2024 |
|
Vanini, Céline; Hargreaves, Christopher J.; Beek, Harm; Breitinger, Frank Was the clock correct? Exploring timestamp interpretation through time anchors for digital forensic event reconstruction (Journal Article) In: Forensic Science International: Digital Investigation, vol. 49, pp. 301759, 2024, ISSN: 2666-2817, (DFRWS USA 2024 - Selected Papers from the 24th Annual Digital Forensics Research Conference USA). @article{VANINI2024301759, Timestamps and their correct interpretation play a crucial role in digital forensic investigations, particularly when the objective is to establish a timeline of events a.k.a. event reconstruction. However, the way these timestamps are generated heavily depends on an internal clock, or `system time', from which many are derived. Consequently, when this system time is skewed due to tampering, natural clock drift, or system malfunctions, recorded timestamps will not reflect the actual times the (real-world) events occurred. This raises the question of how to validate the correctness of the system clock when recording timestamps and, if found incorrect, how to determine system clock skew. To address this problem, this paper defines several important concepts such as time anchors, anchoring events, non-anchoring events and time anomalies which can be used to determine if the system time was correct. Using two examples - a Google search and a file creation - and comparing correct and skewed versions of the same set of performed actions, we illustrate the use and potential benefits of time anchors to demonstrate the correctness of the system clock for event reconstruction. | |
Dreier, Lisa Marie; Vanini, Céline; Hargreaves, Christopher J.; Breitinger, Frank; Freiling, Felix Beyond timestamps: Integrating implicit timing information into digital forensic timelines (Journal Article) In: Forensic Science International: Digital Investigation, vol. 49, pp. 301755, 2024, ISSN: 2666-2817, (DFRWS USA 2024 - Selected Papers from the 24th Annual Digital Forensics Research Conference USA). @article{DREIER2024301755, Generating timelines, i.e., sorting events by their respective timestamps, is an essential technique commonly used in digital forensic investigations. But timestamps are not the only source of timing information. For example, sequence numbers embedded in databases or positional information, such as the line numbers in log files, often contain implicit information about the order of events without directly referencing a timestamp. We present a method that can integrate such timing information into digital forensic timelines by separating sources of timing information into distinct time domains, each with its own timeline, and then connecting these timelines based on relations observed within digital evidence. The classical ``flat'' timeline is thereby extended into a ``rich'' partial order, which we call hyper timeline. Our technique allows ordering of events without timestamps and opens a rich set of possibilities to identify and characterize timestamp inconsistencies, e.g., those that arise from timestamp tampering. | |
Breitinger, Frank; Hilgert, Jan-Niclas; Hargreaves, Christopher; Sheppard, John; Overdorf, Rebekah; Scanlon, Mark DFRWS EU 10-year review and future directions in Digital Forensic Research (Journal Article) In: Forensic Science International: Digital Investigation, vol. 48, pp. 301685, 2024, ISSN: 2666-2817, (DFRWS EU 2024 - Selected Papers from the 11th Annual Digital Forensics Research Conference Europe). @article{BREITINGER2024301685, Conducting a systematic literature review and comprehensive analysis, this paper surveys all 135 peer-reviewed articles published at the Digital Forensics Research Conference Europe (DFRWS EU) spanning the decade since its inaugural running (2014–2023). This comprehensive study of DFRWS EU articles encompasses sub-disciplines such as digital forensic science, device forensics, techniques and fundamentals, artefact forensics, multimedia forensics, memory forensics, and network forensics. Quantitative analysis of the articles' co-authorships, geographical spread and citation metrics are outlined. The analysis presented offers insights into the evolution of digital forensic research efforts over these ten years and informs some identified future research directions. | |
Mombelli, Samuele; Lyle, James R.; Breitinger, Frank FAIRness in digital forensics datasets' metadata – and how to improve it (Journal Article) In: Forensic Science International: Digital Investigation, vol. 48, pp. 301681, 2024, ISSN: 2666-2817, (DFRWS EU 2024 - Selected Papers from the 11th Annual Digital Forensics Research Conference Europe). @article{MOMBELLI2024301681, The availability of research data (datasets) and compliance with FAIR principles—Findability, Accessibility, Interoperability, and Reusability—is critical to progressing digital forensics. This study evaluates metadata completeness and assesses the alignment with the FAIR principles using all 212 datasets from NIST's Computer Forensic Reference DataSet Portal (CFReDS). The findings underscore deficiencies in metadata quality and FAIR compliance, emphasizing the need for improved data management standards. Based on our critical review, we then propose and discuss various approaches to improve the status quo. | |
Michelet, Gaëtan; Breitinger, Frank ChatGPT, Llama, can you write my report? An experiment on assisted digital forensics reports written using (local) large language models (Journal Article) In: Forensic Science International: Digital Investigation, vol. 48, pp. 301683, 2024, ISSN: 2666-2817, (DFRWS EU 2024 - Selected Papers from the 11th Annual Digital Forensics Research Conference Europe). @article{MICHELET2024301683, Generative AIs, especially Large Language Models (LLMs) such as ChatGPT or Llama, have advanced significantly, positioning them as valuable tools for digital forensics. While initial studies have explored the potential of ChatGPT in the context of investigations, the question of to what extent LLMs can assist the forensic report writing process remains unresolved. To answer the question, this article first examines forensic reports with the goal of generalization (e.g., finding the `average structure' of a report). We then evaluate the strengths and limitations of LLMs for generating the different parts of the forensic report using a case study. This work thus provides valuable insights into the automation of report writing, a critical facet of digital forensics investigations. We conclude that combined with thorough proofreading and corrections, LLMs may assist practitioners during the report writing process but at this point cannot replace them. | |
Hargreaves, Christopher; Breitinger, Frank; Dowthwaite, Liz; Webb, Helena; Scanlon, Mark DFPulse: The 2024 digital forensic practitioner survey (Journal Article) In: Forensic Science International: Digital Investigation, vol. 51, pp. 301844, 2024, ISSN: 2666-2817. @article{HARGREAVES2024301844, This paper reports on the largest survey of digital forensic practitioners to date (DFPulse) conducted from March to May 2024 resulting in 122 responses. The survey collected information about practitioners' operating environments, the technologies they encounter, investigative techniques they use, the challenges they face, the degree to which academic research is accessed and useful to the practitioner community, and their suggested future research directions. The paper includes quantitative and qualitative results from the survey and a discussion of the implications for academia, the improvements that can be made, and future research directions. | |
2023 |
|
Scanlon, Mark; Breitinger, Frank; Hargreaves, Christopher; Hilgert, Jan-Niclas; Sheppard, John ChatGPT for digital forensic investigation: The good, the bad, and the unknown (Journal Article) In: Forensic Science International: Digital Investigation, vol. 46, pp. 301609, 2023, ISSN: 2666-2817, (Best Paper Award). @article{SCANLON2023301609, The disruptive application of ChatGPT (GPT-3.5, GPT-4) to a variety of domains has become a topic of much discussion in the scientific community and society at large. Large Language Models (LLMs), e.g., BERT, Bard, Generative Pre-trained Transformers (GPTs), LLaMA, etc., have the ability to take instructions, or prompts, from users and generate answers and solutions based on very large volumes of text-based training data. This paper assesses the impact and potential impact of ChatGPT on the field of digital forensics, specifically looking at its latest pre-trained LLM, GPT-4. A series of experiments are conducted to assess its capability across several digital forensic use cases including artefact understanding, evidence searching, code generation, anomaly detection, incident response, and education. Across these topics, its strengths and risks are outlined and a number of general conclusions are drawn. Overall this paper concludes that while there are some potential low-risk applications of ChatGPT within digital forensics, many are either unsuitable at present, since the evidence would need to be uploaded to the service, or they require sufficient knowledge of the topic being asked of the tool to identify incorrect assumptions, inaccuracies, and mistakes. However, to an appropriately knowledgeable user, it could act as a useful supporting tool in some circumstances. | |
