首页 > 最新文献

Forensic Science International-Digital Investigation最新文献

英文 中文
Letter to editor regarding article, “The effects of document's format, size, and storage media on memory forensics” 就文章 "文件格式、大小和存储介质对内存取证的影响 "致编辑的信
IF 2 4区 医学 Pub Date : 2024-03-14 DOI: 10.1016/j.fsidi.2024.301745
Nishchal Soni
{"title":"Letter to editor regarding article, “The effects of document's format, size, and storage media on memory forensics”","authors":"Nishchal Soni","doi":"10.1016/j.fsidi.2024.301745","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301745","url":null,"abstract":"","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301745"},"PeriodicalIF":2.0,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140122260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECo-Bag: An elastic container based on merkle tree as a universal digital evidence bag 电子证据袋:基于梅克尔树的弹性容器,作为通用数字证据袋
IF 2 4区 医学 Pub Date : 2024-03-13 DOI: 10.1016/j.fsidi.2024.301725
Jaehyeok Han , Mee Lan Han , Sangjin Lee , Jungheum Park

Unique traits generated automatically or artificially, such as firewall logs, OS event logs, and various metadata, are well hidden in the digital evidence that cannot be easily perceived by the investigator in some cases. Digital data is invisible, and it is necessary that attention is focused on traditional management with integrity because of the involvement of various stakeholders in the secure preservation and analysis of the forensic process. Similar to file formats, digital evidence bags (DEB), such as E01 and L01, are widely used to contain digital data for certain facilities in a raw format, which also include metadata. The DEB can provide a way to obtain data through selective imaging, extracting and collecting only the parts necessary from the extensive data for proof. However, it cannot flexibly handle information obtained from large amounts of data or when sensitive data is involved or destroy superfluous materials that must be protected. Therefore, in this study, we propose a new container format based on the Merkle tree, which is used as a universal DEB. The proposed ECo-Bag can store physical and logical images from the storage medium, bit streams transmitted over networks, file segments in the cloud or distributed system, secondary outcomes, and metadata. Furthermore, it can support operations to destruct or seal the data initially collected while verifying the data integrity and tracking the provenance within the chain of custody. Thus, it is expected to contribute to the elastic management of addition and deletion of evidence in digital investigation and e-discovery.

自动或人为生成的独特特征,如防火墙日志、操作系统事件日志和各种元数据,都很好地隐藏在数字证据中,在某些情况下调查人员不易察觉。数字数据是不可见的,由于各利益相关方都参与了取证过程的安全保存和分析,因此有必要关注传统的完整性管理。与文件格式类似,数字证据包(DEB),如 E01 和 L01,被广泛用于包含某些设施的原始格式数字数据,其中还包括元数据。数字证据包可以提供一种通过选择性成像获取数据的方法,从大量数据中只提取和收集必要的部分作为证据。但是,它无法灵活处理从大量数据中获取的信息或涉及敏感数据时的信息,也无法销毁必须保护的多余材料。因此,在本研究中,我们提出了一种基于梅克尔树的新容器格式,并将其用作通用的 DEB。所提出的 ECo-Bag 可以存储来自存储介质的物理和逻辑图像、通过网络传输的比特流、云或分布式系统中的文件段、二次结果和元数据。此外,它还能支持销毁或封存最初收集的数据的操作,同时验证数据的完整性并跟踪监管链中的出处。因此,它有望为数字调查和电子取证中证据添加和删除的弹性管理做出贡献。
{"title":"ECo-Bag: An elastic container based on merkle tree as a universal digital evidence bag","authors":"Jaehyeok Han ,&nbsp;Mee Lan Han ,&nbsp;Sangjin Lee ,&nbsp;Jungheum Park","doi":"10.1016/j.fsidi.2024.301725","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301725","url":null,"abstract":"<div><p>Unique traits generated automatically or artificially, such as firewall logs, OS event logs, and various metadata, are well hidden in the digital evidence that cannot be easily perceived by the investigator in some cases. Digital data is invisible, and it is necessary that attention is focused on traditional management with integrity because of the involvement of various stakeholders in the secure preservation and analysis of the forensic process. Similar to file formats, digital evidence bags (DEB), such as E01 and L01, are widely used to contain digital data for certain facilities in a raw format, which also include metadata. The DEB can provide a way to obtain data through selective imaging, extracting and collecting only the parts necessary from the extensive data for proof. However, it cannot flexibly handle information obtained from large amounts of data or when sensitive data is involved or destroy superfluous materials that must be protected. Therefore, in this study, we propose a new container format based on the Merkle tree, which is used as a universal DEB. The proposed ECo-Bag can store physical and logical images from the storage medium, bit streams transmitted over networks, file segments in the cloud or distributed system, secondary outcomes, and metadata. Furthermore, it can support operations to destruct or seal the data initially collected while verifying the data integrity and tracking the provenance within the chain of custody. Thus, it is expected to contribute to the elastic management of addition and deletion of evidence in digital investigation and e-discovery.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301725"},"PeriodicalIF":2.0,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140122261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some areas where digital forensics can support the addressing of legal challenges linked to forensic genetic genealogy 数字取证可支持应对与法医遗传系谱有关的法律挑战的一些领域
IF 2 4区 医学 Pub Date : 2024-03-07 DOI: 10.1016/j.fsidi.2024.301696
Mònika Nogel

