security and integrity, <em>MARS</em> is embedded within a Trusted Execution Environment—a secure, hardware-isolated region of a microcontroller protected from untrusted software. This design choice not only makes <em>MARS</em> tamper-proof but also ensures reliable monitoring of the device’s memory. Deviations from established memory baselines, indicative of a security compromise, are detected through an anomaly detection algorithm hosted on a remote server. Our evaluation of the <em>MARS</em> prototype on STM32L562QEI6QU showed our proposed architecture can achieve decent scalability while maintaining trust, accuracy, and robustness of memory changes.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301754"},"PeriodicalIF":2.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724000738/pdfft?md5=09a1fb9a920fb8dccb2a5090d50aa3bd&pid=1-s2.0-S2666281724000738-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141540829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DFRWS Euro 2025 BRNO DFRWS Euro 2025 BRNO
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/S2666-2817(24)00114-8
{"title":"DFRWS Euro 2025 BRNO","authors":"","doi":"10.1016/S2666-2817(24)00114-8","DOIUrl":"https://doi.org/10.1016/S2666-2817(24)00114-8","url":null,"abstract":"","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301791"},"PeriodicalIF":2.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724001148/pdfft?md5=91cdaa9cc754192ae60940bca0b23dbf&pid=1-s2.0-S2666281724001148-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Twenty-Fourth DFRWS USA 2024 美国 2024 年第二十四届 DFRWS 会议
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/j.fsidi.2024.301771
{"title":"Twenty-Fourth DFRWS USA 2024","authors":"","doi":"10.1016/j.fsidi.2024.301771","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301771","url":null,"abstract":"","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301771"},"PeriodicalIF":2.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141540828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DFRWS APAC 2024 Brisbane DFRWS 2024 年亚太地区会议 布里斯班
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/S2666-2817(24)00113-6
{"title":"DFRWS APAC 2024 Brisbane","authors":"","doi":"10.1016/S2666-2817(24)00113-6","DOIUrl":"https://doi.org/10.1016/S2666-2817(24)00113-6","url":null,"abstract":"","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301790"},"PeriodicalIF":2.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724001136/pdfft?md5=85481e8ac2a29c446b16d2c00542588f&pid=1-s2.0-S2666281724001136-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GenAI mirage: The impostor bias and the deepfake detection challenge in the era of artificial illusions GenAI 海市蜃楼:人工幻觉时代的 "冒名顶替者 "偏差和深度防伪检测挑战
IF 2 4区 医学 Pub Date : 2024-06-19 DOI: 10.1016/j.fsidi.2024.301795
Mirko Casu , Luca Guarnera , Pasquale Caponnetto , Sebastiano Battiato

This paper examines the impact of cognitive biases on decision-making in forensics and digital forensics, exploring biases such as confirmation bias, anchoring bias, and hindsight bias. It assesses existing methods to mitigate biases and improve decision-making, introducing the novel “Impostor Bias”, which arises as a systematic tendency to question the authenticity of multimedia content, such as audio, images, and videos, often assuming they are generated by AI tools. This bias goes beyond evaluators' knowledge levels, as it can lead to erroneous judgments and false accusations, undermining the reliability and credibility of forensic evidence. Impostor Bias stems from an a priori assumption rather than an objective content assessment, and its impact is expected to grow with the increasing realism of AI-generated multimedia products. The paper discusses the potential causes and consequences of Impostor Bias, suggesting strategies for prevention and counteraction. By addressing these topics, this paper aims to provide valuable insights, enhance the objectivity and validity of forensic investigations, and offer recommendations for future research and practical applications to ensure the integrity and reliability of forensic practices.

