Digital Forensic Acquisition Kill Chain – Analysis and Demonstration

The increasing complexity and security of consumer products pose major challenges to digital forensics. Gaining access to encrypted user data without user credentials is a very difficult task. Such situations may require law enforcement to leverage offensive techniques – such as vulnerability exploi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Alendal, Gunnar, Dyrkolbotn, Geir Olav, Axelsson, Stefan
Format: Artikel
Sprache:eng
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Alendal, Gunnar
Dyrkolbotn, Geir Olav
Axelsson, Stefan
description The increasing complexity and security of consumer products pose major challenges to digital forensics. Gaining access to encrypted user data without user credentials is a very difficult task. Such situations may require law enforcement to leverage offensive techniques – such as vulnerability exploitation – to bypass security measures in order to retrieve data in digital forensic investigations. This chapter proposes a digital forensic acquisition kill chain to assist law enforcement in acquiring forensic data using offensive techniques. The concept is discussed and examples are provided to illustrate the various kill chain phases. The anticipated results of applying the kill chain include improvements in performance and success rates in short-term, case-motivated, digital forensic acquisition scenarios as well as in long-term, case-independent planning and research scenarios focused on identifying vulnerabilities and leveraging them in digital forensic acquisition methods and tools.
format Article
fullrecord <record><control><sourceid>cristin_3HK</sourceid><recordid>TN_cdi_cristin_nora_11250_3032228</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>11250_3032228</sourcerecordid><originalsourceid>FETCH-cristin_nora_11250_30322283</originalsourceid><addsrcrecordid>eNrjZHBzyUzPLEnMUXDLL0rNK85MVnBMLizNLM4syczPU_DOzMlRcM5IzMxTeNQwWcExLzGnsjizWCExL0XBJTU3P6-4pCgRpJKHgTUtMac4lRdKczMourmGOHvoJhdlFpdk5sXn5RclxhsaGpkaxBsbGBsZGVkYE6MGAEODM4M</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Digital Forensic Acquisition Kill Chain – Analysis and Demonstration</title><source>NORA - Norwegian Open Research Archives</source><creator>Alendal, Gunnar ; Dyrkolbotn, Geir Olav ; Axelsson, Stefan</creator><creatorcontrib>Alendal, Gunnar ; Dyrkolbotn, Geir Olav ; Axelsson, Stefan</creatorcontrib><description>The increasing complexity and security of consumer products pose major challenges to digital forensics. Gaining access to encrypted user data without user credentials is a very difficult task. Such situations may require law enforcement to leverage offensive techniques – such as vulnerability exploitation – to bypass security measures in order to retrieve data in digital forensic investigations. This chapter proposes a digital forensic acquisition kill chain to assist law enforcement in acquiring forensic data using offensive techniques. The concept is discussed and examples are provided to illustrate the various kill chain phases. The anticipated results of applying the kill chain include improvements in performance and success rates in short-term, case-motivated, digital forensic acquisition scenarios as well as in long-term, case-independent planning and research scenarios focused on identifying vulnerabilities and leveraging them in digital forensic acquisition methods and tools.</description><language>eng</language><publisher>Springer</publisher><creationdate>2021</creationdate><rights>info:eu-repo/semantics/openAccess</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,780,885,26567</link.rule.ids><linktorsrc>$$Uhttp://hdl.handle.net/11250/3032228$$EView_record_in_NORA$$FView_record_in_$$GNORA$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Alendal, Gunnar</creatorcontrib><creatorcontrib>Dyrkolbotn, Geir Olav</creatorcontrib><creatorcontrib>Axelsson, Stefan</creatorcontrib><title>Digital Forensic Acquisition Kill Chain – Analysis and Demonstration</title><description>The increasing complexity and security of consumer products pose major challenges to digital forensics. Gaining access to encrypted user data without user credentials is a very difficult task. Such situations may require law enforcement to leverage offensive techniques – such as vulnerability exploitation – to bypass security measures in order to retrieve data in digital forensic investigations. This chapter proposes a digital forensic acquisition kill chain to assist law enforcement in acquiring forensic data using offensive techniques. The concept is discussed and examples are provided to illustrate the various kill chain phases. The anticipated results of applying the kill chain include improvements in performance and success rates in short-term, case-motivated, digital forensic acquisition scenarios as well as in long-term, case-independent planning and research scenarios focused on identifying vulnerabilities and leveraging them in digital forensic acquisition methods and tools.</description><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>3HK</sourceid><recordid>eNrjZHBzyUzPLEnMUXDLL0rNK85MVnBMLizNLM4syczPU_DOzMlRcM5IzMxTeNQwWcExLzGnsjizWCExL0XBJTU3P6-4pCgRpJKHgTUtMac4lRdKczMourmGOHvoJhdlFpdk5sXn5RclxhsaGpkaxBsbGBsZGVkYE6MGAEODM4M</recordid><startdate>2021</startdate><enddate>2021</enddate><creator>Alendal, Gunnar</creator><creator>Dyrkolbotn, Geir Olav</creator><creator>Axelsson, Stefan</creator><general>Springer</general><scope>3HK</scope></search><sort><creationdate>2021</creationdate><title>Digital Forensic Acquisition Kill Chain – Analysis and Demonstration</title><author>Alendal, Gunnar ; Dyrkolbotn, Geir Olav ; Axelsson, Stefan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-cristin_nora_11250_30322283</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Alendal, Gunnar</creatorcontrib><creatorcontrib>Dyrkolbotn, Geir Olav</creatorcontrib><creatorcontrib>Axelsson, Stefan</creatorcontrib><collection>NORA - Norwegian Open Research Archives</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Alendal, Gunnar</au><au>Dyrkolbotn, Geir Olav</au><au>Axelsson, Stefan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Digital Forensic Acquisition Kill Chain – Analysis and Demonstration</atitle><date>2021</date><risdate>2021</risdate><abstract>The increasing complexity and security of consumer products pose major challenges to digital forensics. Gaining access to encrypted user data without user credentials is a very difficult task. Such situations may require law enforcement to leverage offensive techniques – such as vulnerability exploitation – to bypass security measures in order to retrieve data in digital forensic investigations. This chapter proposes a digital forensic acquisition kill chain to assist law enforcement in acquiring forensic data using offensive techniques. The concept is discussed and examples are provided to illustrate the various kill chain phases. The anticipated results of applying the kill chain include improvements in performance and success rates in short-term, case-motivated, digital forensic acquisition scenarios as well as in long-term, case-independent planning and research scenarios focused on identifying vulnerabilities and leveraging them in digital forensic acquisition methods and tools.</abstract><pub>Springer</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_cristin_nora_11250_3032228
source NORA - Norwegian Open Research Archives
title Digital Forensic Acquisition Kill Chain – Analysis and Demonstration
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T00%3A28%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-cristin_3HK&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Digital%20Forensic%20Acquisition%20Kill%20Chain%20%E2%80%93%20Analysis%20and%20Demonstration&rft.au=Alendal,%20Gunnar&rft.date=2021&rft_id=info:doi/&rft_dat=%3Ccristin_3HK%3E11250_3032228%3C/cristin_3HK%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true