23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

and confirmed the database was<br />

obviously compromised.<br />

Moreover, the acquisition results of<br />

current table data of transaction log file<br />

- <strong>RFID</strong>_test_log.ldf (see Figure 4.41)<br />

showed the significant evidence of the<br />

attack <strong>in</strong> which the malicious SQL<br />

poison<strong>in</strong>g code was found and the SI<br />

(<strong>Tag</strong> IDs start<strong>in</strong>g with E004) were<br />

updated to the values $600 at<br />

06:39:48pm on the 12 October 2010.<br />

A fake tag was found and preserved as<br />

a proof of the theft of SI, <strong>in</strong> the<br />

simulation experiment.<br />

SUMMARY:<br />

Likewise, the f<strong>in</strong>d<strong>in</strong>gs <strong>in</strong> SQL Server<br />

error logs and system event logs such as<br />

security, system and application logs<br />

(see Figures 24A.2, 24A.3, 24A.4 <strong>in</strong><br />

Appendix 24) are not conv<strong>in</strong>c<strong>in</strong>g<br />

enough to prosecute the malicious<br />

attacker.<br />

Similarly, the fake tag could be<br />

rewritten for another SI if the retailer<br />

did not have proper policy of manag<strong>in</strong>g<br />

and reus<strong>in</strong>g the tag which was just<br />

detached from SI sold.<br />

In the simulation experiment, the <strong>RFID</strong> stock management system was able to be<br />

compromised by us<strong>in</strong>g malicious <strong>RFID</strong> tag <strong>in</strong>jected with SQL poison<strong>in</strong>g code to<br />

steal the SI by pay<strong>in</strong>g $600 <strong>in</strong>stead of $1500. The forensic image analysis was<br />

performed on each artefact extracted from the three entities of the simulated <strong>RFID</strong><br />

BS and the sub-systems identified <strong>in</strong> Table 2.5 (Section 2.3). Even though the<br />

significant evidence to prove the theft of SI is found <strong>in</strong> almost all the areas of the<br />

<strong>RFID</strong> BS, there are some limitations <strong>in</strong> the f<strong>in</strong>d<strong>in</strong>g results. However, the<br />

arguments made for and aga<strong>in</strong>st prove most of the proposed hypotheses (1, 2, 3, 4,<br />

and 5) are to be accepted except hypothesis 6. As for hypothesis 7, the arguments<br />

made for and aga<strong>in</strong>st prove to be <strong>in</strong>determ<strong>in</strong>ate.<br />

Table 5.2: Secondary Research Question 2 and Tested Hypotheses<br />

Secondary Question 2: What evidence can be extracted from a compromised<br />

<strong>RFID</strong> based retail system?<br />

Hypothesis 3: There will be transaction traces <strong>in</strong> the <strong>RFID</strong> reader’s memory after<br />

132

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!