本文研究了认知偏差对取证和数字取证决策的影响,探讨了确认偏差、锚定偏差和事后偏差等偏差。它评估了减轻偏差和改进决策的现有方法,并引入了新颖的 "冒名顶替偏差",这种偏差是一种系统性倾向,即质疑音频、图像和视频等多媒体内容的真实性,通常假定它们是由人工智能工具生成的。这种偏见超出了评估人员的知识水平,因为它会导致错误判断和错误指控,破坏法医证据的可靠性和可信度。冒名顶替偏见源于先验假设而非客观内容评估,随着人工智能生成的多媒体产品越来越逼真,其影响预计会越来越大。本文讨论了冒名顶替偏见的潜在原因和后果,并提出了预防和应对策略。通过探讨这些主题,本文旨在提供有价值的见解,提高法证调查的客观性和有效性,并为未来研究和实际应用提供建议,以确保法证实践的完整性和可靠性。
{"title":"GenAI mirage: The impostor bias and the deepfake detection challenge in the era of artificial illusions","authors":"Mirko Casu ,&nbsp;Luca Guarnera ,&nbsp;Pasquale Caponnetto ,&nbsp;Sebastiano Battiato","doi":"10.1016/j.fsidi.2024.301795","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301795","url":null,"abstract":"<div><p>This paper examines the impact of cognitive biases on decision-making in forensics and digital forensics, exploring biases such as confirmation bias, anchoring bias, and hindsight bias. It assesses existing methods to mitigate biases and improve decision-making, introducing the novel “Impostor Bias”, which arises as a systematic tendency to question the authenticity of multimedia content, such as audio, images, and videos, often assuming they are generated by AI tools. This bias goes beyond evaluators' knowledge levels, as it can lead to erroneous judgments and false accusations, undermining the reliability and credibility of forensic evidence. Impostor Bias stems from an a priori assumption rather than an objective content assessment, and its impact is expected to grow with the increasing realism of AI-generated multimedia products. The paper discusses the potential causes and consequences of Impostor Bias, suggesting strategies for prevention and counteraction. By addressing these topics, this paper aims to provide valuable insights, enhance the objectivity and validity of forensic investigations, and offer recommendations for future research and practical applications to ensure the integrity and reliability of forensic practices.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"50 ","pages":"Article 301795"},"PeriodicalIF":2.0,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724001197/pdfft?md5=075f46e013a9e23ee24722c1470c6e5d&pid=1-s2.0-S2666281724001197-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141429084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unveiling the hidden dangers: Security risks and forensic analysis of smart bulbs 揭开隐藏的危险:智能灯泡的安全风险和取证分析
IF 2 4区 医学 Pub Date : 2024-06-15 DOI: 10.1016/j.fsidi.2024.301794
Pankaj Sharma , Lalit Kumar Awasthi

People often dispose of their useless smart digital gadgets without realizing the potential presence of useful information inside these devices. This is also true for faulty smart bulbs, which cybercriminals might exploit to gain unauthorized access to a smart home and manipulate or steal private information. This research delves into the potential security risks associated with smart bulbs and provides recommendations for mitigating such risks. Through a comprehensive analysis of the functionality of smart bulbs, this study introduced the data extraction framework DEF-IoTF for collecting both hardware and application-level digital artifacts from smart bulbs. This paper presents the FIvM-IoT model for collecting and analyzing evidence from companion app data on mobile phones and Wifi modules at the hardware level. We conduct examinations on the smart bulb's Wifi module and extract its firmware using the developed Wifi_Cred tool. These include evidence related to user credentials, log time stamps, Wifi details, potential forensic information, and investigation procedures for IoT devices. Finally, this study provides prominent IoT forensic use cases along with the key requirements for hardware-level forensic investigation of Wifi modules.

