23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>in</strong>vestigation. Likewise, all the required software forensic tools for data collection<br />

(such as ReaderLogExtraction tool, W<strong>in</strong>En, extended WFT, and the like) are<br />

<strong>in</strong>tegrated <strong>in</strong>to the customized Helix_<strong>RFID</strong>_IncidentResonse (Helix_<strong>RFID</strong>_IR<br />

DVD) toolkit (see Appendix 2 for steps <strong>in</strong> creat<strong>in</strong>g Helix_<strong>RFID</strong>_IR toolkit) and<br />

the live data acquisition is performed by plac<strong>in</strong>g RIFD_IR <strong>in</strong>to the compromised<br />

mach<strong>in</strong>e’s DVD drive <strong>in</strong> order to avoid any modifications or affect m<strong>in</strong>imum<br />

impact to the orig<strong>in</strong>al evidence dur<strong>in</strong>g the acquisition phase (Jones, Bejtlich, &<br />

Rose, 2006b; Jones, 2007; Fowler, 2007, 2009). Hence, the details of the tools and<br />

techniques used to collect the digital evidence, f<strong>in</strong>d<strong>in</strong>gs and analysis of collected<br />

data are presented <strong>in</strong> (Chapter 4).<br />

Dur<strong>in</strong>g the simulation experiment, the traces of evidence after the attack<br />

are able to be identified, acquired, preserved and analysed accord<strong>in</strong>g to the digital<br />

forensic pr<strong>in</strong>ciples and guidel<strong>in</strong>es for handl<strong>in</strong>g the digital evidence. Hence, the<br />

evidence of values of the orig<strong>in</strong>al stock items are changed <strong>in</strong> the backend database<br />

dur<strong>in</strong>g the <strong>in</strong>vestigation (see Figure 4.37 <strong>in</strong> Section 4.2.3.4.4). Likewise, the<br />

evidence of malicious transaction traces <strong>in</strong>clud<strong>in</strong>g the tag ID, date and timestamp<br />

are found <strong>in</strong> logs of the <strong>RFID</strong> reader’s memory (Section 4.3.1) and <strong>in</strong> the memory<br />

of the POS station (POS RAM) (Section 4.3.2). Similarly, significant evidence is<br />

found <strong>in</strong> the acquired current table data of the stock management database (Figure<br />

4.37) from the backend SQL Server. Moreover, the acquisition result of current<br />

table data of transaction log file - <strong>RFID</strong>_test_log.ldf (see Figure 4.41) shows the<br />

significant evidence of the attack <strong>in</strong> which the malicious SQL poison<strong>in</strong>g code is<br />

found and the SI (<strong>Tag</strong> IDs start<strong>in</strong>g with E004) are updated to the values $600 at<br />

06:39:48pm on the 12 October 2010. Hence, a fake tag is also found and<br />

preserved as proof of the theft of SI, <strong>in</strong> the simulation experiment.<br />

1.4 CONCLUSION (STRUCTURE OF THE THESIS)<br />

In conclusion, Chapter 1 <strong>in</strong>troduces the motivational factors <strong>in</strong> connection with<br />

the study of the digital forensic <strong>in</strong>vestigation <strong>in</strong> a compromised <strong>RFID</strong> tag based<br />

stock management system <strong>in</strong> the retail environment. It also reviews the motivation<br />

of the research and emphasizes the gap <strong>in</strong> the digital forensic research area.<br />

Chapter 2 <strong>in</strong>cludes a literature review of relevant research. For <strong>in</strong>stance,<br />

the three-tier model of a <strong>RFID</strong> system such as the material layer (Section 2.1), the<br />

6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!