Göbel, Thomas; Baier, Harald; Breitinger, Frank Data for Digital Forensics: Why a Discussion on `How Realistic is Synthetic Data' is Dispensable (Journal Article) In: Digital Threats: Research and Practice, 2023, ISSN: 2692-1626, (Presented at the 12th International Conference on IT Security Incident Management IT Forensics (IMF)). @article{10.1145/3609863, Digital forensics depends on data sets for various purposes like concept evaluation, educational training, and tool validation. Researchers have gathered such data sets into repositories and created data simulation frameworks for producing large amounts of data. Synthetic data often face skepticism due to its perceived deviation from real-world data, raising doubts about its realism. This paper addresses this concern, arguing that there is no definitive answer. We focus on four common digital forensic use cases that rely on data. Through these, we elucidate the specifications and prerequisites of data sets within their respective contexts. Our discourse uncovers that both real-world and synthetic data are indispensable for advancing digital forensic science, software, tools, and the competence of practitioners. Additionally, we provide an overview of available data set repositories and data generation frameworks, contributing to the ongoing dialogue on digital forensic data sets’ utility. | |
Breitinger, Frank; Jotterand, Alexandre Sharing datasets for digital forensic: A novel taxonomy and legal concerns (Journal Article) In: Forensic Science International: Digital Investigation, vol. 45, pp. 301562, 2023, ISSN: 2666-2817. @article{BREITINGER2023301562, During the last few years, there have been numerous changes concerning datasets for digital forensics like the development of data generation frameworks or the newly released CFReDS website by NIST. In addition, it becomes mandatory (e.g., by funding agencies) to share datasets and publish them in a manner that they can be found and processed. The core of this article is a novel taxonomy that should be used to structure the data commonly used in the domain, complementing the existing methods. Based on the taxonomy, we discuss that it is not always necessary to release the dataset, e.g., in the case of random data. In addition, we address the legal aspects of sharing data. Lastly, as a minor contribution, we provide a separation of the terms structured, semi-structured, and unstructured data where there is currently no consent in the community. | |
Michelet, Gaëtan; Breitinger, Frank; Horsman, Graeme Automation for digital forensics: Towards a definition for the community (Journal Article) In: Forensic Science International, vol. 349, pp. 111769, 2023, ISSN: 0379-0738. @article{MICHELET2023111769, Automation is crucial for managing the increasing volume of digital evidence. However, the absence of a clear foundation comprising a definition, classification, and common terminology has led to a fragmented landscape where diverse interpretations of automation exist. This resembles the wild west: some consider keyword searches or file carving as automation while others do not. We, therefore, reviewed automation literature (in the domain of digital forensics and other domains), performed three practitioner interviews, and discussed the topic with domain experts from academia. On this basis, we propose a definition and then showcase several considerations concerning automation for digital forensics, e.g., what we classify as no/basic automation or full automation (autonomous). We conclude that it requires these foundational discussions to promote and progress the discipline through a common understanding. | |
Schneider, Johannes; Breitinger, Frank Towards AI forensics: Did the artificial intelligence system do it? (Journal Article) In: Journal of Information Security and Applications, vol. 76, pp. 103517, 2023, ISSN: 2214-2126. @article{schneider2023towards, Artificial intelligence (AI) makes decisions impacting our daily lives in an increasingly autonomous manner. Their actions might cause accidents, harm, or, more generally, violate regulations. Determining whether an AI caused a specific event and, if so, what triggered the AI's action, are key forensic questions. We provide a conceptualization of the problems and strategies for forensic investigation. We focus on AI that is potentially ``malicious by design'' and gray box analysis. Our evaluation using convolutional neural networks illustrates challenges and ideas for identifying malicious AI. | |
2022 |
|
Breitinger, Frank; Zhang, Xiaolu; Quick, Darren A forensic analysis of rclone and rclone's prospects for digital forensic investigations of cloud storage (Journal Article) In: Forensic Science International: Digital Investigation, vol. 43, pp. 301443, 2022, ISSN: 2666-2817, (bf Best Paper Award). @article{breitinger2023rclone, Organizations and end users are moving their data into the cloud and trust Cloud Storage Providers (CSP) such as pCloud, Dropbox, or Backblaze. Given their popularity, it is likely that forensic examiners encounter one or more online storage types that they will have to acquire and analyze during an investigation. To access cloud storage, CSPs provide web-interfaces, proprietary software solutions (e.g., Dropbox client for Windows) as well as APIs allowing third-party access. One of these third-party applications is rclone which is an open-source tool to access many common CSPs through a command line interface. In this article, we look at rclone from two perspectives: First, we perform a forensic analysis on rclone and discuss aspects such as password recovery of the configuration file, encryption, and JA3 fingerprints. Second, we discuss rclone as a prospect to be a forensic tool which includes its read-only mount feature and sample cases. Under the circumstances tested, rclone is suitable for forensic practitioners as it is open-source, documented, and includes some essential functionality frequently needed but practitioners need to be aware of the caveats. | |
Göbel, Thomas; Uhlig, Frieder; Baier, Harald; Breitinger, Frank FRASHER – A framework for automated evaluation of similarity hashing (Journal Article) In: Forensic Science International: Digital Investigation, vol. 42, no. 2022-, pp. 301407, 2022, ISSN: 2666-2817, (Proceedings of the Twenty-Second Annual DFRWS USA). @article{Goebel2022Frasher, A challenge for digital forensic investigations is dealing with large amounts of data that need to be processed. Approximate matching (AM), a.k.a. similarity hashing or fuzzy hashing, plays a pivotal role in solving this challenge. Many algorithms have been proposed over the years such as ssdeep, sdhash, MRSH-v2, or TLSH, which can be used for similarity assessment, clustering of different artifacts, or finding fragments and embedded objects. To assess the differences between these implementations (e.g., in terms of runtime efficiency, fragment detection, or resistance against obfuscation attacks), a testing framework is indispensable and the core of this article. The proposed framework is called FRASHER (referring to a predecessor FRASH from 2013) and provides an up-to-date view on the problem of evaluating AM algorithms with respect to both the conceptual and the practical aspects. Consequently, we present and discuss relevant test case scenarios as well as release and demonstrate our framework allowing a comprehensive evaluation of AM algorithms. Compared to its predecessor, we adapt it to a modern environment providing better modularity and usability as well as more thorough testing cases. | |
AlDaajeh, Saleh; Saleous, Heba; Alrabaee, Saed; Barka, Ezedin; Breitinger, Frank; Choo, Kim-Kwang Raymond The Role of National Cybersecurity Strategies on the Improvement of Cybersecurity Education (Journal Article) In: Computers & Security, pp. 102754, 2022, ISSN: 0167-4048. @article{ALDAAJEH2022102754, Digital information and telecommunication technologies have not only become essential to individuals' daily lives but also to a nation's sustained economic growth, societal well-being, critical infrastructure resilience, and national security. Consequently, the protection of a nation's cyber sovereignty from malicious acts is a major concern. This signifies the importance of cybersecurity education in facilitating the creation of a resilient cybersecurity ecosystem and in supporting cyber sovereignty. This study reviews a sample from world-leading countries National Cybersecurity Strategic Plans (NCSPs) and analyzes the associated existing cybersecurity education and training improvement initiatives. Furthermore, a proposal to adopt the Goal-Question-Outcomes(GQO)+Strategies paradigm into cybersecurity education and training programs curricula improvement to national cybersecurity strategic goals is presented. The proposal maps cybersecurity strategic goals to cybersecurity skills and competencies using the National Initiative for Cybersecurity Education (NICE) framework. The newly proposed cybersecurity education and training programs' curricula learning outcomes were generated from the GQO+Strategies paradigm based on the three major cybersecurity strategic goals: Development of secure digital and information technology infrastructure and services, defending from sophisticated cyber threats, and enrichment of individuals' cybersecurity maturity and awareness. It is highly recommended that cybersecurity university program administrators utilize the proposed GQO+Strategies to align their program's curriculum to NCSP. Hence, closing the gap that exists with the relevant skills and sustain national cybersecurity workforces. | |
