• DocumentCode
    3310011
  • Title

    Fast fingerprinting for file-system forensics

  • Author

    Chawathe, S.S.

  • Author_Institution
    Sch. of Comput. & Inf. Sci., Univ. of Maine, Orono, ME, USA
  • fYear
    2012
  • fDate
    13-15 Nov. 2012
  • Firstpage
    591
  • Lastpage
    596
  • Abstract
    An important method used to speed up forensic file-system analysis is white-listing of files: Well-known files are detected using signatures (message digests) or similar methods, and omitted from further analysis initially, in order to better focus the initial analysis on files likely to be more important. Typical examples of such well-known files include files used by operating systems, popular applications, and software libraries. This paper presents methods for improving the effectiveness and efficiency of such signature-based white-listing during file-system forensics. One concern for effectiveness is the resilience of the white-listing method to an adversary who has complete knowledge of the method and who may make small, inconsequential changes to a large number of well-known files on a target file-system in order to overload the analysis and thereby practically defeat it. Another concern is the ability to detect near-matches in addition to exact matches. Efficiency refers to primarily the rate at which a target file system may be processed during analysis; preparation-time, or indexing, efficiency is a lesser concern as that computation may be performed during non-critical times. Our work builds on techniques such as locality-sensitive hashing to yield an effective filter for further analysis tools.
  • Keywords
    cryptography; digital forensics; digital signatures; file organisation; fingerprint identification; fast fingerprinting; file-system forensics; forensic file-system analysis; locality-sensitive hashing; message digest; operating system; signature-based white-listing method; software libraries; Computers; Forensics; Humans; Indexes; Libraries; Vectors;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Homeland Security (HST), 2012 IEEE Conference on Technologies for
  • Conference_Location
    Waltham, MA
  • Print_ISBN
    978-1-4673-2708-4
  • Type

    conf

  • DOI
    10.1109/THS.2012.6459915
  • Filename
    6459915