• 제목/요약/키워드: Forensics Analysis

Search Result 189, Processing Time 0.022 seconds

A Meta Study on Research Trend of Digital Forensic in Korea (메타스터디를 통한 국내 디지털 포렌식 연구 동향)

  • Kwak, Na-Yeon;Lee, Choong C.;Maeng, Yun-Ho;Cho, Bang-Ho;Lee, Sang-Eun
    • Informatization Policy
    • /
    • v.24 no.3
    • /
    • pp.91-107
    • /
    • 2017
  • Digital forensics is the process of uncovering and interpreting electronic data and materials found in digital device in relation to crime. The goal of the process is to preserve any evidence in its most original form which shall be having the force of law. The digital forensic market is increasing with a growth of ICT in domestic and global market. Many countries including U.S. are actively performing researched regarding a structured investigation by collecting, identifying and validating the digital information for the purpose of reconstructing past events which so does in academic society in Korea. This paper is to understand overall research trend about digital forensics and derive future strategy by integrating the result of meta-analysis into practices based on five criteria - main theme and topic, analysis phase, technical method for analysis, author's affiliation, and unit of analysis and method. 239 papers are analyzed, which were selected out of 470 papers published for 10 years (2007~2016) in academic journal on the list of KCI (Korea Citation index). The results of this analysis will be used to examine the characteristics of research in the field of digital forensics. The result of this research will contribute to understanding of the research trend and characteristics leading the technology-driven academia, through which measures for further research development and facilitation are suggested.

Instagram Users Behavior Analysis in a Digital Forensic Perspective (디지털 포렌식 관점에서의 인스타그램 사용자 행위 분석)

  • Seo, Seunghee;Kim, Yeog;Lee, Changhoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.407-416
    • /
    • 2018
  • Instagram is a Social Network Service(SNS) that has recently become popular among people of all ages and it makes people to construct social relations and share hobbies, daily routines, and useful information. However, since the uploaded information can be accessed by arbitrary users and it is easily shared with others, frauds, stalking, misrepresentation, impersonation, an infringement of copyright and malware distribution are reported. For this reason, it is necessary to analyze Instagram from a view of digital forensics but the research involved is very insufficient. So in this paper, We performed reverse engineering and dynamic analysis of Instagram from a view of digital forensics in the Android environment. As a result, we checked three database files that contain user behavior analysis data such as chat content, chat targets, posted photos, and cookie information. And we found the path to save 4 files and the xml file to save various data. Also we propose ways to use the above results in digital forensics.

Sex Determination Using a Discriminant Analysis of Maxillary Sinuses and Three-Dimensional Technology

  • Jeong-Hyun Lee;Hee-Jeung Jee;Eun-Seo Park;Seok-Ho Kim;Sung-Suk Bae
    • Journal of dental hygiene science
    • /
    • v.22 no.4
    • /
    • pp.249-255
    • /
    • 2022
  • Background: Sexual dimorphism is important for sex determination in the field of forensics. However, sexual dimorphism is commonly assessed using cone beam computed tomography (CBCT) rather than three-dimensional (3D) modeling software; therefore, studies using a more accurate measurement approach are necessary. This study assessed the sexual dimorphism of the MS using a 3D modeling program to obtain information that could contribute to the fields of surgery and forensics. Methods: The CBCT data of 60 patients (age, 20~29 y; 30 males and 30 females) admitted to the Department of Orthodontics at the Dankook University School of Dentistry were provided in Digital Imaging and Communications in Medicine (DICOM) format. The left MS and right MS were modeled based on the DICOM files using the Mimics (version 22; Materialise, Leuven, Belgium) 3D program and converted to stereolithography (STL) files used to measure the width, length, and height of the MS, infraorbital foramen (IOF), right MS, and left MS. The average of three repeated measurements was calculated, and a reliability test was performed to ensure data reliability (Cronbach's α=0.618). A canonical discriminant analysis was performed using a standard approach (left: Box's M=0.096; right: Box's M=0.115). Results: Males had greater values for all parameters (MS width, MS length, MS height, IOF, right MS, left MS) than females. The discriminant analysis identified six independent variables (MS width, MS height, MS length, IOF, right MS, left MS) that could identify sex. The left MS and right MS correctly identified the sex of 81.7% and 71.7% of the patients, respectively, with the left MS having higher accuracy. Conclusion: This study confirmed that, for Korean individuals, the left MS has a better ability to identify sex than the right MS. These results may contribute to sex identification in the fields of surgery and forensics.

Design and Implementation of Analysis Techniques for Fragmented Pages in the Flash Memory Image of Smartphones (스마트폰 플래시 메모리 이미지 내의 단편화된 페이지 분석 기법 및 구현)

  • Park, Jung-Heum;Chung, Hyun-Ji;Lee, Sang-Jin;Son, Young-Dong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.827-839
    • /
    • 2012
  • A cell phone is very close to the user and therefore should be considered in digital forensic investigation. Recently, the proportion of smartphone owners is increasing dramatically. Unlike the feature phone, users can utilize various mobile application in smartphone because it has high-performance operating system (e.g., Android, iOS). As acquisition and analysis of user data in smartphone are more important in digital forensic purposes, smartphone forensics has been studied actively. There are two way to do smartphone forensics. The first way is to extract user's data using the backup and debugging function of smartphones. The second way is to get root permission, and acquire the image of flash memory. And then, it is possible to reconstruct the filesystem, such as YAFFS, EXT, RFS, HFS+ and analyze it. However, this methods are not suitable to recovery and analyze deleted data from smartphones. This paper introduces analysis techniques for fragmented flash memory pages in smartphones. Especially, this paper demonstrates analysis techniques on the image that reconstruction of filesystem is impossible because the spare area of flash memory pages does not exist and the pages in unallocated area of filesystem.

