首页 > 最新文献

Forensic Science International-Digital Investigation最新文献

英文 中文
A temporal analysis and evaluation of fuzzy hashing algorithms for Android malware analysis 用于 Android 恶意软件分析的模糊哈希算法的时间分析和评估
IF 2 4区 医学 Pub Date : 2024-05-13 DOI: 10.1016/j.fsidi.2024.301770
Murray Fleming, Oluwafemi Olukoya

Fuzzy hashing has been utilised in digital forensics and malware analysis for malware detection, malware variant classification, file clustering, document similarity detection, embedded object detection and fragment detection. Previous research considered the efficacy of fuzzy hashing at a point in time for malware classification and did not specifically address the problem of malware evolution. Android malware presents a significant cybersecurity threat, and since malware is constantly mutating, a temporal analysis of the effectiveness of fuzzy hashing techniques for Android malware detection and classification contributes to understanding the value of fuzzy hashes in the evolution of malware. Through experimental examination, this study sought to determine whether or not fuzzy hashes are always effective, how quickly malware is evolving, and how malware evolution affects fuzzy hashing. Comparisons are made between the performance of different fuzzy hashing algorithms and the distinction between hashes at the file and class levels. Experiments with known malware family and analysis with over 4500 APK files, including 100 benign samples collected from 2012 - 2022 were conducted using various fuzzy hashing algorithms, file-level and section-level similarity hashing, symbolic and raw opcode hashing, and optimisations for improving fuzzy hashing comparisons. The performance of the methods was evaluated using detection and false positive rates. The results show that fuzzy hashing algorithms remain a valuable technique that demonstrates robustness to malware evolution with 10-year detection rates of over 80%.

在数字取证和恶意软件分析中,模糊散列已被用于恶意软件检测、恶意软件变种分类、文件聚类、文档相似性检测、嵌入对象检测和片段检测。以前的研究考虑的是模糊哈希算法在恶意软件分类中的时间点功效,并没有专门解决恶意软件演变的问题。安卓恶意软件是一个重大的网络安全威胁,由于恶意软件不断变异,对模糊散列技术在安卓恶意软件检测和分类中的有效性进行时间分析,有助于理解模糊散列在恶意软件进化过程中的价值。通过实验检查,本研究试图确定模糊哈希值是否始终有效、恶意软件的进化速度以及恶意软件的进化对模糊哈希值的影响。研究比较了不同模糊哈希算法的性能,以及文件和类级别的哈希值之间的区别。使用各种模糊哈希算法、文件级和段级相似性哈希算法、符号和原始操作码哈希算法,以及用于改进模糊哈希比较的优化方法,对已知恶意软件家族进行了实验,并对 4500 多个 APK 文件(包括从 2012 年到 2022 年收集的 100 个良性样本)进行了分析。使用检测率和误报率对这些方法的性能进行了评估。结果表明,模糊散列算法仍然是一种有价值的技术,它对恶意软件的演变具有很强的鲁棒性,10 年的检测率超过 80%。
{"title":"A temporal analysis and evaluation of fuzzy hashing algorithms for Android malware analysis","authors":"Murray Fleming,&nbsp;Oluwafemi Olukoya","doi":"10.1016/j.fsidi.2024.301770","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301770","url":null,"abstract":"<div><p>Fuzzy hashing has been utilised in digital forensics and malware analysis for malware detection, malware variant classification, file clustering, document similarity detection, embedded object detection and fragment detection. Previous research considered the efficacy of fuzzy hashing at a point in time for malware classification and did not specifically address the problem of malware evolution. Android malware presents a significant cybersecurity threat, and since malware is constantly mutating, a temporal analysis of the effectiveness of fuzzy hashing techniques for Android malware detection and classification contributes to understanding the value of fuzzy hashes in the evolution of malware. Through experimental examination, this study sought to determine whether or not fuzzy hashes are always effective, how quickly malware is evolving, and how malware evolution affects fuzzy hashing. Comparisons are made between the performance of different fuzzy hashing algorithms and the distinction between hashes at the file and class levels. Experiments with known malware family and analysis with over 4500 APK files, including 100 benign samples collected from 2012 - 2022 were conducted using various fuzzy hashing algorithms, file-level and section-level similarity hashing, symbolic and raw opcode hashing, and optimisations for improving fuzzy hashing comparisons. The performance of the methods was evaluated using detection and false positive rates. The results show that fuzzy hashing algorithms remain a valuable technique that demonstrates robustness to malware evolution with 10-year detection rates of over 80%.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301770"},"PeriodicalIF":2.0,"publicationDate":"2024-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724000891/pdfft?md5=45e25e15294ae9f8fbf35e580e62dc65&pid=1-s2.0-S2666281724000891-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140914299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrigendum to “So fresh, so clean: Cloud forensic analysis of the Amazon iRobot Roomba vacuum” [FSIDI 48 (2024) 301686] 对 "如此清新,如此干净:亚马逊 iRobot Roomba 真空吸尘器的云取证分析" [FSIDI 48 (2024) 301686] 的更正
IF 2 4区 医学 Pub Date : 2024-05-04 DOI: 10.1016/j.fsidi.2024.301767
Abdur Rahman Onik , Ruba Alsmadi , Ibrahim Baggili , Andrew M. Webb
{"title":"Corrigendum to “So fresh, so clean: Cloud forensic analysis of the Amazon iRobot Roomba vacuum” [FSIDI 48 (2024) 301686]","authors":"Abdur Rahman Onik ,&nbsp;Ruba Alsmadi ,&nbsp;Ibrahim Baggili ,&nbsp;Andrew M. Webb","doi":"10.1016/j.fsidi.2024.301767","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301767","url":null,"abstract":"","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301767"},"PeriodicalIF":2.0,"publicationDate":"2024-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724000866/pdfft?md5=4389f3bbd4e3f9fb7e00cb6c288ed76a&pid=1-s2.0-S2666281724000866-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140825106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automotive digital forensics through data and log analysis of vehicle diagnosis Android apps 通过对车辆诊断 Android 应用程序的数据和日志分析进行汽车数字取证
IF 2 4区 医学 Pub Date : 2024-05-03 DOI: 10.1016/j.fsidi.2024.301752
Jiheon Jung , Sangchul Han , Minkyu Park , Seong-je Cho