人们经常丢弃无用的智能数码设备,却没有意识到这些设备中可能存在有用的信息。有问题的智能灯泡也是如此,网络犯罪分子可能会利用这些问题,在未经授权的情况下进入智能家居,操纵或窃取私人信息。本研究深入探讨了与智能灯泡相关的潜在安全风险,并提出了降低此类风险的建议。通过对智能灯泡功能的全面分析,本研究引入了数据提取框架 DEF-IoTF,用于从智能灯泡中收集硬件和应用级数字工件。本文介绍了 FIvM-IoT 模型,用于从手机和 Wifi 模块的配套应用程序数据中收集和分析硬件层面的证据。我们对智能灯泡的 Wifi 模块进行检查,并使用开发的 Wifi_Cred 工具提取其固件。这些证据包括与用户凭证、日志时间戳、Wifi 详情、潜在取证信息和物联网设备调查程序相关的证据。最后,本研究提供了突出的物联网取证使用案例,以及对 Wifi 模块进行硬件级取证调查的关键要求。
{"title":"Unveiling the hidden dangers: Security risks and forensic analysis of smart bulbs","authors":"Pankaj Sharma ,&nbsp;Lalit Kumar Awasthi","doi":"10.1016/j.fsidi.2024.301794","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301794","url":null,"abstract":"<div><p>People often dispose of their useless smart digital gadgets without realizing the potential presence of useful information inside these devices. This is also true for faulty smart bulbs, which cybercriminals might exploit to gain unauthorized access to a smart home and manipulate or steal private information. This research delves into the potential security risks associated with smart bulbs and provides recommendations for mitigating such risks. Through a comprehensive analysis of the functionality of smart bulbs, this study introduced the data extraction framework DEF-IoTF for collecting both hardware and application-level digital artifacts from smart bulbs. This paper presents the FIvM-IoT model for collecting and analyzing evidence from companion app data on mobile phones and Wifi modules at the hardware level. We conduct examinations on the smart bulb's Wifi module and extract its firmware using the developed Wifi_Cred tool. These include evidence related to user credentials, log time stamps, Wifi details, potential forensic information, and investigation procedures for IoT devices. Finally, this study provides prominent IoT forensic use cases along with the key requirements for hardware-level forensic investigation of Wifi modules.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"50 ","pages":"Article 301794"},"PeriodicalIF":2.0,"publicationDate":"2024-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141328313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentiment and time-series analysis of direct-message conversations 直接信息对话的情感和时间序列分析
IF 2 4区 医学 Pub Date : 2024-05-20 DOI: 10.1016/j.fsidi.2024.301753
Martyn Harris, Jessica Jacobson, Alessandro Provetti

Social media and mobile communications in general are an extremely rich source of digital forensic information. We present our new framework for analysing this resource with an innovative combination of time series and text mining methods. The framework is intended to create a tool to analyse and operationally summarise extended trails of social media messages, thus enabling investigators for the first time to drill down into specific moments at which sentiment analysis has detected a change of tone indicative of a particularly strong and significant response. Crucially, the method will give investigators an opportunity to reduce the time and resource commitment required for ongoing and hands-on analysis of digital communications on media such as Texts/SMS, WhatsApp and Messenger.

社交媒体和移动通信是数字取证信息的一个极其丰富的来源。我们将时间序列和文本挖掘方法创新性地结合起来,提出了分析这一资源的新框架。该框架旨在创建一种工具,对社交媒体信息的扩展轨迹进行分析和操作性总结,从而使调查人员能够首次深入到情感分析检测到语气变化的特定时刻,这种语气变化表明了特别强烈和重要的反应。最重要的是,该方法将使调查人员有机会减少对短信/彩信、WhatsApp 和 Messenger 等媒体上的数字通信进行持续和实际分析所需的时间和资源投入。
{"title":"Sentiment and time-series analysis of direct-message conversations","authors":"Martyn Harris,&nbsp;Jessica Jacobson,&nbsp;Alessandro Provetti","doi":"10.1016/j.fsidi.2024.301753","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301753","url":null,"abstract":"<div><p>Social media and mobile communications in general are an extremely rich source of digital forensic information. We present our new framework for analysing this resource with an innovative combination of time series and text mining methods. The framework is intended to create a tool to analyse and operationally summarise extended trails of social media messages, thus enabling investigators for the first time to drill down into specific moments at which sentiment analysis has detected a change of tone indicative of a particularly strong and significant response. Crucially, the method will give investigators an opportunity to reduce the time and resource commitment required for ongoing and hands-on analysis of digital communications on media such as Texts/SMS, WhatsApp and Messenger.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301753"},"PeriodicalIF":2.0,"publicationDate":"2024-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724000726/pdfft?md5=f20b9f2665013212a0a6b432cbde19ac&pid=1-s2.0-S2666281724000726-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141068459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forensic analysis of hook Android malware 对挂钩式安卓恶意软件的取证分析
IF 2 4区 医学 Pub Date : 2024-05-14 DOI: 10.1016/j.fsidi.2024.301769
Dominic Schmutz, Robin Rapp, Benjamin Fehrensen

