skip to main content
research-article

Computer forensics in forensis

Published:01 April 2008Publication History
Skip Abstract Section

Abstract

Different users apply computer forensic systems, models, and terminology in very different ways. They often make incompatible assumptions and reach different conclusions about the validity and accuracy of the methods they use to log, audit, and present forensic data. In fact, it can be hard to say who, if anyone is right. We present several forensic systems and discuss situations in which they produce valid and accurate conclusions and also situations in which their accuracy is suspect. We also present forensic models and discuss areas in which they are useful and areas in which they could be augmented. Finally, we present some recommendations about how computer scientists, forensic practitioners, lawyers, and judges could build more complete models of forensics that take into account appropriate legal details and lead to scientifically valid forensic analysis.

References

  1. New Oxford American Dictionary. Second edition.Google ScholarGoogle Scholar
  2. R. Abdulrahim. Results of Goshen school vote on $70M bond are lost forever. Times Herald-Record, December 6 2007.Google ScholarGoogle Scholar
  3. E. Allman. Personal conversations, January 2005.Google ScholarGoogle Scholar
  4. J. P. Anderson. Computer Security Threat Monitoring and Surveillance. Technical report, James P. Anderson Co., Fort Washington, PA, April 1980.Google ScholarGoogle Scholar
  5. M. W. Andrew. Defining a Process Model for Forensic Analysis of Digital Devices and Storage Media. In Proceedings of the 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), pages 16--30, Seattle, WA, April 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. M. Bishop. A Model of Security Monitoring. In Proceedings of the Fifth Annual Computer Security Applications Conference (ACSAC), pages 46--52, Tucson, AZ, December 1989.Google ScholarGoogle Scholar
  7. M. Bishop. Computer Security: Art and Science. Addison-Wesley Professional, Boston, MA, 2003.Google ScholarGoogle Scholar
  8. M. Bishop and D. Wagner. Risks of E-Voting. Communications of the ACM, 50(11):120, November 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Bishop et al. UC Red Team Report of California Secretary of State Top-to-Bottom Voting Systems Review, 2007.Google ScholarGoogle Scholar
  10. D. Bonyun. The Role of a Well-Defined Auditing Process in the Enforcement of Privacy and Data Security. In Proceedings of the 1980 IEEE Symposium on Security and Privacy, 1980.Google ScholarGoogle Scholar
  11. F. Buchholz. Pervasive Binding of Labels to System Processes. PhD thesis, Purdue University, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. F. P. Buchholz and C. Shields. Providing process origin information to aid in computer forensic investigations. Journal of Computer Security, 12(5):753--776, September 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. B. Carrier. File System Forensic Analysis. Addison Wesley Professional, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. B. Carrier and E. H. Spafford. Getting Physical with the Digital Investigation Process. International Journal of Digital Evidence, 2(2), Fall 2003.Google ScholarGoogle Scholar
  15. B. D. Carrier. A Hypothesis-Based Approach to Digital Forensic Investigations. PhD thesis, Purdue University, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. A. L. Cowan. Teacher Faces Jail Over Pornography on Class Computer. New York Times, February 14 2007.Google ScholarGoogle Scholar
  17. G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. ReVirt: Enabling Intrusion Analysis through Virtual-Machine Logging and Replay. In Proceedings of the 2002 Symposium on Operating Systems Design and Implementation (OSDI), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. W. Eichin and J. A. Rochlis. With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. In Proceedings of the 1989 IEEE Symposium on Security and Privacy, Oakland, CA, 1989.Google ScholarGoogle ScholarCross RefCross Ref