Modern vehicles including smart cars have been equipped with many electronic devices such as electronic control units (ECUs), on-board diagnostics (OBD) systems, telematics and infotainment systems, gateways, sensors, etc. Because these devices create, transmit, and store a lot of digital data, modern vehicles are becoming key source of digital evidence in vehicular forensics. In addition, some dedicated mobile apps can capture driving and diagnostic data from a vehicle via a Bluetooth-enabled OBD-II scanner. In this paper, we propose a new process for effective automotive forensics. It collects and analyzes three different types of data left on an Android phone which has been connected to the OBD-II port of a vehicle via Bluetooth communication. The three types of data are OBD-II Android apps' data, Bluetooth HCI snoop log, and the main log buffer of the Android logging system. By analyzing them individually and integratedly, we find Bluetooth connection time, vehicle information, MAC address of the OBD-II scanner, vehicle velocity, sharp speeding event, sudden braking event, refueling event, and so on. We also construct a timeline of Bluetooth traffic and driving events through the timeline analysis, which can be used to determine the driver's behaviors in terms of vehicle forensics.

包括智能汽车在内的现代汽车配备了许多电子设备,如电子控制单元 (ECU)、车载诊断 (OBD) 系统、远程信息处理和信息娱乐系统、网关、传感器等。由于这些设备创建、传输和存储了大量数字数据,现代车辆正成为车辆取证中数字证据的关键来源。此外,一些专用移动应用程序可以通过支持蓝牙的 OBD-II 扫描仪获取车辆的驾驶和诊断数据。在本文中,我们提出了一种有效的汽车取证新流程。它收集并分析通过蓝牙通信连接到车辆 OBD-II 端口的安卓手机上留下的三种不同类型的数据。这三类数据分别是 OBD-II 安卓应用程序数据、蓝牙人机交互窥探日志和安卓日志系统的主日志缓冲区。通过对它们进行单独分析和综合分析,我们可以发现蓝牙连接时间、车辆信息、OBD-II 扫描仪的 MAC 地址、车辆速度、急加速事件、急刹车事件、加油事件等。我们还通过时间轴分析构建了蓝牙流量和驾驶事件的时间轴,可用于在车辆取证方面确定驾驶员的行为。
{"title":"Automotive digital forensics through data and log analysis of vehicle diagnosis Android apps","authors":"Jiheon Jung ,&nbsp;Sangchul Han ,&nbsp;Minkyu Park ,&nbsp;Seong-je Cho","doi":"10.1016/j.fsidi.2024.301752","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301752","url":null,"abstract":"<div><p>Modern vehicles including smart cars have been equipped with many electronic devices such as electronic control units (ECUs), on-board diagnostics (OBD) systems, telematics and infotainment systems, gateways, sensors, etc. Because these devices create, transmit, and store a lot of digital data, modern vehicles are becoming key source of digital evidence in vehicular forensics. In addition, some dedicated mobile apps can capture driving and diagnostic data from a vehicle via a Bluetooth-enabled OBD-II scanner. In this paper, we propose a new process for effective automotive forensics. It collects and analyzes three different types of data left on an Android phone which has been connected to the OBD-II port of a vehicle via Bluetooth communication. The three types of data are OBD-II Android apps' data, Bluetooth HCI snoop log, and the <em>main</em> log buffer of the Android logging system. By analyzing them individually and integratedly, we find Bluetooth connection time, vehicle information, MAC address of the OBD-II scanner, vehicle velocity, sharp speeding event, sudden braking event, refueling event, and so on. We also construct a timeline of Bluetooth traffic and driving events through the timeline analysis, which can be used to determine the driver's behaviors in terms of vehicle forensics.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301752"},"PeriodicalIF":2.0,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140823486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid artificial intelligence framework for enhancing digital forensic investigations of infotainment systems 加强信息娱乐系统数字取证调查的混合人工智能框架
IF 2 4区 医学 Pub Date : 2024-04-29 DOI: 10.1016/j.fsidi.2024.301751
Yasamin Fayyaz , Abdulaziz Almehmadi , Khalil El-Khatib

