ABSTRACT
Current methods for artifact analysis and understanding depend on investigator expertise. Experienced and technically savvy examiners spend a lot of time reverse engineering applications while attempting to find crumbs they leave behind on systems. This takes away valuable time from the investigative process, and slows down forensic examination. Furthermore, when specific artifact knowledge is gained, it stays within the respective forensic units. To combat these challenges, we present ForensicAF, an approach for leveraging curated, crowd-sourced artifacts from the Artifact Genome Project (AGP). The approach has the overarching goal of uncovering forensically relevant artifacts from storage media. We explain our approach and construct it as an Autopsy Ingest Module. Our implementation focused on both File and Registry artifacts. We evaluated ForensicAF using systematic and random sampling experiments. While ForensicAF showed consistent results with registry artifacts across all experiments, it also revealed that deeper folder traversal yields more File Artifacts during data source ingestion. When experiments were conducted on case scenario disk images without apriori knowledge, ForensicAF uncovered artifacts of forensic relevance that help in solving those scenarios. We contend that ForensicAF is a promising approach for artifact extraction from storage media, and its utility will advance as more artifacts are crowd-sourced by AGP.
- [n.d.]. Dutch National Police Agency. http://ocfa.sourceforge.net/. Accessed: 2010-12-12.Google Scholar
- [n.d.]. Encase Forensic. http://www.guidancesoftware.com/products/ef_index.asp. Accessed: 2007-12-12.Google Scholar
- [n.d.]. Forensic Toolkit (FTK). https://accessdata.com/products-services/forensic-toolkit-ftk. Accessed: 2021-02-04.Google Scholar
- Inikpi O Ademu, Chris O Imafidon, and David S Preston. 2011. A new approach of digital forensic model for digital forensic investigation. Int. J. Adv. Comput. Sci. Appl 2, 12 (2011), 175–178.Google Scholar
- Apache Foundation. [n.d.]. Class XSSFWorkbook. https://poi.apache.org/apidocs/dev/org/apache/poi/xssf/usermodel/XSSFWorkbook.html.Google Scholar
- Ibrahim Baggili and Frank Breitinger. 2015. Data Sources for Advancing Cyber Forensics: What the Social World Has to Offer. AAAI Spring Symposium Series. https://www.aaai.org/ocs/index.php/SSS/SSS15/paper/view/10227/10092Google Scholar
- Ibrahim Baggili, Andrew Marrington, and Yasser Jafar. 2014. Performance of a logical, five-phase, multithreaded, bootable triage tool. In IFIP International Conference on Digital Forensics. Springer, 279–295.Google Scholar
Cross Ref
- Willi Ballenthin. 2014. Rejistry. https://github.com/williballenthin/Rejistry.Google Scholar
- Sean Barnum. 2012. Standardizing cyber threat intelligence information with the structured threat information expression (stix). Mitre Corporation 11(2012), 1–22.Google Scholar
- Basis Technology. [n.d.]. Autopsy - Autopsy Forensic Browser Developer’s Guide and API Reference. https://www.sleuthkit.org/autopsy/docs/api-docs/4.0/mod_dev_py_page.html. Accessed: 2020-02-06.Google Scholar
- Nicole Beebe. 2009. Digital forensic research: The good, the bad and the unaddressed. In IFIP International conference on digital forensics. Springer, 17–36.Google Scholar
Cross Ref
- Frank Breitinger, Huajian Liu, Christian Winter, Harald Baier, Alexey Rybalchenko, and Martin Steinebach. 2013. Towards a process model for hash functions in digital forensics. In International Conference on Digital Forensics and Cyber Crime. Springer, 170–186.Google Scholar
- Brian Carrier. 2009. The Sleuth Kit and Autopsy: forensics tools for Linux and other Unixes, 2005. URL http://www. sleuthkit. org(2009).Google Scholar
- Brian Carrier 2003. Defining digital forensic examination and analysis tools using abstraction layers. International Journal of digital evidence 1, 4 (2003), 1–12.Google Scholar
- Sudarshan S Chawathe. 2009. Effective whitelisting for filesystem forensics. In 2009 IEEE International Conference on Intelligence and Security Informatics. IEEE, 131–136.Google Scholar
Digital Library
- MI Cohen. 2008. PyFlag–An advanced network forensic framework. Digital investigation 5(2008), S112–S120.Google Scholar
- D. Compton, J. A. Hamilton, and Jr.2011. An Examination of the Techniques and Implications of the Crowd-Sourced Collection of Forensic Data. In 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing. 892–895. https://doi.org/10.1109/PASSAT/SocialCom.2011.232Google Scholar
- Vicka Corey, Charles Peterman, Sybil Shearin, Michael S Greenberg, and James Van Bokkelen. 2002. Network forensics analysis. IEEE Internet Computing 6, 6 (2002), 60–66.Google Scholar
Digital Library
- Josiah Dykstra and Alan T Sherman. 2013. Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform. Digital Investigation 10(2013), S87–S95.Google Scholar
Digital Library
- Forensic Artifacts. 2021. artifacts. https://github.com/ForensicArtifacts/artifacts.Google Scholar
- Baguelin Frederic, Jacob Solal, Mounier Jeremy, and Percot Francois. 2010. Digital forensics framework.Google Scholar
- Simson L Garfinkel. 2007. Carving contiguous and fragmented files with fast object validation. digital investigation 4(2007), 2–12.Google Scholar
