TY - JOUR
T1 - Forensic signature for tracking storage devices
T2 - Analysis of UEFI firmware image, disk signature and windows artifacts
AU - Jeong, Doowon
AU - Lee, Sangjin
N1 - Publisher Copyright:
© 2019 Elsevier Ltd
PY - 2019/6
Y1 - 2019/6
N2 - Tracking storage devices is one of the important fields in digital forensics. The existing methods and tools about registry, event log or IconCache analysis help solving cases on confidential leakage, illegal copying, and security incident cases. However, previous approach has drawback in tracking storage devices such as HDD, SSD, and etc since it was based on the good performance of USB device tracking. Another drawback in previous approach is that it is vulnerable to anti-forensics because the artifacts are dependent on the operating system. This paper introduces a new definition of forensic signature for tracking various storage devices and reviews the known artifacts. Furthermore, this study introduces unidentified artifact stored in UEFI firmware image and independent of operating system. Moreover, this paper develops a methodology for tracking storage devices using forensic signature according to the storage type.
AB - Tracking storage devices is one of the important fields in digital forensics. The existing methods and tools about registry, event log or IconCache analysis help solving cases on confidential leakage, illegal copying, and security incident cases. However, previous approach has drawback in tracking storage devices such as HDD, SSD, and etc since it was based on the good performance of USB device tracking. Another drawback in previous approach is that it is vulnerable to anti-forensics because the artifacts are dependent on the operating system. This paper introduces a new definition of forensic signature for tracking various storage devices and reviews the known artifacts. Furthermore, this study introduces unidentified artifact stored in UEFI firmware image and independent of operating system. Moreover, this paper develops a methodology for tracking storage devices using forensic signature according to the storage type.
KW - Digital investigation
KW - Disk forensics
KW - Disk serial number
KW - Firmware image analysis
KW - UEFI
UR - https://www.scopus.com/pages/publications/85062462970
U2 - 10.1016/j.diin.2019.02.004
DO - 10.1016/j.diin.2019.02.004
M3 - Article
AN - SCOPUS:85062462970
SN - 1742-2876
VL - 29
SP - 21
EP - 27
JO - Digital Investigation
JF - Digital Investigation
ER -