Infotainment systems in vehicles have become important sources of digital evidence in forensic investigations. Analyzing data from these systems can provide valuable insights into a suspect's activities and interactions. In this paper, we propose a hybrid artificial intelligence (AI) framework that combines unsupervised learning using K-means clustering and language model analysis to enhance the forensic analysis process. The proposed methodology was applied to two distinct datasets from Hyundai and Mitsubishi infotainment systems. In the Hyundai dataset, the recall for contact names and phone numbers improved by 18% and 3% respectively when compared to clustering alone. Similarly, in the Mitsubishi dataset, the recall of song names improved by 2%. In addition, this hybrid approach enabled the discovery of more forms of forensically-relevant data stored in the infotainment systems, such as geographical locations and connected devices, that would have been infeasible to find with either manual analysis or clustering alone. Despite the presence of some hallucinations, the combination of these techniques resulted in improved ease of analysis and increased recall, demonstrating the potential of this hybrid approach in forensic investigations.

车载信息娱乐系统已成为法证调查中重要的数字证据来源。分析这些系统中的数据可以为了解嫌疑人的活动和互动提供有价值的信息。在本文中,我们提出了一种混合人工智能(AI)框架,将使用 K 均值聚类的无监督学习与语言模型分析相结合,以增强法证分析过程。我们将所提出的方法应用于现代汽车和三菱汽车信息娱乐系统的两个不同数据集。在现代汽车数据集中,与单独聚类相比,联系人姓名和电话号码的召回率分别提高了 18% 和 3%。同样,在三菱数据集中,歌曲名称的召回率提高了 2%。此外,这种混合方法还能发现信息娱乐系统中存储的更多形式的法证相关数据,如地理位置和连接设备,而这些数据仅靠人工分析或聚类是无法发现的。尽管存在一些幻觉,但这些技术的结合提高了分析的便利性,增加了召回率,显示了这种混合方法在法医调查中的潜力。
{"title":"A hybrid artificial intelligence framework for enhancing digital forensic investigations of infotainment systems","authors":"Yasamin Fayyaz ,&nbsp;Abdulaziz Almehmadi ,&nbsp;Khalil El-Khatib","doi":"10.1016/j.fsidi.2024.301751","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301751","url":null,"abstract":"<div><p>Infotainment systems in vehicles have become important sources of digital evidence in forensic investigations. Analyzing data from these systems can provide valuable insights into a suspect's activities and interactions. In this paper, we propose a hybrid artificial intelligence (AI) framework that combines unsupervised learning using K-means clustering and language model analysis to enhance the forensic analysis process. The proposed methodology was applied to two distinct datasets from Hyundai and Mitsubishi infotainment systems. In the Hyundai dataset, the recall for contact names and phone numbers improved by 18% and 3% respectively when compared to clustering alone. Similarly, in the Mitsubishi dataset, the recall of song names improved by 2%. In addition, this hybrid approach enabled the discovery of more forms of forensically-relevant data stored in the infotainment systems, such as geographical locations and connected devices, that would have been infeasible to find with either manual analysis or clustering alone. Despite the presence of some hallucinations, the combination of these techniques resulted in improved ease of analysis and increased recall, demonstrating the potential of this hybrid approach in forensic investigations.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301751"},"PeriodicalIF":2.0,"publicationDate":"2024-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140807450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the inadequacy of open-source application logs for digital forensics 论开源应用程序日志在数字取证方面的不足
IF 2 4区 医学 Pub Date : 2024-04-25 DOI: 10.1016/j.fsidi.2024.301750
Afiqah Azahari, Davide Balzarotti

