DocumentCode :
1804331
Title :
Forensic entropy analysis of microsoft windows storage volumes
Author :
Weston, Paul ; Wolthusen, Stephen D.
Author_Institution :
Inf. Security Group, Univ. of London, Egham, UK
fYear :
2013
fDate :
14-16 Aug. 2013
Firstpage :
1
Lastpage :
7
Abstract :
The use of file or volume encryption as a counter-forensic technique, particularly when combined with stegano-graphic mechanisms, depends on the ability to plausibly deny the presence of such encrypted data. Establishing the likely presence of encrypted data is hence highly desirable for forensic investigations, particularly if an automated heuristic can be devised. Similarly, forensic analysts must be able to identify whether a volume has been sanitised by re-installation and subsequent re-population with user data as otherwise significant information such as slack space contents and files of interest will be unavailable. We claim that the current or previous existence of encrypted volumes can be derived from studying file and volume entropy characteristics based on knowledge of the development of volume entropy over time. To validate our hypothesis, we have examined several versions of the Microsoft Windows operating system platform over a simulated installation life-cycle and established file and volume entropy metrics. Similarly, using the same mechanisms, we verified the hypothesis that the aging through regular use of an installation is identifiable through entropy fingerprint analysis. The results obtained allow the rapid identification of several volume-level operations including copying and wiping, but also to detect anomalous slack space entropy indicative of the use of encryption techniques. Similarly, entropy and randomness tests have been devised which provide heuristics for the differentiation of encrypted data from other high-entropy data such as compressed media data.
Keywords :
cryptography; digital forensics; operating systems (computers); steganography; Microsoft Windows operating system platform; Microsoft Windows storage volumes; anomalous slack space entropy detection; counter-forensic technique; entropy fingerprint analysis; file encryption; file entropy characteristics; file entropy metrics; forensic entropy analysis; stegano-graphic mechanisms; volume encryption; volume entropy characteristics; volume entropy metrics; volume-level operations; Aging; Cryptography; Entropy; Forensics; Image coding; Media; Operating systems; Encrypted File Systems; File System Entropy; Installation Aging;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security for South Africa, 2013
Conference_Location :
Johannesburg
Type :
conf
DOI :
10.1109/ISSA.2013.6641056
Filename :
6641056
Link To Document :
بازگشت