23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

the collected data was ma<strong>in</strong>ta<strong>in</strong>ed by<br />

forensically analys<strong>in</strong>g on the forensic<br />

image copy of the collected data.<br />

Analyses of bit-to-bit image copy of the<br />

logs from <strong>RFID</strong> reader’s memory and<br />

POS RAM were done by us<strong>in</strong>g EnCase.<br />

The significant f<strong>in</strong>d<strong>in</strong>g results <strong>in</strong>cluded<br />

fake tag ID, timestamp, and malicious<br />

code (see Sections 4.3.1 and 4.3.2).<br />

The image copy of collected SQL data<br />

was analyzed by us<strong>in</strong>g text viewer,<br />

notepad++ text and source code editor,<br />

Microsoft Excel to which the SQL<br />

Server data collected by WFT tool was<br />

exported, and the like (Section 4.3.3,<br />

Appendices 23 and 24). The notable<br />

f<strong>in</strong>d<strong>in</strong>gs <strong>in</strong>cluded fake tag ID, the<br />

current values of stock items,<br />

timestamp and malicious SQL<br />

poison<strong>in</strong>g code <strong>in</strong> order to prove the<br />

theft of SI <strong>in</strong> a <strong>RFID</strong> based retail shop.<br />

SUMMARY:<br />

system by <strong>in</strong>terview<strong>in</strong>g the human<br />

participants and review<strong>in</strong>g CCTV.<br />

In the real world bus<strong>in</strong>ess context, the<br />

evidence extracted from the server logs<br />

and the POS and scanner/reader logs<br />

could be utilised to speed the search of<br />

CCTV frames.<br />

The dates and time that are located <strong>in</strong><br />

the logs can be matched aga<strong>in</strong>st frames<br />

of visual surveillance and witness<br />

statements.<br />

Further research needs to be conducted<br />

<strong>in</strong> a real world bus<strong>in</strong>ess context, as the<br />

evidence from CCVT and <strong>in</strong>terview<strong>in</strong>g<br />

human participants can lead to identify<br />

and prosecute the malicious attacker or<br />

SI thief.<br />

For further research, the potential evidence such as frames of visual surveillance<br />

and human participants could be analysed to prosecute the malicious attacker.<br />

However the significant evidence to prove the theft of SI were able to be<br />

extracted by analyz<strong>in</strong>g collected data with EnCase forensic software, W<strong>in</strong>dows<br />

Forensic Toolchest, a hardware write blocker (Tableau Forensic USB Bridge),<br />

and the like <strong>in</strong> this research experiment. The f<strong>in</strong>d<strong>in</strong>g results after the analysis<br />

proved that the theft of SI was taken place <strong>in</strong> a <strong>RFID</strong> BS. Hence, the arguments<br />

made for and aga<strong>in</strong>st prove the hypothesis 8 is to be accepted.<br />

137

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!