This study explores the challenges with utilizing application logs for incident response or forensic analysis. Application logs have the potential to significantly enhance security analysis as sometimes they provide information regarding user actions, error messages, and performance metrics of the application. Although these logs can offer vital information about user activities, errors, and application performance, their use for security needs better understanding. We looked at the current logging implementation of 60 open-source applications. We checked the logs to see if they could help with five key security tasks: making timelines, linking events, separating different actions, spotting misuse, and detecting attacks. By examining source code, extracting log statements, and evaluating them for security relevance, we found many logs lacked essential elements. Specifically, 29 applications omitted timestamps, crucial for identifying the timing of actions. Furthermore, logs frequently missed unique identifiers (UIDs) for event correlation, with 23 not noting UIDs for new activities. Inconsistent logging of user activities and an absence of logs detailing successful attacks indicate current application logs need significant enhancements to be effective for security checks. The findings of our research suggest that current application logs are inadequately equipped for in-depth security analysis. Enhancements are imperative for their optimal utility. This investigation underscores the inherent challenges in leveraging logs for security and emphasizes the pressing need for refining logging methodologies.

本研究探讨了利用应用程序日志进行事件响应或取证分析所面临的挑战。应用程序日志有可能大大加强安全分析,因为它们有时会提供有关用户操作、错误信息和应用程序性能指标的信息。虽然这些日志可以提供有关用户活动、错误和应用程序性能的重要信息,但需要更好地了解它们在安全方面的用途。我们研究了 60 个开源应用程序当前的日志实施情况。我们检查了日志,看它们是否有助于完成五项关键的安全任务:制作时间轴、链接事件、区分不同的操作、发现误用和检测攻击。通过检查源代码、提取日志语句并评估其安全相关性,我们发现许多日志都缺少基本要素。具体来说,29 个应用程序遗漏了时间戳,而时间戳对于确定操作时间至关重要。此外,日志还经常遗漏用于事件关联的唯一标识符(UID),其中有 23 个日志没有记录新活动的 UID。不一致的用户活动日志和缺乏详细记录成功攻击的日志表明,当前的应用程序日志需要大幅改进才能有效地进行安全检查。我们的研究结果表明,当前的应用程序日志不足以进行深入的安全分析。为了使其发挥最大效用,必须对其进行改进。这项调查凸显了利用日志进行安全检查的内在挑战,并强调了改进日志记录方法的迫切需要。
{"title":"On the inadequacy of open-source application logs for digital forensics","authors":"Afiqah Azahari,&nbsp;Davide Balzarotti","doi":"10.1016/j.fsidi.2024.301750","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301750","url":null,"abstract":"<div><p>This study explores the challenges with utilizing application logs for incident response or forensic analysis. Application logs have the potential to significantly enhance security analysis as sometimes they provide information regarding user actions, error messages, and performance metrics of the application. Although these logs can offer vital information about user activities, errors, and application performance, their use for security needs better understanding. We looked at the current logging implementation of 60 open-source applications. We checked the logs to see if they could help with five key security tasks: making timelines, linking events, separating different actions, spotting misuse, and detecting attacks. By examining source code, extracting log statements, and evaluating them for security relevance, we found many logs lacked essential elements. Specifically, 29 applications omitted timestamps, crucial for identifying the timing of actions. Furthermore, logs frequently missed unique identifiers (UIDs) for event correlation, with 23 not noting UIDs for new activities. Inconsistent logging of user activities and an absence of logs detailing successful attacks indicate current application logs need significant enhancements to be effective for security checks. The findings of our research suggest that current application logs are inadequately equipped for in-depth security analysis. Enhancements are imperative for their optimal utility. This investigation underscores the inherent challenges in leveraging logs for security and emphasizes the pressing need for refining logging methodologies.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301750"},"PeriodicalIF":2.0,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140644366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A dual descriptor combined with frequency domain reconstruction learning for face forgery detection in deepfake videos 结合频域重构学习的双描述符,用于深度伪造视频中的人脸伪造检测
IF 2 4区 医学 Pub Date : 2024-04-18 DOI: 10.1016/j.fsidi.2024.301747
Xin Jin , Nan Wu , Qian Jiang , Yuru Kou , Hanxian Duan , Puming Wang , Shaowen Yao