This publication presents a thorough forensic investigation of the banking malware known as Hook, shedding light on its intricate functionalities and providing valuable insights into the broader realm of banking malware. Given the persistent evolution of Android malware, particularly in the context of banking threats, this research explores the ongoing development of these malicious entities. In particular, it emphasizes the prevalent “malware as a service” (MaaS) model, which engenders a competitive environment where malware developers continually strive to enhance their capabilities. Consequently, this investigation serves as a vital benchmark for evaluating the current state of banking MaaS capabilities in July 2023, enabling researchers and practitioners to gauge the advancements and trends within the field.

本出版物对名为 Hook 的银行恶意软件进行了彻底的取证调查,揭示了其错综复杂的功能,并为更广泛的银行恶意软件领域提供了宝贵的见解。鉴于安卓恶意软件的持续演变,特别是在银行业务威胁方面,本研究探讨了这些恶意实体的持续发展。它特别强调了普遍存在的 "恶意软件即服务"(MaaS)模式,这种模式产生了一种竞争环境,恶意软件开发者在这种环境中不断努力提高自己的能力。因此,这项调查是评估 2023 年 7 月银行业 MaaS 能力现状的重要基准,使研究人员和从业人员能够衡量该领域的进步和趋势。
{"title":"Forensic analysis of hook Android malware","authors":"Dominic Schmutz,&nbsp;Robin Rapp,&nbsp;Benjamin Fehrensen","doi":"10.1016/j.fsidi.2024.301769","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301769","url":null,"abstract":"<div><p>This publication presents a thorough forensic investigation of the banking malware known as Hook, shedding light on its intricate functionalities and providing valuable insights into the broader realm of banking malware. Given the persistent evolution of Android malware, particularly in the context of banking threats, this research explores the ongoing development of these malicious entities. In particular, it emphasizes the prevalent “malware as a service” (MaaS) model, which engenders a competitive environment where malware developers continually strive to enhance their capabilities. Consequently, this investigation serves as a vital benchmark for evaluating the current state of banking MaaS capabilities in July 2023, enabling researchers and practitioners to gauge the advancements and trends within the field.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301769"},"PeriodicalIF":2.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266628172400088X/pdfft?md5=194dd9b7991e93a51071b247dc3d33ac&pid=1-s2.0-S266628172400088X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140947007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Forensics Readiness - influencing factors 物联网取证准备--影响因素
IF 2 4区 医学 Pub Date : 2024-05-14 DOI: 10.1016/j.fsidi.2024.301768
Sabrina Friedl, Günther Pernul

The Internet of Things (IoT) is increasingly becoming a part of people's lives and is progressively revolutionizing our lives and businesses. From a Digital Forensics (DF) point of view, this connection turns an IoT environment into a valuable source of evidence containing diverse artifacts that could significantly aid DF investigations. Therefore, DF must adapt to the characteristics of IoT Forensics (IoTF). With the increasing deployment of IoT, organizations are compelled to revise their approaches to planning, developing, and implementing Information Technology (IT) security strategies. The IoT presents new business opportunities but also simultaneously creates various challenges related to cyber-attacks and their resolution. For optimal preparedness in the face of future incidents, companies should consider implementing Forensics Readiness (FR). This paper thus examines the factors that influence IoT-FR within organizations. By systematically analyzing research efforts from 2010 to 2023, we identified the following factors influencing IoT-FR: (1) Legal Aspect, (2) Standardization Approach, (3) Technological Resource and Technique, (4) Management Process and (5) Human Factor. Furthermore, these influencing factors are not only considered individually but also in terms of the dependencies between them. This results in the creation of a holistic model including the interdependencies and influences of the factors to provide a novel overview and enhance the integrated perspective on IoT-FR. The knowledge of factors influencing the integration of IoT-FR into organizations is valuable. It thus can be of enormous importance, as it can save time and money in the event of a subsequent incident. Additionally, alongside these factors, various challenges, techniques, models, and frameworks are highlighted to offer profound insights into the relatively novel subject of IoT-FR and to inspire future research.

