Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps
When computer systems are increasingly important for our daily activities, cybercrime has created challenges for the criminal justice system. Data can be hidden in ADS (Alternate Data Stream) without hindering performance. This feature has been exploited by malware authors, criminals, terrorists, an...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-07-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/10/13/4686 |
id |
doaj-f4bfe56d1be94ffb9e041df137a73f8a |
---|---|
record_format |
Article |
spelling |
doaj-f4bfe56d1be94ffb9e041df137a73f8a2020-11-25T03:01:14ZengMDPI AGApplied Sciences2076-34172020-07-01104686468610.3390/app10134686Forensic Exchange Analysis of Contact Artifacts on Data Hiding TimestampsDa-Yu Kao0Department of Information Management, Central Police University, Taoyuan City 33304, TaiwanWhen computer systems are increasingly important for our daily activities, cybercrime has created challenges for the criminal justice system. Data can be hidden in ADS (Alternate Data Stream) without hindering performance. This feature has been exploited by malware authors, criminals, terrorists, and intelligence agents to erase, tamper, or conceal secrets. However, ADS problems are much ignored in digital forensics. Rare researches illustrated the contact artifacts of ADS timestamps. This paper performs a sequence of experiments from an inherited variety and provides an in-depth overview of timestamp transfer on data hiding operations. It utilizes files or folders as original media and uses the timestamp rules as an investigative approach for the forensic exchange analysis of file sets. This paper also explores timestamp rules using case examples, which allow practical applications of crime scene reconstruction to real-world contexts. The experiment results demonstrate the effectiveness of temporal attributes, help digital forensic practitioners to uncover hidden relations, and trace the contact artifacts among crime scenes, victims, and suspects/criminals.https://www.mdpi.com/2076-3417/10/13/4686data hidingtemporal attributestimestamp transferexchange principletrace evidencecontact artifacts |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Da-Yu Kao |
spellingShingle |
Da-Yu Kao Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps Applied Sciences data hiding temporal attributes timestamp transfer exchange principle trace evidence contact artifacts |
author_facet |
Da-Yu Kao |
author_sort |
Da-Yu Kao |
title |
Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps |
title_short |
Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps |
title_full |
Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps |
title_fullStr |
Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps |
title_full_unstemmed |
Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps |
title_sort |
forensic exchange analysis of contact artifacts on data hiding timestamps |
publisher |
MDPI AG |
series |
Applied Sciences |
issn |
2076-3417 |
publishDate |
2020-07-01 |
description |
When computer systems are increasingly important for our daily activities, cybercrime has created challenges for the criminal justice system. Data can be hidden in ADS (Alternate Data Stream) without hindering performance. This feature has been exploited by malware authors, criminals, terrorists, and intelligence agents to erase, tamper, or conceal secrets. However, ADS problems are much ignored in digital forensics. Rare researches illustrated the contact artifacts of ADS timestamps. This paper performs a sequence of experiments from an inherited variety and provides an in-depth overview of timestamp transfer on data hiding operations. It utilizes files or folders as original media and uses the timestamp rules as an investigative approach for the forensic exchange analysis of file sets. This paper also explores timestamp rules using case examples, which allow practical applications of crime scene reconstruction to real-world contexts. The experiment results demonstrate the effectiveness of temporal attributes, help digital forensic practitioners to uncover hidden relations, and trace the contact artifacts among crime scenes, victims, and suspects/criminals. |
topic |
data hiding temporal attributes timestamp transfer exchange principle trace evidence contact artifacts |
url |
https://www.mdpi.com/2076-3417/10/13/4686 |
work_keys_str_mv |
AT dayukao forensicexchangeanalysisofcontactartifactsondatahidingtimestamps |
_version_ |
1724694245934104576 |