23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

However, accord<strong>in</strong>g to Fowler (2009, p. 204), the Histogram encloses “a<br />

snapshot of actual data values that were taken at the time of the last statistics<br />

update”, and it was the significant data to acquire dur<strong>in</strong>g a forensic<br />

<strong>in</strong>vestigation. Histogram <strong>in</strong>formation of the compromised database<br />

(<strong>RFID</strong>_test.mdf) was explicitly retrieved by us<strong>in</strong>g the follow<strong>in</strong>g commands for<br />

all the columns and tables of <strong>in</strong>terest.<br />

Once the preced<strong>in</strong>g syntaxes were run, the Histogram <strong>in</strong>formation results<br />

(Figure 4.34, 4.35 and 4.36) aga<strong>in</strong>st the specific columns of <strong>in</strong>terest were sent<br />

to the designated output files of the evidence collection device.<br />

Figure 4.34: Acquired statistics histogram <strong>in</strong>formation aga<strong>in</strong>st <strong>Tag</strong> column of<br />

<strong>RFID</strong>_test.mdf<br />

106

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!