Forensic genetic genealogy (FGG), also known as investigative genetic genealogy (IGG), produces investigative leads in criminal cases where unidentified DNA is discovered at the crime scene and does not match any profiles in criminal databases. It works by comparing crime scene DNA samples to public or private genealogical databases to identify potential familial relationships and narrow down suspects or identify unknown individuals. Although the fields of FGG and digital forensics (DF) work with different types of evidence and techniques, and consequently develop independently, they share several common characteristics. This study aims to demonstrate that despite their independent development and differences, the experiences of progress in DF field can be utilized in some respects, especially concerning the protection of the rights of the individuals concerned. The aim of this article is to outline some areas where DF can provide assistance in dealing with ethical and social challenges that FGG must address.

法医遗传系谱学(FGG)又称调查遗传系谱学(IGG),在犯罪现场发现身份不明的 DNA 且与犯罪数据库中的任何资料不匹配的情况下,为刑事案件提供调查线索。其工作原理是将犯罪现场 DNA 样本与公共或私人家谱数据库进行比对,以确定潜在的家族关系,缩小嫌疑人范围或识别未知个人。虽然 FGG 和数字取证(DF)领域使用不同类型的证据和技术,因此各自独立发展,但它们有几个共同的特点。本研究旨在说明,尽管它们各自独立发展并存在差异,但数字取证领域的进步经验在某些方面是可以借鉴的,特别是在保护相关个人权利方面。本文的目的是概述 DF 可以在哪些领域提供帮助,以应对 FGG 必须应对的伦理和社会挑战。
{"title":"Some areas where digital forensics can support the addressing of legal challenges linked to forensic genetic genealogy","authors":"Mònika Nogel","doi":"10.1016/j.fsidi.2024.301696","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301696","url":null,"abstract":"<div><p>Forensic genetic genealogy (FGG), also known as investigative genetic genealogy (IGG), produces investigative leads in criminal cases where unidentified DNA is discovered at the crime scene and does not match any profiles in criminal databases. It works by comparing crime scene DNA samples to public or private genealogical databases to identify potential familial relationships and narrow down suspects or identify unknown individuals. Although the fields of FGG and digital forensics (DF) work with different types of evidence and techniques, and consequently develop independently, they share several common characteristics. This study aims to demonstrate that despite their independent development and differences, the experiences of progress in DF field can be utilized in some respects, especially concerning the protection of the rights of the individuals concerned. The aim of this article is to outline some areas where DF can provide assistance in dealing with ethical and social challenges that FGG must address.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301696"},"PeriodicalIF":2.0,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140052429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WARNE: A stalkerware evidence collection tool WARNE:跟踪软件证据收集工具
IF 2 4区 医学 Pub Date : 2024-03-01 DOI: 10.1016/j.fsidi.2023.301677
Philippe Mangeard, Bhaskar Tejaswi, Mohammad Mannan, Amr Youssef

Intimate partner violence (IPV) is a form of abuse in romantic relationships, more frequently, against the female partner. IPV can vary in severity and frequency, ranging from emotional abuse or stalking to recurring and severe violent episodes over a long period. Easy access to stalkerware apps helps foster such behaviors by allowing non-tech-savvy individuals to spy on their victims. These apps offer features for discreetly monitoring and remotely controlling compromised mobile devices, thereby infringing the victim's privacy and the security of their data. In this work, we investigate methods for gathering evidence about an abuser and the stalkerware they employ on a victim's device. We develop a semi-automated tool intended for use by investigators, helping them to analyze Android phones for potential threats in cases of IPV stalkerware. As a first step towards this goal, we perform an experimental privacy and security study to investigate currently available stalkerware apps. We specifically study the vectors through which vulnerabilities found in stalkerware apps could be exploited by investigators, allowing them to gather information about the IPV services, IPV abusers, and the victims' stolen data. We then design and implement a tool called WARNE, leveraging the identified flaws to facilitate the information and evidence collection process. In our experiments, we identified 50 unique stalkerware apps and their corresponding download websites that are still reachable, including one available on the Google Play Store. Among these apps, we found 30 that were free or offered a free trial. We enumerated and experimentally verified several invasive capabilities offered by these apps to clearly identify the severe privacy risks posed by them. We also found that most stalkerware apps store private information locally on the compromised device, potentially giving away information about the abuser. Our evidence-gathering tool found data related to the abuser and/or the stalkerware company, such as account credentials, dashboard URLs, and API tokens in 20 apps out of 30 tested apps. We hope our tool will help IPV victims and investigators against the growing threat of stalkerware abuse.

亲密伴侣暴力(IPV)是恋爱关系中的一种虐待形式,更常见的是对女性伴侣的虐待。IPV 的严重程度和频率各不相同,从情感虐待或跟踪到长期反复发生的严重暴力事件。跟踪软件应用程序很容易获取,允许不懂技术的人监视受害者,从而助长了这种行为。这些应用程序提供了隐蔽监控和远程控制受损移动设备的功能,从而侵犯了受害者的隐私和数据安全。在这项工作中,我们研究了收集有关施暴者及其在受害者设备上使用的跟踪软件的证据的方法。我们开发了一种供调查人员使用的半自动化工具,帮助他们分析安卓手机在 IPV 跟踪软件案件中的潜在威胁。作为实现这一目标的第一步,我们进行了一项隐私和安全实验研究,以调查目前可用的跟踪软件应用程序。我们特别研究了跟踪软件应用程序中发现的漏洞可被调查人员利用的途径,使他们能够收集有关 IPV 服务、IPV 施暴者和受害者被盗数据的信息。然后,我们设计并实施了一款名为 WARNE 的工具,利用已发现的漏洞促进信息和证据收集过程。在我们的实验中,我们发现了 50 个独特的跟踪软件应用程序及其相应的下载网站,其中包括一个可在 Google Play 商店下载的网站。在这些应用程序中,我们发现了 30 个免费或提供免费试用的应用程序。我们列举并通过实验验证了这些应用程序提供的几种入侵功能,以清楚地识别它们带来的严重隐私风险。我们还发现,大多数跟踪软件都会在受损设备上本地存储私人信息,从而有可能泄露施暴者的信息。我们的证据收集工具在 30 个测试应用程序中的 20 个应用程序中发现了与施暴者和/或跟踪软件公司相关的数据,如帐户凭据、仪表板 URL 和 API 标记。我们希望我们的工具能够帮助 IPV 受害者和调查人员应对日益严重的跟踪软件侵权威胁。
{"title":"WARNE: A stalkerware evidence collection tool","authors":"Philippe Mangeard,&nbsp;Bhaskar Tejaswi,&nbsp;Mohammad Mannan,&nbsp;Amr Youssef","doi":"10.1016/j.fsidi.2023.301677","DOIUrl":"https://doi.org/10.1016/j.fsidi.2023.301677","url":null,"abstract":"<div><p>Intimate partner violence (IPV) is a form of abuse in romantic relationships, more frequently, against the female partner. IPV can vary in severity and frequency, ranging from emotional abuse or stalking to recurring and severe violent episodes over a long period. Easy access to stalkerware apps helps foster such behaviors by allowing non-tech-savvy individuals to spy on their victims. These apps offer features for discreetly monitoring and remotely controlling compromised mobile devices, thereby infringing the victim's privacy and the security of their data. In this work, we investigate methods for gathering evidence about an abuser and the stalkerware they employ on a victim's device. We develop a semi-automated tool intended for use by investigators, helping them to analyze Android phones for potential threats in cases of IPV stalkerware. As a first step towards this goal, we perform an experimental privacy and security study to investigate currently available stalkerware apps. We specifically study the vectors through which vulnerabilities found in stalkerware apps could be exploited by investigators, allowing them to gather information about the IPV services, IPV abusers, and the victims' stolen data. We then design and implement a tool called <span>WARNE</span>, leveraging the identified flaws to facilitate the information and evidence collection process. In our experiments, we identified 50 unique stalkerware apps and their corresponding download websites that are still reachable, including one available on the Google Play Store. Among these apps, we found 30 that were free or offered a free trial. We enumerated and experimentally verified several invasive capabilities offered by these apps to clearly identify the severe privacy risks posed by them. We also found that most stalkerware apps store private information locally on the compromised device, potentially giving away information about the abuser. Our evidence-gathering tool found data related to the abuser and/or the stalkerware company, such as account credentials, dashboard URLs, and API tokens in 20 apps out of 30 tested apps. We hope our tool will help IPV victims and investigators against the growing threat of stalkerware abuse.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"48 ","pages":"Article 301677"},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281723001968/pdfft?md5=1b6f141e02aa6980d7dac8f91ca37e2d&pid=1-s2.0-S2666281723001968-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140134333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FAIRness in digital forensics datasets’ metadata – and how to improve it 数字取证数据集元数据的公平与公正性--以及如何加以改进
IF 2 4区 医学 Pub Date : 2024-03-01 DOI: 10.1016/j.fsidi.2023.301681
Samuele Mombelli , James R. Lyle , Frank Breitinger

The availability of research data (datasets) and compliance with FAIR principles—Findability, Accessibility, Interoperability, and Reusability—is critical to progressing digital forensics. This study evaluates metadata completeness and assesses the alignment with the FAIR principles using all 212 datasets from NIST's Computer Forensic Reference DataSet Portal (CFReDS). The findings underscore deficiencies in metadata quality and FAIR compliance, emphasizing the need for improved data management standards. Based on our critical review, we then propose and discuss various approaches to improve the status quo.

研究数据(数据集)的可用性以及与 FAIR 原则(可查找性、可访问性、互操作性和可重用性)的一致性对于数字取证的发展至关重要。本研究使用 NIST 计算机取证参考数据集门户网站 (CFReDS) 中的所有 212 个数据集评估元数据的完整性,并评估与 FAIR 原则的一致性。研究结果突出了元数据质量和 FAIR 合规性方面的不足,强调了改进数据管理标准的必要性。在严格审查的基础上,我们提出并讨论了改善现状的各种方法。
{"title":"FAIRness in digital forensics datasets’ metadata – and how to improve it","authors":"Samuele Mombelli ,&nbsp;James R. Lyle ,&nbsp;Frank Breitinger","doi":"10.1016/j.fsidi.2023.301681","DOIUrl":"https://doi.org/10.1016/j.fsidi.2023.301681","url":null,"abstract":"<div><p>The availability of research data (datasets) and compliance with FAIR principles—Findability, Accessibility, Interoperability, and Reusability—is critical to progressing digital forensics. This study evaluates metadata completeness and assesses the alignment with the FAIR principles using all 212 datasets from NIST's Computer Forensic Reference DataSet Portal (CFReDS). The findings underscore deficiencies in metadata quality and FAIR compliance, emphasizing the need for improved data management standards. Based on our critical review, we then propose and discuss various approaches to improve the status quo.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"48 ","pages":"Article 301681"},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281723002007/pdfft?md5=178027a9ec5ec54778a3d61f51e304b0&pid=1-s2.0-S2666281723002007-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140134335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring cross-device portability of electromagnetic side-channel analysis for digital forensics 确保用于数字取证的电磁侧信道分析的跨设备可移植性
IF 2 4区 医学 Pub Date : 2024-03-01 DOI: 10.1016/j.fsidi.2023.301684
Lojenaa Navanesan , Nhien-An Le-Khac , Mark Scanlon , Kasun De Zoysa , Asanka P. Sayakkara

Investigation on smart devices has become an essential subdomain in digital forensics. The inherent diversity and complexity of smart devices pose a challenge to the extraction of evidence without physically tampering with it, which is often a strict requirement in law enforcement and legal proceedings. Recently, this has led to the application of non-intrusive Electromagnetic Side-Channel Analysis (EM-SCA) as an emerging approach to extract forensic insights from smart devices. EM-SCA for digital forensics is still in its infancy, and has only been tested on a small number of devices so far. Most importantly, the question still remains whether Machine Learning (ML) models in EM-SCA are portable across multiple devices to be useful in digital forensics, i.e., cross-device portability. This study experimentally explores this aspect of EM-SCA using a wide set of smart devices. The experiments using various iPhones and Nordic Semiconductor nRF52-DK devices indicate that the direct application of pre-trained ML models across multiple identical devices does not yield optimal outcomes (under 20 % accuracy in most cases). Subsequent experiments included collecting distinct samples of EM traces from all the devices to train new ML models with mixed device data; this also fell short of expectations (still below 20 % accuracy). This prompted the adoption of transfer learning techniques, which showed promise for cross-model implementations. In particular, for the iPhone 13 and nRF52-DK devices, applying transfer learning techniques resulted in achieving the highest accuracy, with accuracy scores of 98 % and 96 %, respectively. This result makes a significant advancement in the application of EM-SCA to digital forensics by enabling the use of pre-trained models across identical or similar devices.

