23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Hypothesis 7: The malicious tag can be found at the crime scene.<br />

ARGUMENT FOR:<br />

The backend database server was able<br />

to be successfully compromised by<br />

us<strong>in</strong>g a fake <strong>RFID</strong> R/W tag <strong>in</strong>jected<br />

with malicious code (Section 3.3.2).<br />

The traces of evidence after the attack<br />

were able to be identified, acquired,<br />

preserved and analysed accord<strong>in</strong>g to the<br />

digital forensic pr<strong>in</strong>ciples and<br />

guidel<strong>in</strong>es for handl<strong>in</strong>g the digital<br />

evidence.<br />

Hence, the evidence of changes to the<br />

orig<strong>in</strong>al values of the stock items<br />

tagged with R/W <strong>RFID</strong> tags was found<br />

<strong>in</strong> the backend database dur<strong>in</strong>g the<br />

<strong>in</strong>vestigation (see Figure 4.37 <strong>in</strong><br />

Section 4.2.3.4.4).<br />

Likewise, the evidence of malicious<br />

transaction traces <strong>in</strong>clud<strong>in</strong>g the tag ID,<br />

date and timestamp was found <strong>in</strong> logs<br />

of <strong>RFID</strong> reader’s memory (Section<br />

4.3.1) and POS RAM (Section 4.3.2).<br />

As stated above, the significant<br />

evidence was found <strong>in</strong> the acquired<br />

current table data of the stock<br />

management database (Figure 4.37)<br />

from the backend SQL Server. It<br />

showed that all the SI values were $600<br />

ARGUMENT AGAINST:<br />

The implemented <strong>RFID</strong> stock<br />

management system was a simple<br />

system design as it did not deploy the<br />

<strong>in</strong>trusion detection/prevention system,<br />

CCTV system and web server <strong>in</strong> the<br />

research experiment. Furthermore,<br />

other modules for Credit Card payment<br />

process<strong>in</strong>g, purchas<strong>in</strong>g, receiv<strong>in</strong>g,<br />

customers, report<strong>in</strong>g, and the like were<br />

not <strong>in</strong>tegrated <strong>in</strong> the system.<br />

Hence, additional research are still<br />

needed as more evidence traces could<br />

be found if some of these modules or<br />

software was even <strong>in</strong>tegrated <strong>in</strong> the<br />

system design. For <strong>in</strong>stance, the<br />

attacker could be identified if he/she<br />

paid for the stolen item by us<strong>in</strong>g<br />

Electronic Funds Transfer at Po<strong>in</strong>t of<br />

Sale (EFPOTS) or Credit Card <strong>in</strong>stead<br />

of cash. Likewise, the evidence such as<br />

IP address of the unauthorized user<br />

could also be found <strong>in</strong> the Web Server<br />

log if the attack was com<strong>in</strong>g from the<br />

Internet (Section 3.1.4). Moreover, the<br />

evidence could be found <strong>in</strong> the records<br />

of CCTV if implemented. In the real<br />

world, the percentage of prosecut<strong>in</strong>g<br />

the perpetrator would be lesser without<br />

show<strong>in</strong>g such evidence.<br />

131

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!