Development of Windows forensic tool for verifying a set of data (윈도우 포렌식 도구의 검증용 데이터 세트의 개발)

  • Kim, Min-Seo;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1421-1433
    • /
    • 2015
  • For an accurate analysis through the forensic of digital devices and computer, it is a very important validation of the reliability of digital forensic tools. To verify the reliability of the tool, it is necessary to research and development of the data set to be input to the tool. In many-used Windows operating system of the computer, there is a Window forensic artifacts associated with time and system behavior. In this paper, we developed a set of data in the Windows operating system to be able to analyze all of the two Windows artifacts and we conducted a test with published digital forensic tools. Therefore, the developed data set presents the use of the following method. First, artefacts education for growing ability can be analyzed acts standards. Secondly, the purpose of tool tests for verifying the reliability of digital forensics. Lastly, recyclability for new artifact analysis.

Applying Embedded System Forensics to Car GPS Navigation System Analysis (임베디드 포렌식 기술을 활용한 차량용 GPS 항법 장치 분석)

  • Lee, Yang-Sun;Park, Jong-Hyuk;Kim, Soo-Kyun
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.5
    • /
    • pp.639-645
    • /
    • 2009
  • It has increased rapidly use of GPS car navigation system in the last few years worldwide. The type of navigation operation is composed of hardware or software. Navigation based on software is stored in exterior storage(e.g. SD card) and executed. One of many navigation software, Mappy, is used most plentifully in Korea. It stores user information such frequently visited place, route and etc. in exterior storage. If it analyzes the dat of navigation, we gain the information such a suspect's movement, route of car. There are important means in a digital forensic perspective because it's available for investigating the crime such kidnapping, murder and etc. This paper provides the necessary information in digital investigation through the analysis of stored data of navigation in a digital forensic perspective.

  • PDF

The Study on Fault Injection Attack: The analysis and improvement of the experimental precision indicators (오류주입공격 실험 정밀도 분석 및 개선지표)

  • Kim, HyunHo;Kang, Young-Jin;Lee, Young-Sil;Park, Jae-Hoon;Kim, Chang-Kyun;Lee, HoonJae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.285-294
    • /
    • 2014
  • As the utilization rate of smart device increases, various applications for smart device have been developed. Since these applications can contain important data related to user behaviors in digital forensic perspective, the analysis of them should be conducted in advance. However, lots of applications get to have new data format or type when they are updated. Therefore, whether the applications are updated or not should be checked one by one, and if they are, whether their data are changed should be also analyzed. But observing application data repeatedly is a time-consuming task, and that is why the effective method for dealing with this problem is needed. This paper suggests the automatic system which gets updated information and checks changed data by collecting application information.

A Research on Virtual Disk Reconstruction Method on Windows Storage Space (윈도우 저장소 공간 시스템 상의 가상 디스크 재구성 방법 연구)

  • Kim, Junho;Choi, Hoyong;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.27-38
    • /
    • 2018
  • Recently, as the amount of digital data rapidly increases, a large storage space is required. RAID is a system that can manage large capacity storage space. Storage space provided by Windows is a type of software RAID. Storage space has been supported since Windows 8, Windows Server 2012, and no analysis has been done on the functionality. To analyze system using storage space, analysis of storage space function and reconstruction method of virtual disk should be studied. In this paper, we briefly describe the layout of existing RAID, explain the layout and metadata of storage space of software RAID, present reconstruction method of virtual disk by disk layout, and verify the result through experiments.

Analysis of Cybercrime Investigation Problems in the Cloud Environment

  • Khachatryan, Grigor
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.315-319
    • /
    • 2022
  • Cloud computing has emerged to be the most effective headway for investigating crime especially cybercrime in this modern world. Even as we move towards an information technology-controlled world, it is important to note that when innovations are made, some negative implications also come with it, and an example of this is these criminal activities that involve technology, network devices, and networking that have emerged as a result of web improvements. These criminal activities are the ones that have been termed cybercrime. It is because of these increased criminal activities that organizations have come up with different strategies that they use to counter these crimes, and one of them is carrying out investigations using the cloud environment. A cloud environment has been defined as the use of web-based applications that are used for software installation and data stored in computers. This paper examines problems that are a result of cybercrime investigation in the cloud environment. Through analysis of the two components in play; cybercrime and cloud environment, we will be able to understand what are the problems that are encountered when carrying out investigations in cloud forensics. Through the use of secondary research, this paper found out that most problems are associated with technical and legal channels that are involved in carrying out these investigations. Investigator's mistakes when extracting pieces of evidence form the most crucial problems that take a lead when it comes to cybercrime investigation in the cloud environment. This paper not only flags out the challenges that are associated with cybercrime investigation in cloud environments but also offer recommendations and suggested solutions that can be used to counter the problems in question here. Through a proposed model to perform forensics investigations, this paper discusses new methodologies solutions, and developments for performing cybercrime investigations in the cloud environment.

Vulnerability analysis for privacy security Android apps (개인정보보호 안드로이드 앱에 대한 취약점 분석)

  • Lee, Jung-Woo;Hong, Pyo-Gil;Kim, Dohyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.184-186
    • /
    • 2022
  • Recently, as interest in personal information protection has increased, various apps for personal information protection have emerged. These apps protect data in various formats, such as photos, videos, and documents containing personal information, using encryption and hide functions. These apps can have a positive effect on personal information protection, but in digital forensics, they act as anti-forensic because they can be difficult to analyze data during the investigation process. In this paper, finds out PIN, an access control function, through reverse engineering on Calculator - photo vault, one of the personal information protection apps, and files such as photos and documents to which encryption and hide were applied. In addition, the vulnerability to this app was analyzed by research decryption for database files where logs for encrypted and hide files are stored.

  • PDF