30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

S<strong>of</strong>tware support is minimum and the support is provided by submitting help to the<br />

Source Forge discussion board or sending email to the author directly.<br />

5.1.5 Comparison With Other Related Studies<br />

A Function Map (see Figure 3.12) was created to assist this research to identify the<br />

essential and potential components <strong>for</strong> testing the disk imaging tools. With more<br />

potential components identified, the specification <strong>of</strong> the testing requirements could<br />

become more comprehensive. Guo& Slay (2010) state that Function Mapping<br />

provides the level <strong>of</strong> abstraction that could provide tool testers or <strong>for</strong>ensic s<strong>of</strong>tware<br />

developers with a comprehensive representation <strong>of</strong> the functions required <strong>for</strong> the tool.<br />

Sections 3.1.1 and 3.1.2 in Chapter 3 review two previous studies that provided<br />

this study with valuable in<strong>for</strong>mation about how to extensively test disk imaging tools.<br />

CFTT program has specified mandatory testing requirements that are taken into<br />

account in this research. Some <strong>of</strong> the optional requirements specified in CFTT<br />

program are omitted. Clone creation and Block hashing are excluded from the scope <strong>of</strong><br />

this research due to the fact that these functions are not available in the disk imaging<br />

tools chosen in the present research. Following the review <strong>of</strong> another research in<br />

Section 3.1.2, a section called Hidden Sector is added to the requirements that are<br />

considered as an important component <strong>of</strong> the disk imaging tools testing. The test<br />

assertions derived from the requirements <strong>for</strong> Hidden Sector section are based on the<br />

research reviewed in Section 3.1.2 (see Appendix 1 and 3). CFTT specification and<br />

assertions are only concerned with the in<strong>for</strong>mation being accurately logged in the log<br />

file but do not specify what log in<strong>for</strong>mation is essential <strong>for</strong> the <strong>for</strong>ensic investigation.<br />

It has not been measured whether the in<strong>for</strong>mation displayed by the tool is the same as<br />

the in<strong>for</strong>mation recorded in the log file. There<strong>for</strong>e, requirements and correspondent<br />

assertions <strong>of</strong> TSP-RLOG-02 and TSP-RLOG-03 have been added to the research.<br />

In both CFTT (NIST, 2005) and Byers & Shahmehri (2009) studies, GPT<br />

partitioning scheme is not included but the popularity <strong>of</strong> the scheme has been<br />

increasing exponentially as indicated in Section 2.3.4. Test cases TC-16 and TC-17<br />

that involve GPT partitions are added. The file systems HFS and HFS+ are also added<br />

to the testing requirements. GPT partition and HFS, HFS+ file systems are commonly<br />

106

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!