23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

hypotheses of the research will be based on how the tag data can be compromised by<br />

us<strong>in</strong>g a few case scenarios.<br />

Hypothesis 1 (H1): Backend database server can be compromised by a<br />

malicious <strong>RFID</strong> R/W tag.<br />

Hypothesis 2 (H2): The value of a SI tagged with R/W <strong>RFID</strong> tag can be<br />

changed.<br />

Hypothesis 3 (H3): There will be transaction traces <strong>in</strong> the <strong>RFID</strong> reader<br />

memory after the attack.<br />

Hypothesis 4 (H4): There will be transaction traces <strong>in</strong> the POS/Server‟s<br />

memory after the attack.<br />

Hypothesis 5 (H5): There will be transaction traces <strong>in</strong> the SQL Server<br />

transaction logs after the attack.<br />

Hypothesis 6 (H6): There will be transaction traces <strong>in</strong> the SQL Server<br />

error logs after the attack.<br />

Hypothesis 7 (H7): The malicious tag can be found at the crime scene.<br />

Hypothesis 8 (H8): The significant evidence can be extracted by<br />

analyz<strong>in</strong>g collected data with EnCase forensic software, W<strong>in</strong>dows<br />

Forensic Toolchest, and a hardware write blocker (Tableau Forensic<br />

USB Bridge).<br />

Hypothesis 9 (H9): The MD5 hash values of the collected evidence<br />

before and after analysis are the same. Hence the collected evidence is<br />

credible, reliable, repeatable, and acceptable to the court of law.<br />

67

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!