23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

other collected evidence data by us<strong>in</strong>g WFT (Fowler, 2007, 2009) will be imported to<br />

Microsoft Excel on the forensic workstation us<strong>in</strong>g the same code page acquired from<br />

the target compromised SQL Server. Likewise, the value conversions of hexadecimal<br />

to decimal from Rowlog0 (on disk value prior to transaction) and Rowlog1<br />

(committed transaction value) of the transaction log will be performed if necessary<br />

dur<strong>in</strong>g the analysis of the collected data (Section 3.1.4). However, only target<br />

columns relevant to the <strong>in</strong>vestigation will be exam<strong>in</strong>ed as there are more than 100<br />

columns <strong>in</strong> a SQL Server 2005 transaction log (Fowler, 2007).<br />

Then, the MD5 hash values of all the collected artefacts before and after<br />

analysis will have to be compared to check the <strong>in</strong>tegrity of the evidence <strong>in</strong> order to<br />

confirm there is no alternation on the digital evidence dur<strong>in</strong>g the analysis phase<br />

(Vacca, 2005). Hence, the evidence can be reliable, repeatable and acceptable to the<br />

court of law (Britz, 2009; Jone et al., 2006b).<br />

3.3.6 Data Analysis<br />

The forensic data analysis phase of the research will ma<strong>in</strong>ly focus on each artifact<br />

extracted from the three entities of the simulated <strong>RFID</strong> based BS (see Figure 3.10 <strong>in</strong><br />

Section 3.3).<br />

Reith, Carr and Gunsch (2002, pp. 6-7) stated the data analysis phase is to<br />

“determ<strong>in</strong>e significance, reconstruct fragments of data and draw conclusions based<br />

on evidence found”. As a result, <strong>in</strong> the data analysis phase of the research; all the<br />

forensic copies of the collected evidence copies (Section 3.3.5) will be comb<strong>in</strong>ed and<br />

analyzed on the forensic workstation by us<strong>in</strong>g different analysis techniques and<br />

forensic tools. For <strong>in</strong>stance, the analysis of collected volatile memory artefacts of<br />

POS/Server and <strong>RFID</strong> reader will be performed by us<strong>in</strong>g EnCase forensic software <strong>in</strong><br />

order to extract the valid evidence. Likewise, as stated <strong>in</strong> Section 3.1.3, the collected<br />

data concerned with volatile and non-volatile backend SQL Server data will also be<br />

analyzed <strong>in</strong> order to f<strong>in</strong>d the notable events irregular database activities and other<br />

potential evidence to proof the theft of SI. Then, the important evidence will be<br />

extracted and <strong>in</strong>cluded <strong>in</strong>to the timel<strong>in</strong>e of <strong>in</strong>vestigation (Fowler, 2009). In addition<br />

to us<strong>in</strong>g commercial forensic tool like EnCase, the manual search of the notable<br />

evidence on collected artifact (example: the SQL Server artifact collected by us<strong>in</strong>g<br />

76

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!