  19. B. E. Endicott-Popovsky, J. D. Fluckiger, and D. A. Frincke. Establishing Tap Reliability in Expert Witness Testimony: Using Scenarios to Identify Calibration Needs. In Proceedings of the 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), pages 131--144, Seattle, WA, April 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. D. Farmer and W. Venema. Forensic Discovery. Addison Wesley Professional, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. R. Gardner, S. Garera, and A. D. Rubin. On the difficulty of validating voting machine software with software. In Proceedings of the 2nd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT'07), pages 39--54, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. H. Gross. Analyzing Computer Intrusions. PhD thesis, University of California, San Diego, Department of Electrical and Computer Engineering, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. P. Gutmann. Data Remanence in Semiconductor Devices. In Proceedings of the 10th USENIX Security Symposium, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. D. Hayes (quoting Scott C. Williams, supervisory special agent for the FBI's computer analysis and response team in Kansas City). KC to join high-tech fight against high-tech crimes: FBI to open $2 million center here. Kansas City Star, page A1, April 26 2002.Google ScholarGoogle Scholar
  25. S. A. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion Detection using Sequences of System Calls. Journal of Computer Security, 6:151--180, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. E. Kenneally. Computer Forensics Beyond the Buzzword. ;login:, 27(4):8--11, August 2002.Google ScholarGoogle Scholar
  27. G. H. Kim and E. H. Spafford. The Design and Implementation of Tripwire: A File System Integrity Checker. In Proceedings of the 1994 ACM Conference on Communications and Computer Security (CCS), November 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. S. T. King and P. M. Chen. Backtracking Intrusions. ACM Transactions on Computer Systems, 23(1):51--76, February 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. S. T. King, Z. M. Mao, D. G. Lucchetti, and P. M. Chen. Enriching Intrusion Alerts Through Multi-Host Causality. In Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS), 2005.Google ScholarGoogle Scholar
  30. T. Kohno, A. Broido, and kc claffy. Remote physical device fingerprinting. IEEE Transactions on Dependable and Secure Computing (TDSC), 2(2):93--108, April--June 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. T. Kohno, A. Stubblefield, A. D. Rubin, and D. S. Wallach. Analysis of an Electronic Voting System. In Proceedings of the 2004 IEEE Symposium on Security and Privacy, pages 27--40, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  32. B. A. Kuperman. A Categorization of Computer Security Monitoring Systems and the Impact on the Design of Audit Sources. PhD thesis, Purdue University, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. U. Lindqvist and P. A. Porras. eXpert-BSM: A Host-Based Intrusion Detection System for Sun Solaris. In Proceedings of the 17th Annual Computer Secrity Applications Conference (ACSAC), pages 240--251. IEEE Computer Society, December 10--14 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Martin Littlefield (Assistant U.S. Attorney, WDNY). Emerging Legal and Forensic Issues for Computer Scientists Teaching Digital Forensics and Information Assurance: The Import of United States v. Garnier. Digital Forensics Working Group 2007 Workshop, June 2007.Google ScholarGoogle Scholar
  35. J. McHugh. Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by the Lincoln Laboratory. ACM Transactions on Information and System Security (TISSEC), 3(4):262--294, November 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. S. Narayanasamy, G. Pokam, and B. Calder. BugNet: Continuously Recording Program Execution for Deterministic Replay Debugging. In Proceedings of the 32nd International Symposium on Computer Architecture (ISCA), June 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. National Institute of Standards and Technology (NIST). Computer forensic tool testing program. http://www.cftt.nist.gov/.Google ScholarGoogle Scholar
  38. National Institute of Standards and Technology (NIST). Deleted File Recovery Specifications Draft Report. http://www.cftt.nist.gov/DFR-Specification-SC.pdf, January 19 2005.Google ScholarGoogle Scholar
  39. W. Osser and A. Noordergraaf. Auditing in the Solaris Operating Environment. Sun Microsystems, Inc., February 2001.Google ScholarGoogle Scholar
  40. S. Peisert. Forensics for System Administrators. ;login:, 30(4):34--42, August 2005.Google ScholarGoogle Scholar
  41. S. Peisert and M. Bishop. How to Design Computer Security Experiments. In Proceedings of the Fifth World Conference on Information Security Education (WISE), pages 141--148, West Point, NY, June 2007.Google ScholarGoogle ScholarCross RefCross Ref