对智能设备的调查已成为数字取证的一个重要子领域。智能设备固有的多样性和复杂性给在不对其进行物理篡改的情况下提取证据带来了挑战,而这往往是执法和法律程序的严格要求。最近,非侵入式电磁侧信道分析(EM-SCA)作为一种新兴方法被应用于从智能设备中提取取证信息。用于数字取证的 EM-SCA 仍处于起步阶段,迄今只在少数设备上进行过测试。最重要的问题是,EM-SCA 中的机器学习(ML)模型是否可跨多种设备移植,从而在数字取证中发挥作用,即跨设备移植性。本研究使用多种智能设备对 EM-SCA 的这一方面进行了实验性探索。使用各种 iPhone 和 Nordic Semiconductor nRF52-DK 设备进行的实验表明,在多个相同设备上直接应用预先训练好的 ML 模型无法获得最佳结果(大多数情况下准确率低于 20%)。随后的实验包括从所有器件中收集不同的电磁轨迹样本,利用混合器件数据训练新的 ML 模型;结果也未达到预期(准确率仍低于 20%)。这促使我们采用了转移学习技术,该技术在跨模型实施方面显示出了前景。特别是对于 iPhone 13 和 nRF52-DK 设备,应用迁移学习技术获得了最高的准确率,准确率分别为 98% 和 96%。通过在相同或相似的设备上使用预先训练好的模型,这一结果大大推动了 EM-SCA 在数字取证领域的应用。
{"title":"Ensuring cross-device portability of electromagnetic side-channel analysis for digital forensics","authors":"Lojenaa Navanesan ,&nbsp;Nhien-An Le-Khac ,&nbsp;Mark Scanlon ,&nbsp;Kasun De Zoysa ,&nbsp;Asanka P. Sayakkara","doi":"10.1016/j.fsidi.2023.301684","DOIUrl":"https://doi.org/10.1016/j.fsidi.2023.301684","url":null,"abstract":"<div><p>Investigation on smart devices has become an essential subdomain in digital forensics. The inherent diversity and complexity of smart devices pose a challenge to the extraction of evidence without physically tampering with it, which is often a strict requirement in law enforcement and legal proceedings. Recently, this has led to the application of non-intrusive Electromagnetic Side-Channel Analysis (EM-SCA) as an emerging approach to extract forensic insights from smart devices. EM-SCA for digital forensics is still in its infancy, and has only been tested on a small number of devices so far. Most importantly, the question still remains whether Machine Learning (ML) models in EM-SCA are portable across multiple devices to be useful in digital forensics, i.e., <em>cross-device portability</em>. This study experimentally explores this aspect of EM-SCA using a wide set of smart devices. The experiments using various iPhones and Nordic Semiconductor nRF52-DK devices indicate that the direct application of pre-trained ML models across multiple identical devices does not yield optimal outcomes (under 20 % accuracy in most cases). Subsequent experiments included collecting distinct samples of EM traces from all the devices to train new ML models with mixed device data; this also fell short of expectations (still below 20 % accuracy). This prompted the adoption of transfer learning techniques, which showed promise for cross-model implementations. In particular, for the iPhone 13 and nRF52-DK devices, applying transfer learning techniques resulted in achieving the highest accuracy, with accuracy scores of 98 % and 96 %, respectively. This result makes a significant advancement in the application of EM-SCA to digital forensics by enabling the use of pre-trained models across identical or similar devices.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"48 ","pages":"Article 301684"},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281723002032/pdfft?md5=f602da7e26538dab7cb8dc04dbd22b4a&pid=1-s2.0-S2666281723002032-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140133966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ubi est indicium? On forensic analysis of the UBI file system Ubi est indicium?关于 UBI 文件系统的取证分析
IF 2 4区 医学 Pub Date : 2024-03-01 DOI: 10.1016/j.fsidi.2023.301689
Matthias Deutschmann, Harald Baier

