23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

of potential evidence after an event, to analyse the collected potential evidence<br />

and to recommend best practice for both system security and forensic<br />

<strong>in</strong>vestigation based on the f<strong>in</strong>d<strong>in</strong>gs of the experiment. A laboratory simulation is<br />

set up to replicate previously published security violations of <strong>RFID</strong> systems, and<br />

then the Bus<strong>in</strong>ess System is forensically <strong>in</strong>vestigated <strong>in</strong> order to locate potential<br />

evidence. The simulation context is the retail environments of cloth<strong>in</strong>g and<br />

electronic goods. In both environments, SI can vary <strong>in</strong> price from a few dollars to<br />

tens of thousands of dollars. The environments are high <strong>in</strong>tensity with large<br />

numbers of SI, high transaction rates, many entry level sales assistants, high staff<br />

turnover, and generic brand systems architectures. The Read/Write <strong>RFID</strong> tag is<br />

often deployed to SI <strong>in</strong> these environments by press clip attachment (with optional<br />

band extension) (Jones, Hoare, Dontharaju, Shenchih, Sprang, Fazekas, Ca<strong>in</strong>, &<br />

Mickle, 2006). The attachments are released at the POS with a design tool for<br />

future re-writ<strong>in</strong>g and re-attachment to another SI. The bus<strong>in</strong>ess process is cost<br />

effective and the Bus<strong>in</strong>ess System <strong>in</strong>tegrity is theoretically ma<strong>in</strong>ta<strong>in</strong>ed (Jeng,<br />

Chang, & Wei, 2009).<br />

The thesis is structured to first def<strong>in</strong>e a <strong>RFID</strong> tag Bus<strong>in</strong>ess System (<strong>RFID</strong><br />

BS) and then to elaborate on the specific security risks associated with this<br />

Bus<strong>in</strong>ess System (Rotter, 2008). The Bus<strong>in</strong>ess System is def<strong>in</strong>ed (<strong>in</strong> Table 2.5 <strong>in</strong><br />

Chapter 2) and the potential for system violation is identified between the<br />

Bus<strong>in</strong>ess System entities, with<strong>in</strong> the entities (for <strong>in</strong>stance: tag clon<strong>in</strong>g), and<br />

through social eng<strong>in</strong>eer<strong>in</strong>g (Figure 2.14 <strong>in</strong> Chapter 2). It is assumed the Bus<strong>in</strong>ess<br />

System is closed so that the event of an item be<strong>in</strong>g thrown out of a w<strong>in</strong>dow<br />

undetected or break<strong>in</strong>g and enter<strong>in</strong>g are excluded from the study. The case of a<br />

Bus<strong>in</strong>ess System is violated by SQL <strong>in</strong>jection attack through the Read/Write<br />

<strong>RFID</strong> <strong>Tag</strong> is replicated (Ha<strong>in</strong>es, 2006b; Rieback, Crispo, & Tanenbaum, 2006b).<br />

The <strong>RFID</strong> BS is <strong>in</strong>vestigated for evidence rema<strong>in</strong><strong>in</strong>g after the attack and<br />

suggestions made for where to look for evidence, how to extract evidence, how to<br />

preserve and analyse the evidence (Michael, & McCathie, 2005; Masters, &<br />

Turner, 2007; Harrill, & Mislan, 2007; Khannaa, Mikkil<strong>in</strong>enia, Martonea, Alia,<br />

Chiub, Allebacha, & Delpa, 2006; Martone, Mikkil<strong>in</strong>eni, & Delp, 2006).<br />

Therefore the relevant research question is: What should the forensic <strong>in</strong>vestigator<br />

do <strong>in</strong> order to perform the complete and accurate forensic exam<strong>in</strong>ation of a<br />

compromised <strong>RFID</strong> stock management system <strong>in</strong> the retail sector?<br />

4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!