Huck, Jan; Breitinger, Frank Wake Up Digital Forensics' Community and Help Combating Ransomware (Journal Article) In: IEEE Security & Privacy, no. 01, pp. 2-11, 2022, ISSN: 1558-4046. @article{huck2022wake, To combat ransomware, organizations, literature, and research efforts focus on technical measures and neglect procedural countermeasures. We argue that detailed case studies and best practices need to be shared to allow companies to adapt their strategies to be better prepared. | |
2021 |
|
Wu, Tina; Breitinger, Frank; Niemann, Stephen IoT network traffic analysis: Opportunities and challenges for forensic investigators? (Journal Article) In: Forensic Science International: Digital Investigation, vol. 38, pp. 301123, 2021, ISSN: 2666-2817. @article{WU2021301123, As IoT devices become more incorporated into our daily lives, their always on approach makes them an ideal source of evidence. While these devices should use encryption to protect sensitive information, in reality this is not always the case e.g. some expose sensitive data like credentials in cleartext. In this paper, we have conducted an extensive analysis on the communications channels of 32 IoT consumer devices. Our experiments consisted of four main parts; first we carried out a port scan to determine if any ports can be exploited and thus gain remote access. Second, we looked at whether any of the devices used encryption and if not what type of content was exposed. Third, we used the network traffic `metadata' to identify the destination the data terminated. Finally, we examined the communication between the mobile app and the cloud to see if it can be easily exploited using a proxy server. Our findings show that the majority of devices have remote access unavailable. We found the Shannon entropy test a useful pre-test in identifying unencrypted content. Although many devices encrypted their data, we found several in particular smart cameras would send data in cleartext when they detected motion or during updates. We found the majority of data transverses to the US and stored on Amazon servers with most devices contacting multiple destination. Lastly, we discovered many of the IoT device's mobile apps can be easily exploited using a HTTP Proxy. | |
Zhang, Xiaolu; Breitinger, Frank; Luechinger, Engelbert; O'Shaughnessy, Stephen Android application forensics: A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations (Journal Article) In: Forensic Science International: Digital Investigation, vol. 39, pp. 301285, 2021, ISSN: 2666-2817. @article{Zhang2021android, Android obfuscation techniques include not only classic code obfuscation techniques that were adapted to Android, but also obfuscation methods that target the Android platform specifically. This work examines the status-quo of Android obfuscation, obfuscation detection and deobfuscation. Specifically, it first summarizes obfuscation approaches that are commonly used by app developers for code optimization, to protect their software against code theft and code tampering but are also frequently misused by malware developers to circumvent anti-malware products. Secondly, the article focuses on obfuscation detection techniques and presents various available tools and current research. Thirdly, deobfuscation (which aims at reinstating the original state before obfuscation) is discussed followed by a brief discussion how this impacts forensic investigation. We conclude that although obfuscation is widely used in Android app development (benign and malicious), available tools and the practices on how to deal with obfuscation are not standardized, and so are inherently lacking from a forensic standpoint. | |
O'Shaughnessy, Stephen; Breitinger, Frank Malware family classification via efficient Huffman features (Journal Article) In: Forensic Science International: Digital Investigation, vol. 37, pp. 301192, 2021, ISSN: 2666-2817. @article{OShaughnessy2021malware, As malware evolves and becomes more complex, researchers strive to develop detection and classification schemes that abstract away from the internal intricacies of binary code to represent malware without the need for architectural knowledge or invasive analysis procedures. Such approaches can reduce the complexities of feature generation and simplify the analysis process. In this paper, we present efficient Huffman features (eHf), a novel compression-based approach to feature construction, based on Huffman encoding, where malware features are represented in a compact format, without the need for intrusive reverse-engineering or dynamic analysis processes. We demonstrate the viability of eHf as a solution for classifying malware into their respective families on a large malware corpus of 15 k samples, indicative of the current threat landscape. We evaluate eHf against current compression-based alternatives and show that our method is comparable or superior for classification accuracy, while exhibiting considerably greater runtime efficiency. Finally we demonstrate that eHf is resilient against code reordering obfuscation. | |
Hranický, Radek; Breitinger, Frank; Ryšavý, Ondřej; Sheppard, John; Schaedler, Florin; Morgenstern, Holger; Malik, Simon What do incident response practitioners need to know? A skillmap for the years ahead (Journal Article) In: Forensic Science International: Digital Investigation, vol. 37, pp. 301184, 2021, ISSN: 2666-2817. @article{hranicky2021what, Digital forensics incident response (DFIR) specialists are expected to possess multidisciplinary skills including expert knowledge of computer-related principles and technology. On the other hand, recent studies suggest that existing training and study programs may not fully address the needs of future DFIR professionals. To reveal possible gaps in practitioners education and identify the most needed skills, we built a skillmap for DFIR where we followed a threefold approach: (1) an online survey among DFIR experts; (2) a review of training programs; and (3) an analysis of job listings on LinkedIn. Each source was first analyzed on its own and the findings were merged into a DFIR skillmap which is the main contribution of this article. The results show that network forensics and incident handling are the most demanded domains of skills. While these are covered by existing courses the newly desired skills, in particular, cloud forensics and encrypted data, need to get more space in training and education. We hope that this article provides educators with information on ways to improve in the years ahead. | |
Martín-Pérez, Miguel; Rodríguez, Ricardo J.; Breitinger, Frank Bringing order to approximate matching: Classification and attacks on similarity digest algorithms (Journal Article) In: Forensic Science International: Digital Investigation, pp. 301120, 2021, ISSN: 2666-2817. @article{martinperez2021bringing, Fuzzy hashing or similarity hashing (a.k.a. bytewise approximate matching) converts digital artifacts into an intermediate representation to allow an efficient (fast) identification of similar objects, e.g., for blacklisting. They gained a lot of popularity over the past decade with new algorithms being developed and released to the digital forensics community. When releasing algorithms (e.g., as part of a scientific article), they are frequently compared with other algorithms to outline the benefits and sometimes also the weaknesses of the proposed approach. However, given the wide variety of algorithms and approaches, it is impossible to provide direct comparisons with all existing algorithms. In this paper, we present the first classification of approximate matching algorithms which allows an easier description and comparisons. Therefore, we first reviewed existing literature to understand the techniques various algorithms use and to familiarize ourselves with the common terminology. Our findings allowed us to develop a categorization relying heavily on the terminology proposed by NIST SP 800-168. In addition to the categorization, this article presents an abstract set of attacks against algorithms and why they are feasible. Lastly, we detail the characteristics needed to build robust algorithms to prevent attacks. We believe that this article helps newcomers, practitioners, and experts alike to better compare algorithms, understand their potential, as well as characteristics and implications they may have on forensic investigations. | |
2020 |
|
Pluskal, Jan; Breitinger, Frank; Ryšavý, Ondřej Netfox detective: A novel open-source network forensics analysis tool (Journal Article) In: Forensic Science International: Digital Investigation, vol. 35, pp. 301019, 2020, ISSN: 2666-2817. @article{pluskal2020netfox, Network forensics is a major sub-discipline of digital forensics which becomes more and more important in an age where everything is connected. In order to cope with the amounts of data and other challenges within networks, practitioners require powerful tools that support them. In this paper, we highlight a novel open-source network forensic tool named – Netfox Detective – that outperforms existing tools such as Wireshark or NetworkMiner in certain areas. For instance, it provides a heuristically based engine for traffic processing that can be easily extended. Using robust parsers (we are not solely relying on the RFC description but use heuristics), our application tolerates malformed or missing conversation segments. Besides outlining the tool's architecture and basic processing concepts, we also explain how it can be extended. Lastly, a comparison with other similar tools is presented as well as a real-world scenario is discussed. | |
