Skip to main content
Top

2019 | OriginalPaper | Chapter

fishy - A Framework for Implementing Filesystem-Based Data Hiding Techniques

Authors : Thomas Göbel, Harald Baier

Published in: Digital Forensics and Cyber Crime

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The term anti-forensics refers to any attempt to hinder or even prevent the digital forensics process. Common attempts are to hide, delete or alter digital information and thereby threaten the forensic investigation. A prominent anti-forensic paradigm is hiding data on different abstraction layers, e.g., the filesystem layer. In modern filesystems, private data can be hidden in many places, taking advantage of the structural and conceptual characteristics of each filesystem. In most cases, however, the source code and the theoretical approach of a particular hiding technique is not accessible and thus maintainability and reproducibility of the anti-forensic tool is not guaranteed. In this paper, we present fishy, a framework designed to implement and analyze different filesystem-based data hiding techniques. fishy is implemented in Python and collects various common exploitation methods that make use of existing data structures on the filesystem layer. Currently, the framework is able to hide data within ext4, FAT and NTFS filesystems using different hiding techniques and thus serves as a toolkit of established anti-forensic methods on the filesystem layer. fishy was built to support the exploration and collection of various hiding techniques and ensure the reproducibility and expandability with its publicly available source code. The construction of a modular framework played an important role in the design phase. In addition to the description of the actual framework, its current state, its use, and its easy expandability, we also present some hiding techniques for various filesystems and discuss possible future extensions of our framework.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Conlan, K., Baggili, I., Breitinger, F.: Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy. Digit. Investig. 18, 66–75 (2016)CrossRef Conlan, K., Baggili, I., Breitinger, F.: Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy. Digit. Investig. 18, 66–75 (2016)CrossRef
3.
go back to reference Harris, R.: Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem. Digit. Investig. 3, 44–49 (2006)CrossRef Harris, R.: Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem. Digit. Investig. 3, 44–49 (2006)CrossRef
4.
go back to reference Wundram, M., Freiling, F.C., Moch, C.: Anti-forensics: The next step in digital forensics tool testing. IT Security Incident Management and IT Forensics (IMF), pp. 83–97 (2013) Wundram, M., Freiling, F.C., Moch, C.: Anti-forensics: The next step in digital forensics tool testing. IT Security Incident Management and IT Forensics (IMF), pp. 83–97 (2013)
5.
go back to reference Ridder, C.K.: Evidentiary implications of potential security weaknesses in forensic software. Int. J. Digit. Crime Forensics (IJDCF) 1(3), 80–91 (2009)CrossRef Ridder, C.K.: Evidentiary implications of potential security weaknesses in forensic software. Int. J. Digit. Crime Forensics (IJDCF) 1(3), 80–91 (2009)CrossRef
6.
go back to reference Newsham, T., Palmer, C., Stamos, A., Burns, J.: Breaking forensics software: weaknesses in critical evidence collection. In: Proceedings of the 2007 Black Hat Conference. Citeseer (2007) Newsham, T., Palmer, C., Stamos, A., Burns, J.: Breaking forensics software: weaknesses in critical evidence collection. In: Proceedings of the 2007 Black Hat Conference. Citeseer (2007)
7.
go back to reference Kailus, A.V., Hecht, C., Göbel, T., Liebler, L.: fishy - Ein Framework zur Umsetzung von Verstecktechniken in Dateisystemen. D.A.CH Security 2018, syssec Verlag (2018) Kailus, A.V., Hecht, C., Göbel, T., Liebler, L.: fishy - Ein Framework zur Umsetzung von Verstecktechniken in Dateisystemen. D.A.CH Security 2018, syssec Verlag (2018)
12.
go back to reference Neuner, S., Voyiatzis, A.G., Schmiedecker, M., Brunthaler, S., Katzenbeisser, S., Weippl, E.R.: Time is on my side: steganography in filesystem metadata. Digit. Investig. 18, 76–86 (2016)CrossRef Neuner, S., Voyiatzis, A.G., Schmiedecker, M., Brunthaler, S., Katzenbeisser, S., Weippl, E.R.: Time is on my side: steganography in filesystem metadata. Digit. Investig. 18, 76–86 (2016)CrossRef
13.
go back to reference Fairbanks, K.D.: An analysis of Ext4 for digital forensics. Digit. Investig. 9, 118–130 (2012)CrossRef Fairbanks, K.D.: An analysis of Ext4 for digital forensics. Digit. Investig. 9, 118–130 (2012)CrossRef
14.
go back to reference Eckstein, K., Jahnke, M.: Data hiding in journaling file systems. In: Proceedings of the 5th Annual Digital Forensic Research Workshop (DFRWS) (2005) Eckstein, K., Jahnke, M.: Data hiding in journaling file systems. In: Proceedings of the 5th Annual Digital Forensic Research Workshop (DFRWS) (2005)
16.
go back to reference Grugq, T.: The art of defiling: defeating forensic analysis. In: Blackhat Briefings, Las Vegas, NV (2005) Grugq, T.: The art of defiling: defeating forensic analysis. In: Blackhat Briefings, Las Vegas, NV (2005)
17.
go back to reference Huebner, E., Bem, D., Wee, C.K.: Data hiding in the NTFS file system. Digit. Investig. 3, 211–226 (2006)CrossRef Huebner, E., Bem, D., Wee, C.K.: Data hiding in the NTFS file system. Digit. Investig. 3, 211–226 (2006)CrossRef
18.
go back to reference Krenhuber, A., Niederschick, A.: Forensic and Anti-Forensic on modern Computer Systems. Johannes Kepler Universitaet, Linz (2007) Krenhuber, A., Niederschick, A.: Forensic and Anti-Forensic on modern Computer Systems. Johannes Kepler Universitaet, Linz (2007)
19.
go back to reference Berghel, H., Hoelzer, D., Sthultz, M.: Data hiding tactics for windows and unix file systems. In: Advances in Computers, vol. 74, pp. 1–17 (2008) Berghel, H., Hoelzer, D., Sthultz, M.: Data hiding tactics for windows and unix file systems. In: Advances in Computers, vol. 74, pp. 1–17 (2008)
22.
go back to reference Garfinkel, S.: Anti-forensics: techniques, detection and countermeasures. In: 2nd International Conference on i-Warfare and Security, pp. 77–84 (2007) Garfinkel, S.: Anti-forensics: techniques, detection and countermeasures. In: 2nd International Conference on i-Warfare and Security, pp. 77–84 (2007)
23.
go back to reference Göbel, T., Baier, H.: Anti-forensics in ext4: On secrecy and usability of timestamp-based data hiding. Digit. Investig. 24, 111–120 (2018)CrossRef Göbel, T., Baier, H.: Anti-forensics in ext4: On secrecy and usability of timestamp-based data hiding. Digit. Investig. 24, 111–120 (2018)CrossRef
24.
go back to reference Carrier, B.: File System Forensic Analysis. Addison-Wesley Professional, Boston (2005) Carrier, B.: File System Forensic Analysis. Addison-Wesley Professional, Boston (2005)
Metadata
Title
fishy - A Framework for Implementing Filesystem-Based Data Hiding Techniques
Authors
Thomas Göbel
Harald Baier
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-05487-8_2

Premium Partner