Conventional face forgery detectors have primarily relied on image artifacts produced by deepfake video generation models. These methods have performed well when the training and test sets were derived from the same deepfake algorithm, but accuracy and generalizability remain a challenge for diverse datasets. In this study, both supervised and unsupervised approaches are proposed for more accurate detection in in-domain and cross-domain experiments. Specifically, two descriptors are introduced to extract rich information in the spatial domain to achieve higher accuracy. A frequency domain reconstruction module is then included to expand the representation space for facial features. A reconstruction method based on an auto-encoder was also applied to obtain a frequency domain coding vector. In this process, reconstruction learning was sufficient for extracting unknown information, while a combination with classification learning provided essential high-frequency pixel differences between real and fake samples, thus facilitating forgery identification. A series of validation experiments with large-scale benchmark datasets demonstrated that the proposed technique was superior to existing methods.

传统的人脸伪造检测器主要依赖于深度伪造视频生成模型产生的图像伪影。当训练集和测试集来自相同的深度伪造算法时,这些方法表现良好,但对于不同的数据集,准确性和通用性仍是一个挑战。本研究提出了有监督和无监督两种方法,以便在域内和跨域实验中进行更精确的检测。具体来说,我们引入了两个描述符来提取空间域中的丰富信息,以达到更高的准确性。然后加入频域重建模块,以扩展面部特征的表示空间。此外,还应用了一种基于自动编码器的重构方法,以获得频域编码向量。在这一过程中,重构学习足以提取未知信息,而与分类学习相结合则提供了真假样本之间必不可少的高频像素差异,从而促进了伪造识别。利用大规模基准数据集进行的一系列验证实验表明,所提出的技术优于现有方法。
{"title":"A dual descriptor combined with frequency domain reconstruction learning for face forgery detection in deepfake videos","authors":"Xin Jin ,&nbsp;Nan Wu ,&nbsp;Qian Jiang ,&nbsp;Yuru Kou ,&nbsp;Hanxian Duan ,&nbsp;Puming Wang ,&nbsp;Shaowen Yao","doi":"10.1016/j.fsidi.2024.301747","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301747","url":null,"abstract":"<div><p>Conventional face forgery detectors have primarily relied on image artifacts produced by deepfake video generation models. These methods have performed well when the training and test sets were derived from the same deepfake algorithm, but accuracy and generalizability remain a challenge for diverse datasets. In this study, both supervised and unsupervised approaches are proposed for more accurate detection in in-domain and cross-domain experiments. Specifically, two descriptors are introduced to extract rich information in the spatial domain to achieve higher accuracy. A frequency domain reconstruction module is then included to expand the representation space for facial features. A reconstruction method based on an auto-encoder was also applied to obtain a frequency domain coding vector. In this process, reconstruction learning was sufficient for extracting unknown information, while a combination with classification learning provided essential high-frequency pixel differences between real and fake samples, thus facilitating forgery identification. A series of validation experiments with large-scale benchmark datasets demonstrated that the proposed technique was superior to existing methods.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301747"},"PeriodicalIF":2.0,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140605627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative study of IoT forensic frameworks 物联网取证框架比较研究
IF 2 4区 医学 Pub Date : 2024-04-04 DOI: 10.1016/j.fsidi.2024.301748
Haroon Mahmood , Maliha Arshad , Irfan Ahmed , Sana Fatima , Hafeez ur Rehman

Internet of Things (IoT) systems often consist of heterogeneous, resource-constrained devices that generate massive amounts of data. This data is important for assessments, behaviour analysis, and decision-making. However, IoT devices are also susceptible to cyber-attacks, such as information theft, personal device intervention, and privacy invasion. In case of an incident, these devices are subject to digital forensic investigation to identify and analyze crimes and misuse. Over the years, several forensic frameworks and techniques have been proposed to facilitate the investigation of IoT networks and devices, but finding a perfect solution that covers the diversity of IoT devices and networks is still a research challenge.

In this study, we present a comparative analysis of existing forensic investigation frameworks and identify their strengths and weaknesses in handling forensic challenges of IoT devices. The study uses evaluation metrics of ten important parameters, including heterogeneity, scalability, and chain of custody, to thoroughly audit the effectiveness of these models. Our analysis concludes that the existing investigation frameworks do not cater to all requirements and aspects of IoT forensics. It further highlights the need for standard mechanisms to acquire and analyze digital artifacts in IoT devices.

