23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Imager (version 2.9.0.1385), and the<br />

physical database files of backend SQL<br />

Server were also acquired and hashed<br />

with dcfldd tool. In addition, <strong>RFID</strong><br />

reader’s memory log image was<br />

acquired with customized<br />

ReaderLogExtraction tool and hashed<br />

with md5deep tool dur<strong>in</strong>g the<br />

acquisition phase.<br />

In order to preserve the <strong>in</strong>tegrity of the<br />

collected evidence, all the collected<br />

artefacts from each entity of the<br />

compromised <strong>RFID</strong> BS were saved <strong>in</strong>to<br />

a forensically sterilized USB<br />

dest<strong>in</strong>ation flash drive (see Appendix<br />

11) as stated <strong>in</strong> Section 3.3.4 and<br />

hashed with EnCase before analys<strong>in</strong>g.<br />

Hardware write blocker (Tableau<br />

Forensic USB Bridge) was deployed <strong>in</strong><br />

order to preserve the <strong>in</strong>tegrity of the<br />

collected evidence data dur<strong>in</strong>g<br />

acquisition and analysis phases<br />

(Sections 3.3.5 and 3.3.6). Similarly,<br />

the acquisition of evidential data was<br />

performed from a trusted customized<br />

<strong>RFID</strong>_IR DVD tool kit <strong>in</strong> order to<br />

m<strong>in</strong>imize the changes to the<br />

compromised system dur<strong>in</strong>g the<br />

<strong>in</strong>vestigation.<br />

Analys<strong>in</strong>g the forensic image copy of<br />

forensic <strong>in</strong>vestigation.<br />

135

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!