Breitinger, Frank; Tully-Doyle, Ryan; Przyborski, Kristen; Beck, Lauren; Harichandran, Ronald S. First year students' experience in a Cyber World course – an evaluation (Journal Article) In: Education and Information Technologies, 2020, ISBN: 1573-7608. @article{Breitinger2020, Although cybersecurity is a major present concern, it is not a required subject in University. In response, we developed Cyber World which introduces students to eight highly important cybersecurity topics (primarily taught by none cybersecurity experts). We embedded it into our critical thinking Common Course (core curriculum) which is a team-taught first-year experience required for all students. Cyber World was first taught in Fall 2018 to a cohort of over 150 students from various majors at the University of New Haven. This article presents the evaluation of our Fall taught course. In detail, we compare the performance of Cyber World students to other Common Course sections that ran in parallel and conclude that despite the higher workload students performed equally well. Furthermore, we assess the students' development throughout the course with respect to their cybersecurity knowledge where our results indicate a significant gain of knowledge. Note, this article also presents the idea and topics of Cyber World; however a detailed explanation has been released previously. | |
Wu, Tina; Breitinger, Frank; O'Shaughnessy, Stephen Digital forensic tools: Recent advances and enhancing the status quo (Journal Article) In: Forensic Science International: Digital Investigation, vol. 34, pp. 300999, 2020, ISSN: 2666-2817. @article{WBS20, Publications in the digital forensics domain frequently come with tools – a small piece of functional software. These tools are often released to the public for others to reproduce results or use them for their own purposes. However, there has been no study on the tools to understand better what is available and what is missing. For this paper we analyzed almost 800 articles from pertinent venues from 2014 to 2019 to answer the following three questions (1) what tools (i.e., in which domains of digital forensics): have been released; (2) are they still available, maintained, and documented; and (3) are there possibilities to enhance the status quo? We found 62 different tools which we categorized according to digital forensics subfields. Only 33 of these tools were found to be publicly available, the majority of these were not maintained after development. In order to enhance the status quo, one recommendation is a centralized repository specifically for tested tools. This will require tool researchers (developers) to spend more time on code documentation and preferably develop plugins instead of stand-alone tools. | |
Palmbach, David; Breitinger, Frank Artifacts for detecting timestamp manipulation in NTFS on Windows and their reliability (Journal Article) In: Forensic Science International: Digital Investigation, vol. 32, pp. 300920, 2020, ISSN: 2666-2817. @article{PB20, Timestamps have proven to be an expedient source of evidence for examiners in the reconstruction of computer crimes. Consequently, active adversaries and malware have implemented timestomping techniques (i.e., mechanisms to alter timestamps) to hide their traces. Previous research on detecting timestamp manipulation primarily focused on two artifacts: the $MFT as well as the records in the $LogFile. In this paper, we present a new use of four existing windows artifacts – the $USNjrnl, link files, prefetch files, and Windows event logs – that can provide valuable information during investigations and diversify the artifacts available to examiners. These artifacts contain either information about executed programs or additional timestamps which, when inconsistencies occur, can be used to prove timestamp forgery. Furthermore, we examine the reliability of artifacts being used to detect timestamp manipulation, i.e., testing their ability to retain information against users actively trying to alter or delete them. Based on our findings we conclude that none of the artifacts analyzed can withstand active exploitation. | |
2019 |
|
Moia, Vitor Hugo Galhardo; Breitinger, Frank; Henriques, Marco Aurélio Amaral The impact of excluding common blocks for approximate matching (Journal Article) In: Computers & Security, vol. 89, pp. 101676, 2019, ISSN: 0167-4048. @article{MOIA2020101676, Approximate matching functions allow the identification of similarity (bytewise level) in a very efficient way, by creating and comparing compact representations of objects (a.k.a digests). However, many similarity matches occur due to common data that repeats over many different files and consist of inner structure, header and footer information, color tables, font specifications, etc.; data created by applications and not generated by users. Most of the times, this sort of information is less relevant from an investigator perspective and should be avoided. In this work, we show how the common data can be identified and filtered out by using approximate matching, as well as how they are spread over different file types and their frequency. We assess the impact on similarity when removing it (i.e., in the number of matches) and the effects on performance. Our results show that for a small price on performance, a reduction about 87% on the number of matches can be achieved when removing such data. | |
Breitinger, Frank; Tully-Doyle, Ryan; Hassenfeldt, Courtney A survey on smartphone user's security choices, awareness and education (Journal Article) In: Computers & Security, vol. 88, pp. 101647, 2019, ISSN: 0167-4048. @article{BTH20, Smartphones contain a significant amount of personal data. Additionally, they are always in the user's possession, which allows them to be abused for tracking (e.g., GPS, Bluetooth or WiFi tracking). In order to not reveal private information, smartphone users should secure their devices by setting lock screen protection, using third party security applications, and choosing appropriate security settings (often, default settings are inadequate). In this paper, we mount a survey to explore user choices, awareness and education with respect to cybersecurity. In comparison with prior work, we take the user's cybersecurity familiarity into consideration in the analysis of user practices as well as have a strong focus on the younger generations, Y and Z. Our survey findings suggest that most users have appropriate lock screen settings to protect their phones from physical access; however, they disregard other security best practices, e.g., not using a VPN when connecting to a public WiFi or turning off unused features (regardless of level of expertise). Compared to desktop computers, smartphones are less secured and fewer third party security products are installed. | |
Casey, Peter; Lindsay-Decusati, Rebecca; Baggili, Ibrahim; Breitinger, Frank Inception: Virtual Space in Memory Space in Real Space – Memory Forensics of Immersive Virtual Reality with the HTC Vive (Journal Article) In: Digital Investigation, vol. 29, pp. S13 - S21, 2019, ISSN: 1742-2876. @article{CASEY2019S13, Virtual Reality (VR) has become a reality. With the technology's increased use cases, comes its misuse. Malware affecting the Virtual Environment (VE) may prevent an investigator from ascertaining virtual information from a physical scene, or from traditional ``dead'' analysis. Following the trend of anti-forensics, evidence of an attack may only be found in memory, along with many other volatile data points. Our work provides the primary account for the memory forensics of Immersive VR systems, and in specific the HTC Vive. Our approach is capable of reconstituting artifacts from memory that are relevant to the VE, and is also capable of reconstructing a visualization of the room setup a VR player was immersed into. In specific, we demonstrate that the VE, location, state and class of VR devices can be extracted from memory. Our work resulted in the first open source VR memory forensics plugin for the Volatility Framework. We discuss our findings, and our replicable approach that may be used in future memory forensics research. | |
Liebler, Lorenz; Schmitt, Patrick; Baier, Harald; Breitinger, Frank On efficiency of artifact lookup strategies in digital forensics (Journal Article) In: Digital Investigation, vol. 28, pp. S116 - S125, 2019, ISSN: 1742-2876. @article{LSB19, In recent years different strategies have been proposed to handle the problem of ever-growing digital forensic databases. One concept to deal with this data overload is data reduction, which essentially means to separate the wheat from the chaff, e.g., to filter in forensically relevant data. A prominent technique in the context of data reduction are hash-based solutions. Data reduction is achieved because hash values (of possibly large data input) are much smaller than the original input. Today's approaches of storing hash-based data fragments reach from large scale multithreaded databases to simple Bloom filter representations. One main focus was put on the field of approximate matching, where sorting is a problem due to the fuzzy nature of the approximate hashes. A crucial step during digital forensic analysis is to achieve fast query times during lookup (e.g., against a blacklist), especially in the scope of small or ordinary resource availability. However, a comparison of different database and lookup approaches is considerably hard, as most techniques partially differ in considered use-case and integrated features, respectively. In this work we discuss, reassess and extend three widespread lookup strategies suitable for storing hash-based fragments: (1) Hashdatabase for hash-based carving (hashdb), (2) hierarchical Bloom filter trees (hbft) and (3) flat hash maps (fhmap). We outline the capabilities of the different approaches, integrate new extensions, discuss possible features and perform a detailed evaluation with a special focus on runtime efficiency. Our results reveal major advantages for fhmap in case of runtime performance and applicability. hbft showed a comparable runtime efficiency in case of lookups, but hbft suffers from pitfalls with respect to extensibility and maintenance. Finally, hashdb performs worst in case of a single core environment in all evaluation scenarios. However, hashdb is the only candidate which offers full parallelization capabilities, transactional features, and a Single-level storage. | |
