Digital Forensic Acquisition Kill Chain – Analysis and Demonstration
The increasing complexity and security of consumer products pose major challenges to digital forensics. Gaining access to encrypted user data without user credentials is a very difficult task. Such situations may require law enforcement to leverage offensive techniques – such as vulnerability exploi...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Alendal, Gunnar Dyrkolbotn, Geir Olav Axelsson, Stefan |
description | The increasing complexity and security of consumer products pose major challenges to digital forensics. Gaining access to encrypted user data without user credentials is a very difficult task. Such situations may require law enforcement to leverage offensive techniques – such as vulnerability exploitation – to bypass security measures in order to retrieve data in digital forensic investigations.
This chapter proposes a digital forensic acquisition kill chain to assist law enforcement in acquiring forensic data using offensive techniques. The concept is discussed and examples are provided to illustrate the various kill chain phases. The anticipated results of applying the kill chain include improvements in performance and success rates in short-term, case-motivated, digital forensic acquisition scenarios as well as in long-term, case-independent planning and research scenarios focused on identifying vulnerabilities and leveraging them in digital forensic acquisition methods and tools. |
format | Article |
fullrecord | <record><control><sourceid>cristin_3HK</sourceid><recordid>TN_cdi_cristin_nora_11250_3032228</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>11250_3032228</sourcerecordid><originalsourceid>FETCH-cristin_nora_11250_30322283</originalsourceid><addsrcrecordid>eNrjZHBzyUzPLEnMUXDLL0rNK85MVnBMLizNLM4syczPU_DOzMlRcM5IzMxTeNQwWcExLzGnsjizWCExL0XBJTU3P6-4pCgRpJKHgTUtMac4lRdKczMourmGOHvoJhdlFpdk5sXn5RclxhsaGpkaxBsbGBsZGVkYE6MGAEODM4M</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Digital Forensic Acquisition Kill Chain – Analysis and Demonstration</title><source>NORA - Norwegian Open Research Archives</source><creator>Alendal, Gunnar ; Dyrkolbotn, Geir Olav ; Axelsson, Stefan</creator><creatorcontrib>Alendal, Gunnar ; Dyrkolbotn, Geir Olav ; Axelsson, Stefan</creatorcontrib><description>The increasing complexity and security of consumer products pose major challenges to digital forensics. Gaining access to encrypted user data without user credentials is a very difficult task. Such situations may require law enforcement to leverage offensive techniques – such as vulnerability exploitation – to bypass security measures in order to retrieve data in digital forensic investigations.
This chapter proposes a digital forensic acquisition kill chain to assist law enforcement in acquiring forensic data using offensive techniques. The concept is discussed and examples are provided to illustrate the various kill chain phases. The anticipated results of applying the kill chain include improvements in performance and success rates in short-term, case-motivated, digital forensic acquisition scenarios as well as in long-term, case-independent planning and research scenarios focused on identifying vulnerabilities and leveraging them in digital forensic acquisition methods and tools.</description><language>eng</language><publisher>Springer</publisher><creationdate>2021</creationdate><rights>info:eu-repo/semantics/openAccess</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>230,780,885,26567</link.rule.ids><linktorsrc>$$Uhttp://hdl.handle.net/11250/3032228$$EView_record_in_NORA$$FView_record_in_$$GNORA$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Alendal, Gunnar</creatorcontrib><creatorcontrib>Dyrkolbotn, Geir Olav</creatorcontrib><creatorcontrib>Axelsson, Stefan</creatorcontrib><title>Digital Forensic Acquisition Kill Chain – Analysis and Demonstration</title><description>The increasing complexity and security of consumer products pose major challenges to digital forensics. Gaining access to encrypted user data without user credentials is a very difficult task. Such situations may require law enforcement to leverage offensive techniques – such as vulnerability exploitation – to bypass security measures in order to retrieve data in digital forensic investigations.
This chapter proposes a digital forensic acquisition kill chain to assist law enforcement in acquiring forensic data using offensive techniques. The concept is discussed and examples are provided to illustrate the various kill chain phases. The anticipated results of applying the kill chain include improvements in performance and success rates in short-term, case-motivated, digital forensic acquisition scenarios as well as in long-term, case-independent planning and research scenarios focused on identifying vulnerabilities and leveraging them in digital forensic acquisition methods and tools.</description><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>3HK</sourceid><recordid>eNrjZHBzyUzPLEnMUXDLL0rNK85MVnBMLizNLM4syczPU_DOzMlRcM5IzMxTeNQwWcExLzGnsjizWCExL0XBJTU3P6-4pCgRpJKHgTUtMac4lRdKczMourmGOHvoJhdlFpdk5sXn5RclxhsaGpkaxBsbGBsZGVkYE6MGAEODM4M</recordid><startdate>2021</startdate><enddate>2021</enddate><creator>Alendal, Gunnar</creator><creator>Dyrkolbotn, Geir Olav</creator><creator>Axelsson, Stefan</creator><general>Springer</general><scope>3HK</scope></search><sort><creationdate>2021</creationdate><title>Digital Forensic Acquisition Kill Chain – Analysis and Demonstration</title><author>Alendal, Gunnar ; Dyrkolbotn, Geir Olav ; Axelsson, Stefan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-cristin_nora_11250_30322283</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Alendal, Gunnar</creatorcontrib><creatorcontrib>Dyrkolbotn, Geir Olav</creatorcontrib><creatorcontrib>Axelsson, Stefan</creatorcontrib><collection>NORA - Norwegian Open Research Archives</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Alendal, Gunnar</au><au>Dyrkolbotn, Geir Olav</au><au>Axelsson, Stefan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Digital Forensic Acquisition Kill Chain – Analysis and Demonstration</atitle><date>2021</date><risdate>2021</risdate><abstract>The increasing complexity and security of consumer products pose major challenges to digital forensics. Gaining access to encrypted user data without user credentials is a very difficult task. Such situations may require law enforcement to leverage offensive techniques – such as vulnerability exploitation – to bypass security measures in order to retrieve data in digital forensic investigations.
This chapter proposes a digital forensic acquisition kill chain to assist law enforcement in acquiring forensic data using offensive techniques. The concept is discussed and examples are provided to illustrate the various kill chain phases. The anticipated results of applying the kill chain include improvements in performance and success rates in short-term, case-motivated, digital forensic acquisition scenarios as well as in long-term, case-independent planning and research scenarios focused on identifying vulnerabilities and leveraging them in digital forensic acquisition methods and tools.</abstract><pub>Springer</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_cristin_nora_11250_3032228 |
source | NORA - Norwegian Open Research Archives |
title | Digital Forensic Acquisition Kill Chain – Analysis and Demonstration |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T00%3A28%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-cristin_3HK&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Digital%20Forensic%20Acquisition%20Kill%20Chain%20%E2%80%93%20Analysis%20and%20Demonstration&rft.au=Alendal,%20Gunnar&rft.date=2021&rft_id=info:doi/&rft_dat=%3Ccristin_3HK%3E11250_3032228%3C/cristin_3HK%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |