OleDetection-Forensics and Anti-Forensics of Steganography in OLE2-Formatted Documents

被引:0
作者
Erbacher, Robert F. [1 ]
Daniels, Jason [1 ]
Montiero, Steena [1 ]
机构
[1] Utah State Univ, Dept Comp Sci, Logan, UT 84322 USA
来源
SADFE 2009: FOURTH INTERNATIONAL WORKSHOP ON SYSTEMATIC APPROACHES TO DIGITAL FORENSIC ENGINEERING, PROCEEDINGS | 2009年
关键词
Forensics; Anti-Forensics; steganography; Covert Channels; OLE2;
D O I
10.1109/SADFE.2009.18
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
New and improved data hiding techniques pose a problem for forensic analyst investigating computer crime. Computer criminals are able to hide information using stego-channels available in commonly used document formats, thereby hindering an investigator from acquiring possible important evidence. In this paper, we focus on detecting the use of stego-channels in the unused or dead space regions in the Object Linking and Embedding 2 (OLE2) specification used primarily by Microsoft's Office. The OleDetection algorithm [19] presented in this paper is focused on detecting the use of these stego-channels using a three-step process comprising the detection of dead regions in a document, the extraction of binary data and the generation of appropriate statistics using kurtosis and byte-frequency distribution, and the comparison of the calculated statistics with threshold values, which determines whether or not the document contains hidden data. This algorithm extends the work done by the StegOle algorithm [3]. Our experimental results shows that the OleDetection algorithm can correctly identify 99.97 percent of document with previous stego-channel techniques with a flase positive rate of only 0.65 percent. In addition, we present an anti-forensic techniques wherein OLE2 documents can be modified to hide data with greater detection avoidance characteristics [19]; thus reducing the accuracy of the current OleDetection implementation.
引用
收藏
页码:85 / 96
页数:12
相关论文
共 19 条
[1]   Information leakage caused by hidden data in published documents [J].
Byers, S .
IEEE SECURITY & PRIVACY, 2004, 2 (02) :23-27
[2]  
Cantrell G., 2004, Proceedings of the 2004 International Symposium on Information and Communication Technologies, P146
[3]   Taking advantages of a disadvantage: Digital forensics and steganography using document metadata [J].
Castiglione, Aniello ;
De Santis, A. ;
Soriente, C. .
JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (05) :750-764
[4]  
*COMP FOR WORLD, 2008, COMP FOR BAS FREQ AS
[5]  
Daniels Jason M, 2008, FORENSIC ANTIFORENSI
[6]  
Erbacher RF, 2007, INT WORK SYS APPR D, P55
[7]   TimeKeeper: A metadata archiving method for honeypot forensics [J].
Fairbanks, Kevin D. ;
Lee, Christopher P. ;
Xia, Ying H. ;
Owen, Henry L., III .
2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, :114-+
[8]  
Harris R., 2006, Proceedings of the 6th Annual Digital Forensic Research Workshop, P44
[9]  
Johnson M., 2006, P 8 WORKSH MULT SEC, P48
[10]   File type identification of data fragments by their binary structure [J].
Karresand, Martin ;
Shahmehri, Nahid .
2006 IEEE INFORMATION ASSURANCE WORKSHOP, 2006, :140-+