物联网(IoT)正日益成为人们生活的一部分,并逐步彻底改变着我们的生活和业务。从数字取证(DF)的角度来看,这种连接将物联网环境变成了一个宝贵的证据来源,其中包含的各种人工制品可以极大地帮助 DF 调查。因此,数字取证必须适应物联网取证(IoTF)的特点。随着物联网部署的不断增加,企业不得不修改其规划、开发和实施信息技术(IT)安全战略的方法。物联网带来了新的商机,但同时也带来了与网络攻击及其解决方法有关的各种挑战。为做好应对未来事件的最佳准备,企业应考虑实施取证准备(FR)。因此,本文探讨了影响组织内物联网取证准备的因素。通过系统分析 2010 年至 2023 年的研究工作,我们确定了以下影响物联网-FR 的因素:(1)法律方面;(2)标准化方法;(3)技术资源和技术;(4)管理流程;(5)人为因素。此外,这些影响因素不仅要单独考虑,还要考虑它们之间的依赖关系。这样就创建了一个整体模型,其中包括各因素之间的相互依存关系和影响,从而提供了一个新颖的概览,增强了对物联网-FR 的综合视角。了解影响物联网-财务报告融入组织的因素非常有价值。因此,这一点非常重要,因为它可以在随后发生事故时节省时间和金钱。此外,除这些因素外,还重点介绍了各种挑战、技术、模型和框架,以便为物联网-财务报告这一相对新颖的课题提供深刻的见解,并启发未来的研究。
{"title":"IoT Forensics Readiness - influencing factors","authors":"Sabrina Friedl,&nbsp;Günther Pernul","doi":"10.1016/j.fsidi.2024.301768","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301768","url":null,"abstract":"<div><p>The Internet of Things (IoT) is increasingly becoming a part of people's lives and is progressively revolutionizing our lives and businesses. From a Digital Forensics (DF) point of view, this connection turns an IoT environment into a valuable source of evidence containing diverse artifacts that could significantly aid DF investigations. Therefore, DF must adapt to the characteristics of IoT Forensics (IoTF). With the increasing deployment of IoT, organizations are compelled to revise their approaches to planning, developing, and implementing Information Technology (IT) security strategies. The IoT presents new business opportunities but also simultaneously creates various challenges related to cyber-attacks and their resolution. For optimal preparedness in the face of future incidents, companies should consider implementing Forensics Readiness (FR). This paper thus examines the factors that influence IoT-FR within organizations. By systematically analyzing research efforts from 2010 to 2023, we identified the following factors influencing IoT-FR: (1) Legal Aspect, (2) Standardization Approach, (3) Technological Resource and Technique, (4) Management Process and (5) Human Factor. Furthermore, these influencing factors are not only considered individually but also in terms of the dependencies between them. This results in the creation of a holistic model including the interdependencies and influences of the factors to provide a novel overview and enhance the integrated perspective on IoT-FR. The knowledge of factors influencing the integration of IoT-FR into organizations is valuable. It thus can be of enormous importance, as it can save time and money in the event of a subsequent incident. Additionally, alongside these factors, various challenges, techniques, models, and frameworks are highlighted to offer profound insights into the relatively novel subject of IoT-FR and to inspire future research.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301768"},"PeriodicalIF":2.0,"publicationDate":"2024-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724000878/pdfft?md5=012b90db92b8d36ae8ae211993009d99&pid=1-s2.0-S2666281724000878-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140947006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Forensic Science International-Digital Investigation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1