- Simson L Garfinkel. 2009. Automating disk forensic processing with SleuthKit, XML and Python. In 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering. IEEE, 73–84.Google Scholar
Digital Library
- Simson L Garfinkel. 2010. Digital forensics research: The next 10 years. digital investigation 7(2010), S64–S73.Google Scholar
- Eric Gentry, Ryan McIntyre, Michael Soltys, and Frank Lyu. 2019. SEAKER: A tool for fast digital forensic triage. In Future of Information and Communication Conference. Springer, 1227–1243.Google Scholar
- Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon Clark, and Frank Breitinger. 2018. Experience constructing the artifact genome project (agp): Managing the domain’s knowledge one artifact at a time. Digital Investigation 26(2018), S47–S58.Google Scholar
Digital Library
- Grand View Research. 2019. Digital Forensics Market Size is expected to grow to USD 6.95 billion by 2025. https://www.grandviewresearch.com/industry-analysis/digital-forensics-market. Accessed: 2021-02-02.Google Scholar
- Vikram S Harichandran, Frank Breitinger, and Ibrahim Baggili. 2016. Bytewise approximate matching: the good, the bad, and the unknown. Journal of Digital Forensics, Security and Law 11, 2 (2016), 4.Google Scholar
- Vikram S Harichandran, Frank Breitinger, Ibrahim Baggili, and Andrew Marrington. 2016. A cyber forensics needs analysis survey: Revisiting the domain’s needs a decade later. Computers & Security 57(2016), 1–13.Google Scholar
Digital Library
- Vikram S Harichandran, Daniel Walnycky, Ibrahim Baggili, and Frank Breitinger. 2016. Cufa: A more formal definition for digital forensic artifacts. Digital Investigation 18(2016), S125–S137.Google Scholar
Digital Library
- Alastair Irons and Harjinder Singh Lallie. 2014. Digital forensics to intelligent forensics. Future Internet 6, 3 (2014), 584–596.Google Scholar
Cross Ref
- Vacius Jusas, Darius Birvinskas, and Elvar Gahramanov. 2017. Methods and tools of digital triage in forensic context: Survey and future directions. Symmetry 9, 4 (2017), 49.Google Scholar
Cross Ref
- Thomas Laurenson. 2017. Automated Digital Forensic Triage: Rapid Detection of Anti-Forensic Tools. Ph.D. Dissertation. University of Otago.Google Scholar
- log2timeline. 2021. Plaso. https://github.com/log2timeline/plaso.Google Scholar
- Laoise Luciano, Ibrahim Baggili, Mateusz Topor, Peter Casey, and Frank Breitinger. 2018. Digital forensics in the next five years. In Proceedings of the 13th International Conference on Availability, Reliability and Security. 1–14.Google Scholar
Digital Library
- Sebastian Neuner, Martin Schmiedecker, and Edgar Weippl. 2016. Effectiveness of file-based deduplication in digital forensics. Security and Communication Networks 9, 15 (2016), 2876–2885.Google Scholar
Digital Library
- Golden G Richard III and Vassil Roussev. 2005. Scalpel: A Frugal, High Performance File Carver.. In DFRWS. Citeseer.Google Scholar
- Marcus K Rogers, James Goldman, Rick Mislan, Timothy Wedge, and Steve Debrota. 2016. Paper Session II: Computer Forensics Field Triage Process Model. (2016).Google Scholar
- Marcus K Rogers and Kate Seigfried. 2004. The future of computer forensics: a needs analysis survey. Computers & Security 23, 1 (2004), 12–16.Google Scholar
Digital Library
- Vassil Roussev, Yixin Chen, Timothy Bourg, and Golden G Richard III. 2006. md5bloom: Forensic filesystem hashing revisited. digital investigation 3, 1 (2006), 82–90.Google Scholar
- Keyun Ruan, Ibrahim Baggili, Joe Carthy, and Tahar Kechadi. 2011. Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis. (2011).Google Scholar
- Keyun Ruan, Joe Carthy, Tahar Kechadi, and Ibrahim Baggili. 2013. Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results. Digital Investigation 10, 1 (2013), 34–43.Google Scholar
Digital Library
- Laura Sanchez, Cinthya Grajeda, Ibrahim Baggili, and Cory Hall. 2019. A practitioner survey exploring the value of forensic tools, ai, filtering, & safer presentation for investigating child sexual abuse material (csam). Digital Investigation 29(2019), S124–S142.Google Scholar
Digital Library
- George Sibiya, Hein S Venter, and Thomas Fogwill. 2012. Digital forensic framework for a cloud environment. (2012).Google Scholar
- Harm MA van Beek, Jeroen van den Bos, Abdul Boztas, EJ van Eijk, R Schramp, and M Ugen. 2020. Digital forensics as a service: Stepping up the game. Forensic Science International: Digital Investigation 35 (2020), 301021.Google Scholar
Cross Ref
Recommendations
Summarization of Neonatal Video EEG for Seizure and Artifact Detection
Monitoring neonatal EEG signal is useful in identifying neonatal convulsions or seizures. For neonates, seizures can be electrographic, electro clinical, or both simultaneously. Electrographic seizure is identified via recorded EEG signal, while electro ...
Multiresolution ICA for artifact identification from electroencephalographic recordings
This paper addresses the issue of artifact extraction from Electroencephalographic (EEG) signals and introduces a new technique for EEG artifact removal, based on the joint use of Wavelet transform and Independent Component Analysis (WICA). In fact, EEG ...





Comments