30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>for</strong>ensic tools, process or procedure are functioning as intended. IEEE (1990) is<br />

defined Verification as “The process <strong>of</strong> evaluating a system or component to<br />

determine whether the products <strong>of</strong> a given development phase satisfy the conditions<br />

imposed at the start <strong>of</strong> that phase” (p. 81). Verification can be interpreted as a process<br />

that makes sure the s<strong>of</strong>tware tools con<strong>for</strong>m to the specifications. With regard to the<br />

digital <strong>for</strong>ensic tools, Guo et al. (2009) interpreted Verification as using laboratory<br />

tools, techniques and procedures to confirm that the s<strong>of</strong>tware meets the specifications.<br />

The s<strong>of</strong>tware V&V standard provides a foundation <strong>for</strong> <strong>for</strong>ensic sciences to adapt the<br />

well-established model to its own requirements.<br />

V&V must be tested or evaluated under a set <strong>of</strong> carefully designed requirements<br />

and procedures. S<strong>of</strong>tware testing can be categorised into two groups: White box<br />

testing and Black box testing. White box testing is appropriate if the examiner has<br />

access to the internal structure <strong>of</strong> the s<strong>of</strong>tware but this is unrealistic in <strong>for</strong>ensics<br />

industry. The mainstream <strong>for</strong>ensic tools used by the Law en<strong>for</strong>cement or intelligence<br />

agencies are closed source proprietary s<strong>of</strong>tware. The source code or the internal<br />

structure <strong>of</strong> proprietary s<strong>of</strong>tware is maintained as trade secret to the public or to the<br />

law en<strong>for</strong>cement. On the other hand, Black box testing evaluates the s<strong>of</strong>tware by<br />

comparing actual output against its expected output. The method <strong>of</strong> Black box testing<br />

can be applied to both open source and proprietary s<strong>of</strong>tware. In the context <strong>of</strong> digital<br />

<strong>for</strong>ensics, Black box testing is involved using the <strong>for</strong>ensic tool to per<strong>for</strong>m a series <strong>of</strong><br />

pre-defined tasks under different testing scenarios. For example, the task is to use the<br />

<strong>for</strong>ensic tool to acquire a hard disk using different hardware interfaces (USB, SATA,<br />

IDE and Firewire). The successful outcome <strong>of</strong> the test scenario suggests that the tool<br />

is validated <strong>for</strong> the given task under the specified conditions and environment.<br />

However, the confidence may not be extended to the environment or condition that is<br />

not covered in the given task.<br />

2.2.4.2 Existing Work Of <strong>Forensic</strong> Tool V&V<br />

CFTT is one <strong>of</strong> the programs that has dedicated much ef<strong>for</strong>t to evaluate the validity <strong>of</strong><br />

the digital <strong>for</strong>ensic tools. CFTT developed testing methodologies <strong>for</strong> each function<br />

that the digital <strong>for</strong>ensic investigation may involve. The methodology <strong>of</strong> CFTT is<br />

belongs to Black box testing. Total <strong>of</strong> seven categories have been identified, such as<br />

26

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!