Ricci, Joseph; Baggili, Ibrahim; Breitinger, Frank Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef? (Journal Article) In: IEEE Security & is Privacy, vol. 17, no. 1, pp. 34-42, 2019, ISSN: 1540-7993. @article{RBB19, The current state of the art in digital forensics has primarily focused on the acquisition of data from cloud storage. Here, we present a new challenge in digital forensics: blockchain-based distributed cloud storage, using STORJ as a technology example. | |
2018 |
|
Debinski, Mark; Breitinger, Frank; Mohan, Parvathy Timeline2GUI: A Log2Timeline CSV parser and training scenarios (Journal Article) In: Digital Investigation, vol. 28, pp. 34 - 43, 2018, ISSN: 1742-2876. @article{Debinski2018, Crimes involving digital evidence are getting more complex due to the increasing storage capacities and utilization of devices. Event reconstruction (i.e., understanding the timeline) is an essential step for investigators to understand a case where a prominent tool is Log2Timeline (a tool that creates super timelines which is a combination of several log files and events throughout a system). While these timelines provide great evidence and help to understand a case, they are complex and require tools as well as training scenarios. In this paper we present Timeline2GUI an easy-to-use python implementation to analyze CSV log files create by Log2Timeline. Additionally, we present three training scenarios – beginner, intermediate and advanced – to practice timeline analysis skills as well as familiarity with visualization tools. Lastly, we provide a comprehensive overview of tools. | |
Breitinger, Frank; Baggili, Ibrahim (Ed.) Springer International Publishing, 2018, ISBN: 978-3-030-05486-1. @book{breitinger2019digital, | |
Grajeda, Cinthya; Sanchez, Laura; Baggili, Ibrahim; Clark, Devon; Breitinger, Frank Experience constructing the Artifact Genome Project (AGP): Managing the domain's knowledge one artifact at a time (Journal Article) In: Digital Investigation, vol. 26, pp. S47 - S58, 2018, ISSN: 1742-2876. @article{GSB18, While various tools have been created to assist the digital forensics community with acquiring, processing, and organizing evidence and indicating the existence of artifacts, very few attempts have been made to establish a centralized system for archiving artifacts. The Artifact Genome Project (AGP) has aimed to create the largest vetted and freely available digital forensics repository for Curated Forensic Artifacts (CuFAs). This paper details the experience of building, implementing, and maintaining such a system by sharing design decisions, lessons learned, and future work. We also discuss the impact of AGP in both the professional and academic realms of digital forensics. Our work shows promise in the digital forensics academic community to champion the effort in curating digital forensic artifacts by integrating AGP into courses, research endeavors, and collaborative projects. | |
Ricci, Joseph; Breitinger, Frank; Baggili, Ibrahim Survey results on adults and cybersecurity education (Journal Article) In: Education and Information Technologies, pp. 1–19, 2018, ISSN: 1360-2357. @article{ricci2018survey, Cyberattacks and identity theft are common problems nowadays where researchers often say that humans are the weakest link the security chain. Therefore, this survey focused on analyzing the interest for adults for `cyber threat eduction seminars', e.g., how to project themselves and their loved ones. Specifically, we asked questions to understand a possible audience, willingness for paying / time commitment, or fields of interest as well as background and previous training experience. The survey was conducted in late 2016 and taken by 233 participants. The results show that many are worried about cyber threats and about their children exploring the online domain. However, seminars do not seem to be a priority as many individuals were only willing to spend 1-1.5h on seminars. | |
2017 |
|
Grajeda, Cinthya; Breitinger, Frank; Baggili, Ibrahim Availability of datasets for digital forensics – And what is missing (Journal Article) In: Digital Investigation, vol. 22, Supplement, pp. S94 - S105, 2017, ISSN: 1742-2876. @article{MBB17a, This paper targets two main goals. First, we want to provide an overview of available datasets that can be used by researchers and where to find them. Second, we want to stress the importance of sharing datasets to allow researchers to replicate results and improve the state of the art. To answer the first goal, we analyzed 715 peer-reviewed research articles from 2010 to 2015 with focus and relevance to digital forensics to see what datasets are available and focused on three major aspects: (1) the origin of the dataset (e.g., real world vs. synthetic), (2) if datasets were released by researchers and (3) the types of datasets that exist. Additionally, we broadened our results to include the outcome of online search results. We also discuss what we think is missing. Overall, our results show that the majority of datasets are experiment generated (56.4%) followed by real world data (36.7%). On the other hand, 54.4% of the articles use existing datasets while the rest created their own. In the latter case, only 3.8% actually released their datasets. Finally, we conclude that there are many datasets for use out there but finding them can be challenging. | |
Denton, George; Karpisek, Filip; Breitinger, Frank; Baggili, Ibrahim Leveraging the SRTP protocol for over-the-network memory acquisition of a GE Fanuc Series 90-30 (Journal Article) In: Digital Investigation, vol. 22, Supplement, pp. S26 - S38, 2017, ISSN: 1742-2876. @article{DKBB17, Abstract Programmable Logic Controllers (PLCs) are common components implemented across many industries such as manufacturing, water management, travel, aerospace and hospitals to name a few. Given their broad deployment in critical systems, they became and still are a common target for cyber attacks; the most prominent one being Stuxnet. Often PLCs (especially older ones) are only protected by an outer line of defense (e.g., a firewall) but once an attacker gains access to the system or the network, there might not be any other defense layers. In this scenario, a forensic investigator should not rely on the existing software as it might have been compromised. Therefore, we reverse engineered the GE-SRTP network protocol using a GE Fanuc Series 90-30 PLC and provide two major contributions: We first describe the Service Request Transport protocol (GE-SRTP) which was invented by General Electric (GE) and is used by many of their Ethernet connected controllers. Note, to the best of our knowledge, prior to this work, no publicly available documentation on the protocol was available affording users' security by obscurity. Second, based on our understanding of the protocol, we implemented a software application that allows direct network-based communication with the PLC (no intermediate server is needed). While the tool's forensic mode is harmless and only allows for reading registers, we discovered that one can manipulate/write to the registers in its default configuration, e.g., turn off the PLC, or manipulate the items/processes it controls. | |
Clark, Devon R.; Meffert, Christopher; Baggili, Ibrahim; Breitinger, Frank DROP (DRone Open source Parser) your drone: Forensic analysis of the DJI Phantom III (Journal Article) In: Digital Investigation, vol. 22, Supplement, pp. S3 - S14, 2017, ISSN: 1742-2876. @article{CMBB17, Abstract The DJI Phantom III drone has already been used for malicious activities (to drop bombs, remote surveillance and plane watching) in 2016 and 2017. At the time of writing, DJI was the drone manufacturer with the largest market share. Our work presents the primary thorough forensic analysis of the DJI Phantom III drone, and the primary account for proprietary file structures stored by the examined drone. It also presents the forensically sound open source tool DRone Open source Parser (DROP) that parses proprietary DAT files extracted from the drone's nonvolatile internal storage. These DAT files are encrypted and encoded. The work also shares preliminary findings on TXT files, which are also proprietary, encrypted, encoded, files found on the mobile device controlling the drone. These files provided a slew of data such as GPS locations, battery, flight time, etc. By extracting data from the controlling mobile device, and the drone, we were able to correlate data and link the user to a specific device based on extracted metadata. Furthermore, results showed that the best mechanism to forensically acquire data from the tested drone is to manually extract the SD card by disassembling the drone. Our findings illustrated that the drone should not be turned on as turning it on changes data on the drone by creating a new DAT file, but may also delete stored data if the drone's internal storage is full. | |