  42. S. Peisert and M. Bishop. I'm a Scientist, Not a Philosopher! IEEE Security and Privacy Magazine, 5(4):48--51, July--August 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. S. Peisert, M. Bishop, S. Karin, and K. Marzullo. Principles-Driven Forensic Analysis. In Proceedings of the 2005 New Security Paradigms Workshop (NSPW), pages 85--93, Lake Arrowhead, CA, October 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. S. Peisert, M. Bishop, S. Karin, and K. Marzullo. Analysis of Computer Intrusions Using Sequences of Function Calls. IEEE Transactions on Dependable and Secure Computing (TDSC), 4(2):137--150, April--June 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. S. Peisert, M. Bishop, S. Karin, and K. Marzullo. Toward Models for Forensic Analysis. In Proceedings of the 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), pages 3--15, Seattle, WA, April 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. S. P. Peisert. A Model of Forensic Analysis Using Goal-Oriented Logging. PhD thesis, Department of Computer Science and Engineering, University of California, San Diego, March 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. M. M. Pollitt. An Ad Hoc Review of Digital Forensic Models. In Proceedings of the 2nd International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE), pages 43--52, Seattle, WA, April 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. F. B. Schneider. Enforceable Security Policies. ACM Transactions on Information and System Security (TISSEC), 3(1):30--50, February 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. B. Schneier and J. Kelsey. Secure Audit Logs to Support Computer Forensics. ACM Transactions on Information and System Security (TISSEC), 2(2):159--176, May 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. S. Sitaraman and S. Venkatesan. Forensic Analysis of File System Intrusions using Improved Backtracking. In Proceedings of the Third IEEE International Workshop on Information Assurance, pages 154--163, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. F. C. Smith and R. G. Bace. A Guide to Forensic Testimony: The Art and Practice of Presenting Testimony As An Expert Technical Witness. Addison Wesley Professional, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. P. Sommer. Intrusion Detection Systems as Evidence. In Proceedings of the First International Workshop on Recent Advances in Intrusion Detection (RAID), 1998.Google ScholarGoogle Scholar
  53. E. H. Spafford and S. A. Weeber. Software forensics: Can we track code to its authors? Technical Report CSD-TR 92--010, Department of Computer Science, Purdue University, 1992.Google ScholarGoogle Scholar
  54. T. Stallard and K. Levitt. Automated Analysis for Digital Forensic Science: Semantic Integrity Checking. In Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC), December 8--12 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. P. Stephenson. The Application of Intrusion Detection Systems in a Forensic Environment (extended abstract). In The Third International Workshop on Recent Advances in Intrusion Detection (RAID), 2000.Google ScholarGoogle Scholar
  56. K. M. Tan and R. A. Maxion. "Why 6?" --- Defining the Operational Limits of stide, an Anomaly-Based Intrusion Detector. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 188--201, Oakland, CA, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. K. Thompson. Reflections on Trusting Trust. Communications of the ACM, 27(8):761--763, August 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. W. Venema. TCP WRAPPER: Network monitoring, access control, and booby traps. In Proceedings of the 3rd USENIX Security Symposium, September 1992.Google ScholarGoogle Scholar
  59. E. J. Wagner. The Science of Sherlock Holmes. Wiley, 2006.Google ScholarGoogle Scholar
  60. J. Wildermuth. Secretary of state casts doubt on future of electronic voting. San Francisco Chronicle, pages C--7, December 2 2007.Google ScholarGoogle Scholar
  61. A. Yasinsac, D. Wagner, M. Bishop, T. Baker, B. de Medeiros, G. Tyson, M. Shamos, and M. Burmester. Software Review and Security Analysis of the ES&S iVotronic 8.0.1.2 Voting Machine Firmware: Final Report For the Florida Department of State. Security and Assurance in Information Technology Laboratory, Florida State University, Tallahassee, Florida, February 23 2007.Google ScholarGoogle Scholar
  62. K. J. Ziese. Computer based forensics -- a case study -- U.S. support to the U.N. In Proceedings of CMAD IV: Computer Misuse and Anomaly Detection, 1996.Google ScholarGoogle Scholar

Index Terms

  1. Computer forensics in forensis

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in

                Full Access

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader