Towards a Process Model for Hash Functions in Digital Forensics

被引:3
作者
Breitinger, Frank [1 ]
Liu, Huajian [2 ]
Winter, Christian [2 ]
Baier, Harald [1 ]
Rybalchenko, Alexey [1 ]
Steinebach, Martin [2 ]
机构
[1] Hsch Darmstadt, Da Sec Biometr & Internet Secur Res Grp, Darmstadt, Germany
[2] Fraunhofer Inst Secure Informat Technol, Darmstadt, Germany
来源
DIGITAL FORENSICS AND CYBER CRIME, (ICDF2C 2013) | 2014年 / 132卷
关键词
Digital forensics; Hashing; Similarity hashing; Robust hashing; Perceptual hashing; Approximate matching; Process model;
D O I
10.1007/978-3-319-14289-0_12
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Handling forensic investigations gets more and more difficult as the amount of data one has to analyze is increasing continuously. A common approach for automated file identification are hash functions. The proceeding is quite simple: a tool hashes all files of a seized device and compares them against a database. Depending on the database, this allows to discard non-relevant (whitelisting) or detect suspicious files (blacklisting). One can distinguish three kinds of algorithms: (cryptographic) hash functions, bytewise approximate matching and semantic approximate matching (a. k. a perceptual hashing) where the main difference is the operation level. The latter one operates on the semantic level while both other approaches consider the byte-level. Hence, investigators have three different approaches at hand to analyze a device. First, this paper gives a comprehensive overview of existing approaches for bytewise and semantic approximate matching (for semantic we focus on images functions). Second, we compare implementations and summarize the strengths and weaknesses of all approaches. Third, we show how to integrate these functions based on a sample use case into one existing process model, the computer forensics field triage process model.
引用
收藏
页码:170 / 186
页数:17
相关论文
共 44 条
  • [1] [Anonymous], 2002, P EUR SIGN PROC C
  • [2] [Anonymous], P 12 INT C IM PROC
  • [3] [Anonymous], 2012, 7 ANN C DIGITAL FORE
  • [4] [Anonymous], 1995, STORAGE RETRIEVAL IM, DOI [DOI 10.1117/12.205308, 10.1117/12.205308]
  • [5] Baier H., 2012, P D A CH SEC 2012, P278
  • [6] Bhattacharjee S, 1998, 1998 INTERNATIONAL CONFERENCE ON IMAGE PROCESSING - PROCEEDINGS, VOL 1, P435, DOI 10.1109/ICIP.1998.723518
  • [7] SPACE/TIME TRADE/OFFS IN HASH CODING WITH ALLOWABLE ERRORS
    BLOOM, BH
    [J]. COMMUNICATIONS OF THE ACM, 1970, 13 (07) : 422 - &
  • [8] Breitinger F, 2013, 13 DIG FOR RES C DFR
  • [9] Breitinger F., 2013, IT SECURITY INCIDENT, V7
  • [10] Breitinger F, 2012, 4 ICST C DIG FOR CYB