物联网(IoT)系统通常由异构、资源受限的设备组成,这些设备会产生海量数据。这些数据对于评估、行为分析和决策非常重要。然而,物联网设备也容易受到网络攻击,如信息窃取、个人设备干预和隐私侵犯。在发生事故时,这些设备需要接受数字取证调查,以识别和分析犯罪行为和滥用行为。在本研究中,我们对现有的取证调查框架进行了比较分析,并找出了它们在应对物联网设备取证挑战方面的优缺点。研究采用了十个重要参数的评估指标,包括异构性、可扩展性和监管链,以全面审核这些模型的有效性。我们的分析得出结论,现有的调查框架无法满足物联网取证的所有要求和方面。它进一步强调了对标准机制的需求,以获取和分析物联网设备中的数字工件。
{"title":"Comparative study of IoT forensic frameworks","authors":"Haroon Mahmood ,&nbsp;Maliha Arshad ,&nbsp;Irfan Ahmed ,&nbsp;Sana Fatima ,&nbsp;Hafeez ur Rehman","doi":"10.1016/j.fsidi.2024.301748","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301748","url":null,"abstract":"<div><p>Internet of Things (IoT) systems often consist of heterogeneous, resource-constrained devices that generate massive amounts of data. This data is important for assessments, behaviour analysis, and decision-making. However, IoT devices are also susceptible to cyber-attacks, such as information theft, personal device intervention, and privacy invasion. In case of an incident, these devices are subject to digital forensic investigation to identify and analyze crimes and misuse. Over the years, several forensic frameworks and techniques have been proposed to facilitate the investigation of IoT networks and devices, but finding a perfect solution that covers the diversity of IoT devices and networks is still a research challenge.</p><p>In this study, we present a comparative analysis of existing forensic investigation frameworks and identify their strengths and weaknesses in handling forensic challenges of IoT devices. The study uses evaluation metrics of ten important parameters, including heterogeneity, scalability, and chain of custody, to thoroughly audit the effectiveness of these models. Our analysis concludes that the existing investigation frameworks do not cater to all requirements and aspects of IoT forensics. It further highlights the need for standard mechanisms to acquire and analyze digital artifacts in IoT devices.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301748"},"PeriodicalIF":2.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140346838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Letter to editor regarding article, “digital forensics in healthcare: An analysis of data associated with a CPAP machine” 致编辑的信,内容涉及 "医疗保健领域的数字取证:CPAP机相关数据分析"
IF 2 4区 医学 Pub Date : 2024-03-29 DOI: 10.1016/j.fsidi.2024.301749
Nishchal Soni, Chitra Barotia
{"title":"Letter to editor regarding article, “digital forensics in healthcare: An analysis of data associated with a CPAP machine”","authors":"Nishchal Soni,&nbsp;Chitra Barotia","doi":"10.1016/j.fsidi.2024.301749","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301749","url":null,"abstract":"","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301749"},"PeriodicalIF":2.0,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140328041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial intelligence in mobile forensics: A survey of current status, a use case analysis and AI alignment objectives 移动取证中的人工智能:现状调查、用例分析和人工智能调整目标
IF 2 4区 医学 Pub Date : 2024-03-22 DOI: 10.1016/j.fsidi.2024.301737
Alexandros Vasilaras , Nikolaos Papadoudis , Panagiotis Rizomiliotis

As the capabilities and utility of Artificial Intelligence and Machine Learning systems continue to improve, they are expected to have an increasingly powerful influence in the digital forensic investigation process. The concurrent proliferation of mobile devices and rapid increase of forensic value of related artifacts creates the requirement for a comprehensive review of the current status of artificial intelligence software usage and usefulness in Mobile Forensics. In this context, we conducted a survey to evaluate the characteristics and properties of AI functions in mobile forensic software from the practitioners' perspective and enhance understanding to the work in the field. In this study, we evaluated the performance of image categorization software in digital forensics using a variety of evaluation metrics including accuracy, precision, recall, and F1-score, as well as the confusion matrix. In this research we also identify and integrate theoretical principles to conceptualize an AI Alignment framework pertaining to Mobile Forensics and Digital Forensics in general, in order to accurately determine specific AI strategy objectives and potential solutions to the current technical and administrative landscape. We emphasized the importance of interpretability and transparency in AI systems and the need for a comprehensive approach to understanding the reasoning behind the software's decisions. Additionally, we highlighted the importance of robustness in image categorization software, as well as the consideration of AI governance and standardized procedures concepts. Our results show that the accuracy and robustness of the image categorization software have a significant impact on the outcome of legal cases and that the software should be designed with interpretability, transparency, and robustness in mind. Through the examination of the survey responses, the evaluation of the image categorization software and research literature, we explore existing and potential approaches to aligned Artificial Intelligence and analyze their contribution to the forensic examination of cases.