Crimes involving Internet of Things (IoT) or embedded devices like drones are on the rise. A widespread class of file systems for storing data on embedded devices are flash file systems (FFS). FFS are optimized to manage conceptual limitations and characteristics of raw flash memory, i.e., memory that is not managed by an additional hardware controller that hides the characteristics of flash (called the Flash Translation Layer). Thus, FFS incorporate mechanisms and structures, which are not part of traditional block-based file systems like NTFS, APFS, or ExtX. Regarding analyses of FFS-based embedded devices, digital forensics tools handling FFS are needed. Unfortunately, currently available tools are not able to analyze FFS or raw flash images in general. In this paper, we provide a concept and an open-source implementation of a digital forensics tool bridging this gap for the widespread UBI File System. Our concept is inspired by the well-known Sleuth Kit and reflects the different abstraction layers of a digital forensics analysis (e.g., the storage device level, the volume level, the file system level). We provide an open-source tool of our concept, which we call UBI Forensic Toolkit (UBIFT). In contrast to previous work, UBIFT is able to parse file system structures like the directory tree or the UBIFS journal to recover deleted files including the respective metadata. We show the usefulness of UBIFT by a twofold evaluation: we first apply our tool to a publicly available Internet camera flash dump to perform a forensically sound analysis of the flash device. Our second evaluation comprises both a methodology for creating adaptable flash dumps in general and the comparison of our tool to competitors with similar functionality on the basis of self-generated flash dumps. Finally, we address the usability aspect of UBIFT by providing an Autopsy plugin of our tool.

涉及物联网 (IoT) 或无人机等嵌入式设备的犯罪呈上升趋势。用于在嵌入式设备上存储数据的一类广泛使用的文件系统是闪存文件系统(FFS)。闪存文件系统经过优化,可管理原始闪存的概念限制和特性,即未由隐藏闪存特性的附加硬件控制器(称为 "闪存转换层")管理的闪存。因此,FFS 包含了一些机制和结构,而这些机制和结构并不属于 NTFS、APFS 或 ExtX 等传统的基于块的文件系统。在对基于 FFS 的嵌入式设备进行分析时,需要能够处理 FFS 的数字取证工具。遗憾的是,目前可用的工具一般都无法分析 FFS 或原始闪存图像。在本文中,我们提供了一个数字取证工具的概念和开源实现,为广泛使用的 UBI 文件系统弥合了这一差距。我们的概念受到著名的 Sleuth Kit 的启发,反映了数字取证分析的不同抽象层(如存储设备层、卷层和文件系统层)。我们为我们的概念提供了一个开源工具,我们称之为 UBI 取证工具包(UBIFT)。与之前的工作不同,UBIFT 能够解析目录树或 UBIFS 日志等文件系统结构,从而恢复已删除的文件,包括相应的元数据。我们通过两方面的评估展示了 UBIFT 的实用性:首先,我们将工具应用于公开的互联网摄像头闪存转储,对闪存设备进行取证分析。我们的第二项评估包括创建适应性强的闪存转储的一般方法,以及在自生成闪存转储的基础上将我们的工具与具有类似功能的竞争对手进行比较。最后,我们通过提供工具的 Autopsy 插件来解决 UBIFT 的可用性问题。
{"title":"Ubi est indicium? On forensic analysis of the UBI file system","authors":"Matthias Deutschmann,&nbsp;Harald Baier","doi":"10.1016/j.fsidi.2023.301689","DOIUrl":"https://doi.org/10.1016/j.fsidi.2023.301689","url":null,"abstract":"<div><p>Crimes involving Internet of Things (IoT) or embedded devices like drones are on the rise. A widespread class of file systems for storing data on embedded devices are flash file systems (FFS). FFS are optimized to manage conceptual limitations and characteristics of raw flash memory, i.e., memory that is not managed by an additional hardware controller that hides the characteristics of flash (called the Flash Translation Layer). Thus, FFS incorporate mechanisms and structures, which are not part of traditional block-based file systems like NTFS, APFS, or ExtX. Regarding analyses of FFS-based embedded devices, digital forensics tools handling FFS are needed. Unfortunately, currently available tools are not able to analyze FFS or raw flash images in general. In this paper, we provide a concept and an open-source implementation of a digital forensics tool bridging this gap for the widespread UBI File System. Our concept is inspired by the well-known Sleuth Kit and reflects the different abstraction layers of a digital forensics analysis (e.g., the storage device level, the volume level, the file system level). We provide an open-source tool of our concept, which we call UBI Forensic Toolkit (UBIFT). In contrast to previous work, UBIFT is able to parse file system structures like the directory tree or the UBIFS journal to recover deleted files including the respective metadata. We show the usefulness of UBIFT by a twofold evaluation: we first apply our tool to a publicly available Internet camera flash dump to perform a forensically sound analysis of the flash device. Our second evaluation comprises both a methodology for creating adaptable flash dumps in general and the comparison of our tool to competitors with similar functionality on the basis of self-generated flash dumps. Finally, we address the usability aspect of UBIFT by providing an Autopsy plugin of our tool.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"48 ","pages":"Article 301689"},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281723002081/pdfft?md5=94fb7d24e3801fa777ccdbe6cc547b38&pid=1-s2.0-S2666281723002081-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140133962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grand theft API: A forensic analysis of vehicle cloud data 剽窃 API:车辆云数据取证分析
IF 2 4区 医学 Pub Date : 2024-03-01 DOI: 10.1016/j.fsidi.2023.301691
Simon Ebbers , Stefan Gense , Mouad Bakkouch , Felix Freiling , Sebastian Schinzel