Zhang, Xiaolu; Baggili, Ibrahim; Breitinger, Frank Breaking into the vault: privacy, security and forensic analysis of android vault applications (Journal Article) In: Computers & Security, vol. 70, pp. 516 - 531, 2017, ISSN: 0167-4048. @article{ZBB17, Abstract In this work we share the first account for the forensic analysis, security and privacy of Android vault applications. Vaults are designed to be privacy enhancing as they allow users to hide personal data but may also be misused to hide incriminating files. Our work has already helped law enforcement in the state of Connecticut to reconstruct 66 incriminating images and 18 videos in a single criminal case. We present case studies and results from analyzing 18 Android vault applications (accounting for nearly 220 million downloads from the Google Play store) by reverse engineering them and examining the forensic artifacts they produce. Our results showed that Image 1 obfuscated their code and Image 2 applications used native libraries hindering the reverse engineering process of these applications. However, we still recovered data from the applications without root access to the Android device as we were able to ascertain hidden data on the device without rooting for Image 3 of the applications. Image 4 of the vault applications were found to not encrypt photos they stored, and Image 5 were found to not encrypt videos. Image 6 of the applications were found to store passwords in cleartext. We were able to also implement a swap attack on Image 7 applications where we achieved unauthorized access to the data by swapping the files that contained the password with a self-created one. In some cases, our findings illustrate unfavorable security implementations of privacy enhancing applications, but also showcase practical mechanisms for investigators to gain access to data of evidentiary value. In essence, we broke into the vaults. | |
Moore, Jason; Baggili, Ibrahim; Breitinger, Frank Find Me If You Can: Mobile GPS Mapping Applications Forensics Analysis & SNAVP The Open Source, Modular, Extensible Parser (Journal Article) In: Journal of Digital Forensics, Security and Law (JDFSL), vol. 12, no. 1, pp. 7, 2017. @article{MBB17, | |
2016 |
|
Al-khateeb, Samer; Conlan, Kevin J.; Baggili, Nitin Agarwal And Ibrahim; Breitinger, Frank Exploring Deviant Hacker Networks (DHN) On Social Media Platforms (Journal Article) In: Journal of Digital Forensics, Security and Law, vol. 11, no. 2, pp. 7–20, 2016. @article{SCA16, Online Social Networks (OSNs) have grown exponentially over the past decade. The initial use of social media for benign purposes (e.g., to socialize with friends, browse pictures and photographs, and communicate with family members overseas) has now transitioned to include malicious activities (e.g., cybercrime, cyberterrorism, and cyberwarfare). These nefarious uses of OSNs poses a significant threat to society, and thus requires research attention. In this exploratory work, we study activities of one deviant groups: hacker groups on social media, which we term Deviant Hacker Networks (DHN). We investigated the connection between different DHNs on Twitter: how they are connected, identified the powerful nodes, which nodes sourced information, and which nodes act as "bridges" between different network components. From this, we were able to identify and articulate specific examples of DHNs communicating with each other, with the goal of committing some form of deviant act online. In our work, we also attempted to bridge the gap between the empirical study of OSNs and cyber forensics, as the growth of OSNs is now bringing these two domains together, due to OSNs continuously generating vast amounts of evidentiary data. | |
Harichandran, Vikram S.; Breitinger, Frank; Baggili, Ibrahim Bytewise Approximate Matching: The Good, The Bad, and The Unknown (Journal Article) In: Journal of Digital Forensics, Security and Law, vol. 11, no. 2, pp. 59–78, 2016. @article{HBB16, Hash functions are established and well-known in digital forensics, where they are commonly used for proving integrity and file identification (i.e., hash all files on a seized device and compare the fingerprints against a reference database). However, with respect to the latter operation, an active adversary can easily overcome this approach because traditional hashes are designed to be sensitive to altering an input; output will significantly change if a single bit is flipped. Therefore, researchers developed approximate matching, which is a rather new, less prominent area but was conceived as a more robust counterpart to traditional hashing. Since the conception of approximate matching, the community has constructed numerous algorithms, extensions, and additional applications for this technology, and are still working on novel concepts to improve the status quo. In this survey article, we conduct a high-level review of the existing literature from a non-technical perspective and summarize the existing body of knowledge in approximate matching, with special focus on bytewise algorithms. Our contribution allows researchers and practitioners to receive an overview of the state of the art of approximate matching so that they may understand the capabilities and challenges of the field. Simply, we present the terminology, use cases, classification, requirements, testing methods, algorithms, applications, and a list of primary and secondary literature. | |
Jeong, Doowon; Breitinger, Frank; Kang, Hari; Lee, Sangjin Towards Syntactic Approximate Matching-A Pre-Processing Experiment (Journal Article) In: The Journal of Digital Forensics, Security and Law: JDFSL, vol. 11, no. 2, pp. 97–110, 2016. @article{jeong2016towards, Over the past few years, the popularity of approximate matching algorithms (a.k.a. fuzzy hashing) has increased. Especially within the area of bytewise approximate matching, several algorithms were published, tested, and improved. It has been shown that these algorithms are powerful, however they are sometimes too precise for real world investigations. That is, even very small commonalities (e.g., in the header of a file) can cause a match. While this is a desired property, it may also lead to unwanted results. In this paper, we show that by using simple pre-processing, we significantly can influence the outcome. Although our test set is based on text-based file types (cause of an easy processing), this technique can be used for other, well-documented types as well. Our results show that it can be beneficial to focus on the content of files only (depending on the use-case). While for this experiment we utilized text files, Additionally, we present a small, self-created dataset that can be used in the future for approximate matching algorithms since it is labeled (we know which files are similar and how). | |
Ricci, Joseph; Baggili, Ibrahim; Breitinger, Frank Watch What You Wear: Smartwatches and Sluggish Security (Book Section) In: Marrington, Andrew; Kerr, Don; Gammack, John (Ed.): Managing Security Issues and the Hidden Dangers of Wearable Technologies, pp. 47, IGI Global, 2016. @incollection{RBB16, There is no doubt that the form factor of devices continues to shrink as evidenced by smartphones and most recently smartwatches. The adoption rate of small computing devices is staggering and needs stronger attention from the cybersecurity and digital forensics communities. In this chapter, we dissect smartwatches. We first present a historical roadmap of smartwatches. We then explore the smartwatch marketplace and outline existing smartwatch hardware, operating systems and software. Next we elaborate on the uses of smartwatches and then discuss the security and forensic implications of smartwatches by reviewing the relevant literature. Lastly, we outline future research directions in smartwatch security and forensics. | |
Conlan, Kevin; Baggili, Ibrahim; Breitinger, Frank Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy (Journal Article) In: Digital Investigation, vol. 18, pp. 66–75, 2016, ISSN: 1742-2876. @article{CBB16, Anti-forensic tools, techniques and methods are becoming a formidable obstacle for the digital forensic community. Thus, new research initiatives and strategies must be formulated to address this growing problem. In this work we first collect and categorize 308 anti-digital forensic tools to survey the field. We then devise an extended anti-forensic taxonomy to the one proposed by Rogers (2006) in order to create a more comprehensive taxonomy and facilitate linguistic standardization. Our work also takes into consideration anti-forensic activity which utilizes tools that were not originally designed for anti-forensic purposes, but can still be used with malicious intent. This category was labeled as Possible indications of anti-forensic activity, as certain software, scenarios, and digital artifacts could indicate anti-forensic activity on a system. We also publicly share our data sets, which includes categorical data on 308 collected anti-forensic tools, as well as 2780 unique hash values related to the installation files of 191 publicly available anti-forensic tools. As part of our analysis, the collected hash set was ran against the National Institute of Standards and Technology's 2016 National Software Reference Library, and only 423 matches were found out of the 2780 hashes. Our findings indicate a need for future endeavors in creating and maintaining exhaustive anti-forensic hash data sets. | |