随着人工智能和机器学习系统的能力和实用性不断提高,预计它们将在数字取证调查过程中产生越来越强大的影响。同时,移动设备的激增和相关人工制品取证价值的快速增长,要求对人工智能软件在移动取证中的使用和实用性现状进行全面审查。在此背景下,我们开展了一项调查,从从业人员的角度评估移动取证软件中人工智能功能的特点和属性,加深对该领域工作的理解。在这项研究中,我们使用准确率、精确度、召回率和 F1 分数以及混淆矩阵等多种评价指标评估了数字取证中图像分类软件的性能。在这项研究中,我们还确定并整合了理论原则,构思了与移动取证和一般数字取证相关的人工智能对齐框架,以准确确定具体的人工智能战略目标和当前技术与管理环境下的潜在解决方案。我们强调了人工智能系统可解释性和透明度的重要性,并强调需要采用综合方法来理解软件决策背后的推理。此外,我们还强调了图像分类软件稳健性的重要性,以及对人工智能管理和标准化程序概念的考虑。我们的研究结果表明,图像分类软件的准确性和稳健性对法律案件的结果有重大影响,软件的设计应考虑到可解释性、透明度和稳健性。通过对调查反馈、图像分类软件评估和研究文献的研究,我们探索了现有和潜在的人工智能调整方法,并分析了它们对案件法证检验的贡献。
{"title":"Artificial intelligence in mobile forensics: A survey of current status, a use case analysis and AI alignment objectives","authors":"Alexandros Vasilaras ,&nbsp;Nikolaos Papadoudis ,&nbsp;Panagiotis Rizomiliotis","doi":"10.1016/j.fsidi.2024.301737","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301737","url":null,"abstract":"<div><p>As the capabilities and utility of Artificial Intelligence and Machine Learning systems continue to improve, they are expected to have an increasingly powerful influence in the digital forensic investigation process. The concurrent proliferation of mobile devices and rapid increase of forensic value of related artifacts creates the requirement for a comprehensive review of the current status of artificial intelligence software usage and usefulness in Mobile Forensics. In this context, we conducted a survey to evaluate the characteristics and properties of AI functions in mobile forensic software from the practitioners' perspective and enhance understanding to the work in the field. In this study, we evaluated the performance of image categorization software in digital forensics using a variety of evaluation metrics including accuracy, precision, recall, and F1-score, as well as the confusion matrix. In this research we also identify and integrate theoretical principles to conceptualize an AI Alignment framework pertaining to Mobile Forensics and Digital Forensics in general, in order to accurately determine specific AI strategy objectives and potential solutions to the current technical and administrative landscape. We emphasized the importance of interpretability and transparency in AI systems and the need for a comprehensive approach to understanding the reasoning behind the software's decisions. Additionally, we highlighted the importance of robustness in image categorization software, as well as the consideration of AI governance and standardized procedures concepts. Our results show that the accuracy and robustness of the image categorization software have a significant impact on the outcome of legal cases and that the software should be designed with interpretability, transparency, and robustness in mind. Through the examination of the survey responses, the evaluation of the image categorization software and research literature, we explore existing and potential approaches to aligned Artificial Intelligence and analyze their contribution to the forensic examination of cases.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301737"},"PeriodicalIF":2.0,"publicationDate":"2024-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140187930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video source camera identification using fusion of texture features and noise fingerprint 利用纹理特征和噪声指纹融合技术识别视频源摄像头
IF 2 4区 医学 Pub Date : 2024-03-18 DOI: 10.1016/j.fsidi.2024.301746
Tigga Anmol, K. Sitara