Modern vehicles such as cars, trucks and motorcycles contain an increasing number of embedded computers that continuously exchange telemetry data like current mileage, tire pressure, expected range and geolocation to the manufacturer's cloud. Vehicle owners can access this data via Vehicle Assistant Apps (VAA). Naturally, this data is of increasing interest to law enforcement in criminal investigations. While manufacturers must comply with local laws requiring them to hand over the data of suspects upon the issuance of a warrant, this process can be time-consuming and cause an additional delay in a case. Making use of novel API-based access methods in cloud forensic investigations, we present a method to get permanent access to a vehicle's cloud data by directly accessing cloud servers given suspects' credentials. We analysed a set of 23 different VAAs and pointed out the potentially accessible data categories. With our proof of concept tool gta.py in combination with six provided vehicles from BMW, Dacia, Ford, Hyundai, Mercedes and Tesla, we verified the accessibility of the data categories. Our findings demonstrate that the API-based forensic acquisition and analysis of vehicle cloud data provides important insights to be considered in future digital forensic investigations of vehicles.

现代汽车(如轿车、卡车和摩托车)包含越来越多的嵌入式计算机,可与制造商的云端持续交换遥测数据,如当前里程、轮胎气压、预期续航里程和地理位置。车主可以通过车辆助理应用程序(VAA)访问这些数据。当然,执法部门在刑事调查中对这些数据的兴趣也与日俱增。虽然制造商必须遵守当地法律的要求,在签发搜查令时交出嫌疑人的数据,但这一过程可能会耗费大量时间,导致案件的进一步延误。利用云取证调查中基于 API 的新型访问方法,我们提出了一种通过给定嫌疑人凭证直接访问云服务器来永久访问车辆云数据的方法。我们分析了一组 23 种不同的 VAA,并指出了可能访问的数据类别。通过我们的概念验证工具 gta.py,并结合宝马、达契亚、福特、现代、梅赛德斯和特斯拉提供的六种车辆,我们验证了数据类别的可访问性。我们的研究结果表明,基于应用程序接口的车辆云数据取证采集和分析提供了重要的见解,值得在未来的车辆数字取证调查中加以考虑。
{"title":"Grand theft API: A forensic analysis of vehicle cloud data","authors":"Simon Ebbers ,&nbsp;Stefan Gense ,&nbsp;Mouad Bakkouch ,&nbsp;Felix Freiling ,&nbsp;Sebastian Schinzel","doi":"10.1016/j.fsidi.2023.301691","DOIUrl":"https://doi.org/10.1016/j.fsidi.2023.301691","url":null,"abstract":"<div><p>Modern vehicles such as cars, trucks and motorcycles contain an increasing number of embedded computers that continuously exchange telemetry data like current mileage, tire pressure, expected range and geolocation to the manufacturer's cloud. Vehicle owners can access this data via Vehicle Assistant Apps (VAA). Naturally, this data is of increasing interest to law enforcement in criminal investigations. While manufacturers must comply with local laws requiring them to hand over the data of suspects upon the issuance of a warrant, this process can be time-consuming and cause an additional delay in a case. Making use of novel API-based access methods in cloud forensic investigations, we present a method to get permanent access to a vehicle's cloud data by directly accessing cloud servers given suspects' credentials. We analysed a set of 23 different VAAs and pointed out the potentially accessible data categories. With our proof of concept tool <span>gta.py</span> in combination with six provided vehicles from BMW, Dacia, Ford, Hyundai, Mercedes and Tesla, we verified the accessibility of the data categories. Our findings demonstrate that the API-based forensic acquisition and analysis of vehicle cloud data provides important insights to be considered in future digital forensic investigations of vehicles.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"48 ","pages":"Article 301691"},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S266628172300210X/pdfft?md5=8e1636b6793dec184feeca7cf3b0ff1b&pid=1-s2.0-S266628172300210X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140133964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DFRWS APAC 2024 Brisbane DFRWS 2024 年亚太地区会议 布里斯班
IF 2 4区 医学 Pub Date : 2024-03-01 DOI: 10.1016/S2666-2817(24)00017-9
{"title":"DFRWS APAC 2024 Brisbane","authors":"","doi":"10.1016/S2666-2817(24)00017-9","DOIUrl":"https://doi.org/10.1016/S2666-2817(24)00017-9","url":null,"abstract":"","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"48 ","pages":"Article 301705"},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724000179/pdfft?md5=6dd2640aa5689c986ff3eecde0e9a57a&pid=1-s2.0-S2666281724000179-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140133976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An abstract model for digital forensic analysis tools - A foundation for systematic error mitigation analysis 数字取证分析工具的抽象模型--系统性错误缓解分析的基础
IF 2 4区 医学 Pub Date : 2024-03-01 DOI: 10.1016/j.fsidi.2023.301679
Christopher Hargreaves , Alex Nelson , Eoghan Casey