Harichandran, Vikram S.; Walnycky, Daniel; Baggili, Ibrahim; Breitinger, Frank CuFA: A more formal definition for digital forensic artifacts (Journal Article) In: Digital Investigation, vol. 18, pp. 125–137, 2016, ISSN: 1742-2876. @article{HWB16, The term ``artifact'' currently does not have a formal definition within the domain of cyber/digital forensics, resulting in a lack of standardized reporting, linguistic understanding between professionals, and efficiency. In this paper we propose a new definition based on a survey we conducted, literature usage, prior definitions of the word itself, and similarities with archival science. This definition includes required fields that all artifacts must have and encompasses the notion of curation. Thus, we propose using a new term – curated forensic artifact (CuFA) – to address items which have been cleared for entry into a CuFA database (one implementation, the Artifact Genome Project, abbreviated as AGP, is under development and briefly outlined). An ontological model encapsulates these required fields while utilizing a lower-level taxonomic schema. We use the Cyber Observable eXpression (CybOX) project due to its rising popularity and rigorous classifications of forensic objects. Additionally, we suggest some improvements on its integration into our model and identify higher-level location categories to illustrate tracing an object from creation through investigative leads. Finally, a step-wise procedure for researching and logging CuFAs is devised to accompany the model. | |
Meffert, Christopher S.; Baggili, Ibrahim; Breitinger, Frank Deleting collected digital evidence by exploiting a widely adopted hardware write blocker (Journal Article) In: Digital Investigation, vol. 18, pp. 87–96, 2016, ISSN: 1742-2876. @article{MBB16, In this primary work we call for the importance of integrating security testing into the process of testing digital forensic tools. We postulate that digital forensic tools are increasing in features (such as network imaging), becoming networkable, and are being proposed as forensic cloud services. This raises the need for testing the security of these tools, especially since digital evidence integrity is of paramount importance. At the time of conducting this work, little to no published anti-forensic research had focused on attacks against the forensic tools/process. We used the TD3, a popular, validated, touch screen disk duplicator and hardware write blocker with networking capabilities and designed an attack that corrupted the integrity of the destination drive (drive with the duplicated evidence) without the user's knowledge. By also modifying and repackaging the firmware update, we illustrated that a potential adversary is capable of leveraging a phishing attack scenario in order to fake digital forensic practitioners into updating the device with a malicious operating system. The same attack scenario may also be practiced by a disgruntled insider. The results also raise the question of whether security standards should be drafted and adopted by digital forensic tool makers. | |
Zhang, Xiaolu; Breitinger, Frank; Baggili, Ibrahim Rapid Android Parser for Investigating DEX files (RAPID) (Journal Article) In: Digital Investigation, vol. 17, pp. 28–39, 2016, ISSN: 1742-2876. @article{ZBB16, Abstract Android malware is a well-known challenging problem and many researchers/vendors/practitioners have tried to address this issue through application analysis techniques. In order to analyze Android applications, tools decompress APK files and extract relevant data from the Dalvik EXecutable (DEX) files. To acquire the data, investigators either use decompiled intermediate code generated by existing tools, e.g., Baksmali or Dex2jar or write their own parsers/dissemblers. Thus, they either need additional time because of decompiling the application into an intermediate representation and then parsing text files, or they reinvent the wheel by implementing their own parsers. In this article, we present Rapid Android Parser for Investigating DEX files (RAPID) which is an open source and easy-to-use JAVA library for parsing DEX files. RAPID comes with well-documented APIs which allow users to query data directly from the DEX binary files. Our experiments reveal that RAPID outperforms existing approaches in terms of runtime efficiency, provides better reliability (does not crash) and can support dynamic analysis by finding critical offsets. Notably, the processing time for our sample set of 22.35 GB was only 1.5 h with RAPID while the traditional approaches needed about 23 h (parsing and querying). | |
2015 |
|
Harichandran, Vikram S.; Breitinger, Frank; Baggili, Ibrahim; Marrington, Andrew A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later (Journal Article) In: Computers & Security, vol. 57, pp. 1–13, 2015, ISSN: 0167-4048. @article{HBB15, Abstract The number of successful cyber attacks continues to increase, threatening financial and personal security worldwide. Cyber/digital forensics is undergoing a paradigm shift in which evidence is frequently massive in size, demands live acquisition, and may be insufficient to convict a criminal residing in another legal jurisdiction. This paper presents the findings of the first broad needs analysis survey in cyber forensics in nearly a decade, aimed at obtaining an updated consensus of professional attitudes in order to optimize resource allocation and to prioritize problems and possible solutions more efficiently. Results from the 99 respondents gave compelling testimony that the following will be necessary in the future: (1) better education/training/certification (opportunities, standardization, and skill-sets); (2) support for cloud and mobile forensics; (3) backing for and improvement of open-source tools (4) research on encryption, malware, and trail obfuscation; (5) revised laws (specific, up-to-date, and which protect user privacy); (6) better communication, especially between/with law enforcement (including establishing new frameworks to mitigate problematic communication); (7) more personnel and funding. | |
Karpisek, Filip; Baggili, Ibrahim; Breitinger, Frank WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages (Journal Article) In: Digital Investigation, vol. 15, pp. 110–118, 2015, ISSN: 1742-2876. @article{KBB15, Abstract WhatsApp is a widely adopted mobile messaging application with over 800 million users. Recently, a calling feature was added to the application and no comprehensive digital forensic analysis has been performed with regards to this feature at the time of writing this paper. In this work, we describe how we were able to decrypt the network traffic and obtain forensic artifacts that relate to this new calling feature which included the: a) WhatsApp phone numbers, b) WhatsApp server IPs, c) WhatsApp audio codec (Opus), d) WhatsApp call duration, and e) WhatsApp's call termination. We explain the methods and tools used to decrypt the traffic as well as thoroughly elaborate on our findings with respect to the WhatsApp signaling messages. Furthermore, we also provide the community with a tool that helps in the visualization of the WhatsApp protocol messages. | |
James, Joshua I.; Breitinger, Frank (Ed.) Springer, 2015, ISBN: 978-3-319-25511-8. @book{JB15, | |
Walnycky, Daniel; Baggili, Ibrahim; Marrington, Andrew; Moore, Jason; Breitinger, Frank Network and device forensic analysis of Android social-messaging applications (Journal Article) In: Digital Investigation, vol. 14, Supplement 1, pp. 77–84, 2015, ISSN: 1742-2876, (The Proceedings of the Fifteenth Annual DFRWS Conference). @article{WBM15, Abstract In this research we forensically acquire and analyze the device-stored data and network traffic of 20 popular instant messaging applications for Android. We were able to reconstruct some or the entire message content from 16 of the 20 applications tested, which reflects poorly on the security and privacy measures employed by these applications but may be construed positively for evidence collection purposes by digital forensic practitioners. This work shows which features of these instant messaging applications leave evidentiary traces allowing for suspect data to be reconstructed or partially reconstructed, and whether network forensics or device forensics permits the reconstruction of that activity. We show that in most cases we were able to reconstruct or intercept data such as: passwords, screenshots taken by applications, pictures, videos, audio sent, messages sent, sketches, profile pictures and more. |
Book Chapters & Journal Articles
2024 |
|
Was the clock correct? Exploring timestamp interpretation through time anchors for digital forensic event reconstruction (Journal Article) In: Forensic Science International: Digital Investigation, vol. 49, pp. 301759, 2024, ISSN: 2666-2817, (DFRWS USA 2024 - Selected Papers from the 24th Annual Digital Forensics Research Conference USA). | |
