23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

WFT tool and ad-hoc acquisition method) may be <strong>in</strong>volved <strong>in</strong> the data analysis phase.<br />

However, only the collected data <strong>in</strong> the range of <strong>in</strong>vestigation timel<strong>in</strong>e will be<br />

analyzed and evidence recovered or analysis results will be stored on the forensic<br />

workstation.<br />

Moreover, as stated <strong>in</strong> Section 3.3.5; the comparison of the hash values before<br />

and after the analysis will also be performed for evidence <strong>in</strong>tegrity check<strong>in</strong>g. One of<br />

the critical parts of data analysis is documentation, as Britz (2009) mentioned, which<br />

is very significant <strong>in</strong> any forensic <strong>in</strong>vestigation although computer crime<br />

<strong>in</strong>vestigations may not be the same. Hence, all the process of analyz<strong>in</strong>g collected data<br />

and evidence recovered will be documented and those documented analysis events<br />

will later be useful for <strong>in</strong>tegrity check<strong>in</strong>g and present<strong>in</strong>g the evidence related to the<br />

theft of SI <strong>in</strong> the court. Consequently, the evidence recovered will be used to<br />

reconstruct the timel<strong>in</strong>e when the attack occurs, to determ<strong>in</strong>e how the backend server<br />

data is manipulated, and so forth <strong>in</strong> order to answer the research question mentioned<br />

<strong>in</strong> Section 3.2.6. Thus, the forensic analysis of digital evidence is an important phase<br />

of digital forensic <strong>in</strong>vestigation.<br />

3.3.7 Data Presentation<br />

After analyz<strong>in</strong>g and document<strong>in</strong>g the evidence related to the theft of SI <strong>in</strong> a simulated<br />

<strong>RFID</strong> BS, the evidence recovered will be present<strong>in</strong>g <strong>in</strong> the table or diagram formats<br />

as part of the data presentation phase <strong>in</strong> the forensic <strong>in</strong>vestigation.<br />

The data presentation phase will <strong>in</strong>volve the results of analysis of collected<br />

artefacts, the reasons why the tools and procedures are chosen to perform the<br />

<strong>in</strong>vestigation, hash<strong>in</strong>g comparison of the evidence files before and after analysis for<br />

evidence reliability and <strong>in</strong>tegrity (as stated <strong>in</strong> Section 3.3.5), and the like.<br />

Furthermore, the correlation of the evidence exam<strong>in</strong>ed will also be presented <strong>in</strong> order<br />

to reconstruct the malicious activity to proof the theft of SI. For <strong>in</strong>stance, the table or<br />

diagram of volatile data <strong>in</strong> relation to the reconstruction of malicious attack and non-<br />

volatile data <strong>in</strong> relation to the reconstruction of the malicious attack will be presented.<br />

Likewise, the group<strong>in</strong>g the analysis results of collected artefacts towards the purpose<br />

of <strong>in</strong>vestigation will be presented. For example, the contributions of the analysis<br />

results of database users, authentication and authorization sett<strong>in</strong>gs of non-volatile<br />

77

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!