As automation within digital forensic tools becomes more advanced there is a need for a systematic approach to ensure the validity, reliability, and standardization of digital forensic results. This paper argues for intermediate output in a standardized format within digital forensic tools to allow a methodical approach to tool validation that targets errors at each stage of processing. To achieve this, a detailed process model of digital forensic analysis tools is created, extrapolating the details of the internal processes performed by monolithic forensic tools. The research deconstructs the process flow within tools and presents an ‘abstract digital forensic tool’, revisiting earlier abstraction layer ideas. This not only identifies the interconnected processes within tools but allows discussion of the potential error that could be introduced at each stage, and how it could potentially propagate within a tool. A demonstration, with a dataset, is also included, structurally annotated using Cyber-investigation Analysis Standard Expression (CASE).

随着数字取证工具的自动化越来越先进,需要一种系统的方法来确保数字取证结果的有效性、可靠性和标准化。本文认为,数字取证工具应采用标准化格式的中间输出,以便有条不紊地对工具进行验证,在处理的每个阶段找出错误。为实现这一目标,本文创建了数字取证分析工具的详细流程模型,并推断了单片式取证工具执行的内部流程细节。研究解构了工具内部的流程,提出了 "抽象数字取证工具",重温了早期的抽象层理念。这不仅能识别工具内部相互关联的流程,还能讨论每个阶段可能引入的潜在错误,以及错误如何在工具内部传播。此外,还包括一个数据集演示,并使用网络调查分析标准表达式(CASE)进行结构注释。
{"title":"An abstract model for digital forensic analysis tools - A foundation for systematic error mitigation analysis","authors":"Christopher Hargreaves ,&nbsp;Alex Nelson ,&nbsp;Eoghan Casey","doi":"10.1016/j.fsidi.2023.301679","DOIUrl":"https://doi.org/10.1016/j.fsidi.2023.301679","url":null,"abstract":"<div><p>As automation within digital forensic tools becomes more advanced there is a need for a systematic approach to ensure the validity, reliability, and standardization of digital forensic results. This paper argues for intermediate output in a standardized format within digital forensic tools to allow a methodical approach to tool validation that targets errors at each stage of processing. To achieve this, a detailed process model of digital forensic analysis tools is created, extrapolating the details of the internal processes performed by monolithic forensic tools. The research deconstructs the process flow within tools and presents an ‘abstract digital forensic tool’, revisiting earlier abstraction layer ideas. This not only identifies the interconnected processes within tools but allows discussion of the potential error that could be introduced at each stage, and how it could potentially propagate within a tool. A demonstration, with a dataset, is also included, structurally annotated using Cyber-investigation Analysis Standard Expression (CASE).</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"48 ","pages":"Article 301679"},"PeriodicalIF":2.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281723001981/pdfft?md5=525c9cdc52e8d92ec005cd51f4e65163&pid=1-s2.0-S2666281723001981-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140133977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Forensic Science International-Digital Investigation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1