Beyond timestamps: Integrating implicit timing information into digital forensic timelines (Journal Article) In: Forensic Science International: Digital Investigation, vol. 49, pp. 301755, 2024, ISSN: 2666-2817, (DFRWS USA 2024 - Selected Papers from the 24th Annual Digital Forensics Research Conference USA). | |
DFRWS EU 10-year review and future directions in Digital Forensic Research (Journal Article) In: Forensic Science International: Digital Investigation, vol. 48, pp. 301685, 2024, ISSN: 2666-2817, (DFRWS EU 2024 - Selected Papers from the 11th Annual Digital Forensics Research Conference Europe). | |
FAIRness in digital forensics datasets' metadata – and how to improve it (Journal Article) In: Forensic Science International: Digital Investigation, vol. 48, pp. 301681, 2024, ISSN: 2666-2817, (DFRWS EU 2024 - Selected Papers from the 11th Annual Digital Forensics Research Conference Europe). | |
ChatGPT, Llama, can you write my report? An experiment on assisted digital forensics reports written using (local) large language models (Journal Article) In: Forensic Science International: Digital Investigation, vol. 48, pp. 301683, 2024, ISSN: 2666-2817, (DFRWS EU 2024 - Selected Papers from the 11th Annual Digital Forensics Research Conference Europe). | |
DFPulse: The 2024 digital forensic practitioner survey (Journal Article) In: Forensic Science International: Digital Investigation, vol. 51, pp. 301844, 2024, ISSN: 2666-2817. | |
2023 |
|
ChatGPT for digital forensic investigation: The good, the bad, and the unknown (Journal Article) In: Forensic Science International: Digital Investigation, vol. 46, pp. 301609, 2023, ISSN: 2666-2817, (Best Paper Award). | |
Data for Digital Forensics: Why a Discussion on `How Realistic is Synthetic Data' is Dispensable (Journal Article) In: Digital Threats: Research and Practice, 2023, ISSN: 2692-1626, (Presented at the 12th International Conference on IT Security Incident Management IT Forensics (IMF)). | |
Sharing datasets for digital forensic: A novel taxonomy and legal concerns (Journal Article) In: Forensic Science International: Digital Investigation, vol. 45, pp. 301562, 2023, ISSN: 2666-2817. | |
Automation for digital forensics: Towards a definition for the community (Journal Article) In: Forensic Science International, vol. 349, pp. 111769, 2023, ISSN: 0379-0738. | |
Towards AI forensics: Did the artificial intelligence system do it? (Journal Article) In: Journal of Information Security and Applications, vol. 76, pp. 103517, 2023, ISSN: 2214-2126. | |
2022 |
|
A forensic analysis of rclone and rclone's prospects for digital forensic investigations of cloud storage (Journal Article) In: Forensic Science International: Digital Investigation, vol. 43, pp. 301443, 2022, ISSN: 2666-2817, (bf Best Paper Award). | |
FRASHER – A framework for automated evaluation of similarity hashing (Journal Article) In: Forensic Science International: Digital Investigation, vol. 42, no. 2022-, pp. 301407, 2022, ISSN: 2666-2817, (Proceedings of the Twenty-Second Annual DFRWS USA). | |
The Role of National Cybersecurity Strategies on the Improvement of Cybersecurity Education (Journal Article) In: Computers & Security, pp. 102754, 2022, ISSN: 0167-4048. | |
Wake Up Digital Forensics' Community and Help Combating Ransomware (Journal Article) In: IEEE Security & Privacy, no. 01, pp. 2-11, 2022, ISSN: 1558-4046. | |
2021 |
|
IoT network traffic analysis: Opportunities and challenges for forensic investigators? (Journal Article) In: Forensic Science International: Digital Investigation, vol. 38, pp. 301123, 2021, ISSN: 2666-2817. | |
Android application forensics: A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations (Journal Article) In: Forensic Science International: Digital Investigation, vol. 39, pp. 301285, 2021, ISSN: 2666-2817. | |
Malware family classification via efficient Huffman features (Journal Article) In: Forensic Science International: Digital Investigation, vol. 37, pp. 301192, 2021, ISSN: 2666-2817. | |
What do incident response practitioners need to know? A skillmap for the years ahead (Journal Article) In: Forensic Science International: Digital Investigation, vol. 37, pp. 301184, 2021, ISSN: 2666-2817. | |
Bringing order to approximate matching: Classification and attacks on similarity digest algorithms (Journal Article) In: Forensic Science International: Digital Investigation, pp. 301120, 2021, ISSN: 2666-2817. | |
2020 |
|
Netfox detective: A novel open-source network forensics analysis tool (Journal Article) In: Forensic Science International: Digital Investigation, vol. 35, pp. 301019, 2020, ISSN: 2666-2817. | |
First year students' experience in a Cyber World course – an evaluation (Journal Article) In: Education and Information Technologies, 2020, ISBN: 1573-7608. | |
Digital forensic tools: Recent advances and enhancing the status quo (Journal Article) In: Forensic Science International: Digital Investigation, vol. 34, pp. 300999, 2020, ISSN: 2666-2817. | |
Artifacts for detecting timestamp manipulation in NTFS on Windows and their reliability (Journal Article) In: Forensic Science International: Digital Investigation, vol. 32, pp. 300920, 2020, ISSN: 2666-2817. | |
2019 |
|
The impact of excluding common blocks for approximate matching (Journal Article) In: Computers & Security, vol. 89, pp. 101676, 2019, ISSN: 0167-4048. | |
A survey on smartphone user's security choices, awareness and education (Journal Article) In: Computers & Security, vol. 88, pp. 101647, 2019, ISSN: 0167-4048. | |
Inception: Virtual Space in Memory Space in Real Space – Memory Forensics of Immersive Virtual Reality with the HTC Vive (Journal Article) In: Digital Investigation, vol. 29, pp. S13 - S21, 2019, ISSN: 1742-2876. | |
On efficiency of artifact lookup strategies in digital forensics (Journal Article) In: Digital Investigation, vol. 28, pp. S116 - S125, 2019, ISSN: 1742-2876. | |
Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef? (Journal Article) In: IEEE Security & is Privacy, vol. 17, no. 1, pp. 34-42, 2019, ISSN: 1540-7993. | |
2018 |
|
Timeline2GUI: A Log2Timeline CSV parser and training scenarios (Journal Article) In: Digital Investigation, vol. 28, pp. 34 - 43, 2018, ISSN: 1742-2876. | |
Springer International Publishing, 2018, ISBN: 978-3-030-05486-1. | |
Experience constructing the Artifact Genome Project (AGP): Managing the domain's knowledge one artifact at a time (Journal Article) In: Digital Investigation, vol. 26, pp. S47 - S58, 2018, ISSN: 1742-2876. | |
Survey results on adults and cybersecurity education (Journal Article) In: Education and Information Technologies, pp. 1–19, 2018, ISSN: 1360-2357. | |
2017 |
|
Availability of datasets for digital forensics – And what is missing (Journal Article) In: Digital Investigation, vol. 22, Supplement, pp. S94 - S105, 2017, ISSN: 1742-2876. | |
Leveraging the SRTP protocol for over-the-network memory acquisition of a GE Fanuc Series 90-30 (Journal Article) In: Digital Investigation, vol. 22, Supplement, pp. S26 - S38, 2017, ISSN: 1742-2876. | |
DROP (DRone Open source Parser) your drone: Forensic analysis of the DJI Phantom III (Journal Article) In: Digital Investigation, vol. 22, Supplement, pp. S3 - S14, 2017, ISSN: 1742-2876. | |
Breaking into the vault: privacy, security and forensic analysis of android vault applications (Journal Article) In: Computers & Security, vol. 70, pp. 516 - 531, 2017, ISSN: 0167-4048. | |
Find Me If You Can: Mobile GPS Mapping Applications Forensics Analysis & SNAVP The Open Source, Modular, Extensible Parser (Journal Article) In: Journal of Digital Forensics, Security and Law (JDFSL), vol. 12, no. 1, pp. 7, 2017. | |
2016 |
|
Exploring Deviant Hacker Networks (DHN) On Social Media Platforms (Journal Article) In: Journal of Digital Forensics, Security and Law, vol. 11, no. 2, pp. 7–20, 2016. | |
Bytewise Approximate Matching: The Good, The Bad, and The Unknown (Journal Article) In: Journal of Digital Forensics, Security and Law, vol. 11, no. 2, pp. 59–78, 2016. | |
Towards Syntactic Approximate Matching-A Pre-Processing Experiment (Journal Article) In: The Journal of Digital Forensics, Security and Law: JDFSL, vol. 11, no. 2, pp. 97–110, 2016. | |
Watch What You Wear: Smartwatches and Sluggish Security (Book Section) In: Marrington, Andrew; Kerr, Don; Gammack, John (Ed.): Managing Security Issues and the Hidden Dangers of Wearable Technologies, pp. 47, IGI Global, 2016. | |
Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy (Journal Article) In: Digital Investigation, vol. 18, pp. 66–75, 2016, ISSN: 1742-2876. | |
CuFA: A more formal definition for digital forensic artifacts (Journal Article) In: Digital Investigation, vol. 18, pp. 125–137, 2016, ISSN: 1742-2876. | |
Deleting collected digital evidence by exploiting a widely adopted hardware write blocker (Journal Article) In: Digital Investigation, vol. 18, pp. 87–96, 2016, ISSN: 1742-2876. | |
Rapid Android Parser for Investigating DEX files (RAPID) (Journal Article) In: Digital Investigation, vol. 17, pp. 28–39, 2016, ISSN: 1742-2876. | |
2015 |
|
A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later (Journal Article) In: Computers & Security, vol. 57, pp. 1–13, 2015, ISSN: 0167-4048. | |
WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages (Journal Article) In: Digital Investigation, vol. 15, pp. 110–118, 2015, ISSN: 1742-2876. | |
Springer, 2015, ISBN: 978-3-319-25511-8. | |
Network and device forensic analysis of Android social-messaging applications (Journal Article) In: Digital Investigation, vol. 14, Supplement 1, pp. 77–84, 2015, ISSN: 1742-2876, (The Proceedings of the Fifteenth Annual DFRWS Conference). |