23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

v<br />

Abstract<br />

Read/Write Radio Frequency Identification (R/W <strong>RFID</strong>) chips are commonly used to<br />

tag stock <strong>in</strong> retail shops. The security risk of <strong>RFID</strong> has been well established <strong>in</strong> the<br />

literature and hence there is potential for fraudulent use of <strong>RFID</strong> networks <strong>in</strong><br />

commercial sett<strong>in</strong>gs. This study proposes the identification of all possible data<br />

storage locations <strong>in</strong> a <strong>RFID</strong> system, a method for forensic extraction of the data,<br />

preservation, analysis and best practice recommendations for digital forensic<br />

<strong>in</strong>vestigators work<strong>in</strong>g on <strong>RFID</strong> systems. The research shows that it is possible to<br />

identify theft from a <strong>RFID</strong> bus<strong>in</strong>ess system (RIFD BS) after a tag poison<strong>in</strong>g attack.<br />

In order to conduct the proposed research, a trial system was set up <strong>in</strong> the lab<br />

to simulate a commercial retail situation where theft occurred. The normal operation<br />

of the trial system was documented as the trusted operation of a stable <strong>RFID</strong> retail<br />

system. The simulation context was the retail environment of cloth<strong>in</strong>g and electronic<br />

goods, as <strong>in</strong> such environments Stock Items (SI) could vary <strong>in</strong> price from a few<br />

dollars to tens of thousands of dollars. Hence, the stabilized BS was stressed by us<strong>in</strong>g<br />

a malicious poison<strong>in</strong>g attack to change the value of the stock item from the backend<br />

SQL Server. Then the entities of BS such as SI, po<strong>in</strong>t of sale (POS), bus<strong>in</strong>ess<br />

<strong>in</strong>formation system (BIS) were <strong>in</strong>vestigated <strong>in</strong> order to locate the potential evidence<br />

for the theft of the SI.<br />

The methodology used <strong>in</strong> a simulated environment was based on descriptive<br />

methods <strong>in</strong> which the case scenario of the replicated SQL poison<strong>in</strong>g attack through a<br />

R/W <strong>RFID</strong> <strong>Tag</strong> was <strong>in</strong>itiated. To <strong>in</strong>vestigate the presence of digital evidence after the<br />

theft of a SI, a customized <strong>RFID</strong> middleware and ReaderLogExtraction tool (to<br />

acquire bit-to-bit evidence from <strong>RFID</strong> reader’s memory) were developed based on<br />

Software Development Kit (SDK) of the <strong>RFID</strong> reader’s manufactur<strong>in</strong>g company.<br />

Live forensic <strong>in</strong>vestigation was performed by us<strong>in</strong>g customized <strong>in</strong>cident response<br />

toolkits (Helix_<strong>RFID</strong>_IR and dcfldd toolkits) and a hardware write-blocker. The<br />

descriptive methodology allowed the elaboration of precise details relevant to the<br />

research question.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!