Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps

When computer systems are increasingly important for our daily activities, cybercrime has created challenges for the criminal justice system. Data can be hidden in ADS (Alternate Data Stream) without hindering performance. This feature has been exploited by malware authors, criminals, terrorists, an...

Full description

Bibliographic Details
Main Author: Da-Yu Kao
Format: Article
Language:English
Published: MDPI AG 2020-07-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/10/13/4686
id doaj-f4bfe56d1be94ffb9e041df137a73f8a
record_format Article
spelling doaj-f4bfe56d1be94ffb9e041df137a73f8a2020-11-25T03:01:14ZengMDPI AGApplied Sciences2076-34172020-07-01104686468610.3390/app10134686Forensic Exchange Analysis of Contact Artifacts on Data Hiding TimestampsDa-Yu Kao0Department of Information Management, Central Police University, Taoyuan City 33304, TaiwanWhen computer systems are increasingly important for our daily activities, cybercrime has created challenges for the criminal justice system. Data can be hidden in ADS (Alternate Data Stream) without hindering performance. This feature has been exploited by malware authors, criminals, terrorists, and intelligence agents to erase, tamper, or conceal secrets. However, ADS problems are much ignored in digital forensics. Rare researches illustrated the contact artifacts of ADS timestamps. This paper performs a sequence of experiments from an inherited variety and provides an in-depth overview of timestamp transfer on data hiding operations. It utilizes files or folders as original media and uses the timestamp rules as an investigative approach for the forensic exchange analysis of file sets. This paper also explores timestamp rules using case examples, which allow practical applications of crime scene reconstruction to real-world contexts. The experiment results demonstrate the effectiveness of temporal attributes, help digital forensic practitioners to uncover hidden relations, and trace the contact artifacts among crime scenes, victims, and suspects/criminals.https://www.mdpi.com/2076-3417/10/13/4686data hidingtemporal attributestimestamp transferexchange principletrace evidencecontact artifacts
collection DOAJ
language English
format Article
sources DOAJ
author Da-Yu Kao
spellingShingle Da-Yu Kao
Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps
Applied Sciences
data hiding
temporal attributes
timestamp transfer
exchange principle
trace evidence
contact artifacts
author_facet Da-Yu Kao
author_sort Da-Yu Kao
title Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps
title_short Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps
title_full Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps
title_fullStr Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps
title_full_unstemmed Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps
title_sort forensic exchange analysis of contact artifacts on data hiding timestamps
publisher MDPI AG
series Applied Sciences
issn 2076-3417
publishDate 2020-07-01
description When computer systems are increasingly important for our daily activities, cybercrime has created challenges for the criminal justice system. Data can be hidden in ADS (Alternate Data Stream) without hindering performance. This feature has been exploited by malware authors, criminals, terrorists, and intelligence agents to erase, tamper, or conceal secrets. However, ADS problems are much ignored in digital forensics. Rare researches illustrated the contact artifacts of ADS timestamps. This paper performs a sequence of experiments from an inherited variety and provides an in-depth overview of timestamp transfer on data hiding operations. It utilizes files or folders as original media and uses the timestamp rules as an investigative approach for the forensic exchange analysis of file sets. This paper also explores timestamp rules using case examples, which allow practical applications of crime scene reconstruction to real-world contexts. The experiment results demonstrate the effectiveness of temporal attributes, help digital forensic practitioners to uncover hidden relations, and trace the contact artifacts among crime scenes, victims, and suspects/criminals.
topic data hiding
temporal attributes
timestamp transfer
exchange principle
trace evidence
contact artifacts
url https://www.mdpi.com/2076-3417/10/13/4686
work_keys_str_mv AT dayukao forensicexchangeanalysisofcontactartifactsondatahidingtimestamps
_version_ 1724694245934104576