In Video forensics, the objective of Source Camera Identification (SCI) is to identify and verify the origin of a video that is under investigation. This aids the investigator to trace the video to its owner or narrow down the search space for identifying the offender. Nowadays, it is easy to record and share videos via internet or social media with smartphones. The availability of sophisticated video editing tools and software allow offenders to modify video's context. Thus, identifying the right source camera that was used to capture the video becomes complicated and strenuous. Existing methods based on video metadata information are no longer reliable as it could be modified or stripped off. Better forensic procedures are therefore required to prove the authenticity and integrity of the video that will be used as evidence in court of law. Certain inherent camera sensor properties such as, subtle traces of Photo Response Non-Uniformity (PRNU) are present in all captured videos due to unnoticeable defect during the manufacture of camera's sensor. These properties are used in SCI to classify devices or models as they are unique. In this work, we focus on SCI from videos or Video Source Camera Identification (VSCI) to verify the authenticity of videos. PRNU can be affected by highly textured content or post-processing when computed from a set of flat field images. To mitigate these effects, Higher Order Wavelet Statistics (HOWS) information from PRNU of a video I-frame is combined with information from two other texture features i.e., Local Binary Pattern (LBP) and Gray Level Co-occurrence Matrix (GLCM). The extracted feature vector is fused via concatenation and fed to Support Vector Machine (SVM) classifier to perform training and testing for VSCI. Experimental evaluation of our proposed method on videos from different publicly available datasets show the effectiveness of our method in terms of accuracy, resource efficiency, and complexity.

在视频取证中,源相机识别 (SCI) 的目的是识别和验证正在调查的视频的来源。这有助于调查人员将视频追踪到其所有者,或缩小搜索空间以识别罪犯。如今,使用智能手机通过互联网或社交媒体录制和分享视频非常方便。先进的视频编辑工具和软件使犯罪者可以修改视频内容。因此,识别用于捕捉视频的正确源相机变得复杂而艰难。基于视频元数据信息的现有方法不再可靠,因为这些信息可能被修改或删除。因此,需要更好的取证程序来证明将作为法庭证据的视频的真实性和完整性。由于相机传感器在制造过程中存在不易察觉的缺陷,因此所有捕获的视频中都存在某些固有的相机传感器属性,如微妙的照片响应不均匀性(PRNU)痕迹。在 SCI 中,这些特性被用于对设备或模型进行分类,因为它们是独一无二的。在这项工作中,我们将重点放在视频的 SCI 或视频源相机识别(VSCI)上,以验证视频的真实性。当从一组平场图像计算时,PRNU 会受到高纹理内容或后处理的影响。为了减轻这些影响,视频 I 帧 PRNU 的高阶小波统计(HOWS)信息与其他两个纹理特征(即局部二进制模式(LBP)和灰度共现矩阵(GLCM))的信息相结合。提取的特征向量通过连接进行融合,并输入支持向量机(SVM)分类器,以执行 VSCI 的训练和测试。在不同公开数据集的视频上对我们提出的方法进行的实验评估表明,我们的方法在准确性、资源效率和复杂性方面都很有效。
{"title":"Video source camera identification using fusion of texture features and noise fingerprint","authors":"Tigga Anmol,&nbsp;K. Sitara","doi":"10.1016/j.fsidi.2024.301746","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301746","url":null,"abstract":"<div><p>In Video forensics, the objective of Source Camera Identification (SCI) is to identify and verify the origin of a video that is under investigation. This aids the investigator to trace the video to its owner or narrow down the search space for identifying the offender. Nowadays, it is easy to record and share videos via internet or social media with smartphones. The availability of sophisticated video editing tools and software allow offenders to modify video's context. Thus, identifying the right source camera that was used to capture the video becomes complicated and strenuous. Existing methods based on video metadata information are no longer reliable as it could be modified or stripped off. Better forensic procedures are therefore required to prove the authenticity and integrity of the video that will be used as evidence in court of law. Certain inherent camera sensor properties such as, subtle traces of Photo Response Non-Uniformity (PRNU) are present in all captured videos due to unnoticeable defect during the manufacture of camera's sensor. These properties are used in SCI to classify devices or models as they are unique. In this work, we focus on SCI from videos or Video Source Camera Identification (VSCI) to verify the authenticity of videos. PRNU can be affected by highly textured content or post-processing when computed from a set of flat field images. To mitigate these effects, Higher Order Wavelet Statistics (HOWS) information from PRNU of a video I-frame is combined with information from two other texture features i.e., Local Binary Pattern (LBP) and Gray Level Co-occurrence Matrix (GLCM). The extracted feature vector is fused via concatenation and fed to Support Vector Machine (SVM) classifier to perform training and testing for VSCI. Experimental evaluation of our proposed method on videos from different publicly available datasets show the effectiveness of our method in terms of accuracy, resource efficiency, and complexity.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301746"},"PeriodicalIF":2.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140159952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Forensic Science International-Digital Investigation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1