23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

the attack.<br />

Hypothesis 4: There will be transaction traces <strong>in</strong> the POS/Server’s memory after<br />

the attack.<br />

Hypothesis 5: There will be transaction traces <strong>in</strong> the SQL Server transaction logs<br />

after the attack.<br />

Hypothesis 6: There will be transaction traces <strong>in</strong> the SQL Server error logs after<br />

the attack.<br />

Hypothesis 7: The malicious tag can be found at the crime scene.<br />

ARGUMENT FOR:<br />

As stated <strong>in</strong> the “argument for” <strong>in</strong> Table<br />

5.1 above, the significant evidence was<br />

found <strong>in</strong> each entity of <strong>RFID</strong> BS.<br />

Hence the significant evidence was<br />

found <strong>in</strong> the logs of <strong>RFID</strong> reader’s<br />

memory, POS RAM, and transaction<br />

logs of backend SQL Server.<br />

In the simulation experiment, a fake tag<br />

was also found and preserved as a proof<br />

of the theft of SI.<br />

ARGUMENT AGAINST:<br />

The significant evidence <strong>in</strong> <strong>RFID</strong><br />

reader might not be found if the buffer<br />

of the reader’s memory was full when<br />

the malicious tag was scanned.<br />

As a result of the firmware used, the<br />

<strong>RFID</strong> reader (Tracient Padl-R UF<br />

Reader) deployed <strong>in</strong> the experiment can<br />

currently read not only the upper limit<br />

of 15000 tags if the data (<strong>Tag</strong>ID)<br />

logg<strong>in</strong>g is turned off, but also the lower<br />

limit of 900 <strong>Tag</strong>IDs and timestamps if<br />

the data logg<strong>in</strong>g is turned on. However,<br />

different tags have different tad ID<br />

length and thus there is a small amount<br />

of difference. Hence, when the reader’s<br />

memory buffer is full due to the<br />

maximum tags read; it will cont<strong>in</strong>ue to<br />

read and transmit data from the tag via<br />

USB to the backend server. But, no<br />

more data will be written to the reader’s<br />

memory log.<br />

133

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!