Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps
Abstract
:1. Introduction
- A discovery experiment (Section 3.3) to repeatedly classify temporal attributes as timestamp rules.
- An ADS experiment analogous to Kao and Chan in 2017 [11] as conducting comparative analyses in Case 2 (Section 5.2).
- Perform a sequence of experiments to explore the contact artifacts of timestamp transfer.
- Analyze temporal attributes and propose some timestamp rules from ADS operations.
- Uncover hidden relations using timestamp rules from an inherited variety.
- Support practitioners to explore any possible contact artifacts in connected devices.
- Evaluate the efficacy of several temporal values to reconstruct an event.
- Provide an in-depth overview of timestamp transfer on data hiding operations from a forensic exchange analysis perspective.
2. Background
2.1. Divisible Temporal Attributes of ADS Contact Artifacts
- Different detection methods can identify various ADS items and present consistent content.
- DOS DIR/r command and AlternateStreamView can detect more complete ADS data than others.
- The stream size of original media remains the same and bypass detection.
- Its stream allocated size increases in the results of the AlternateStreamView program.
2.2. Timestamp Transfer on Linking the Connected Devices
3. Research Design
- RQ 1. Are there any timestamp rules from temporal values in ADS operations?
- RQ 2. Can a practitioner uncover hidden relations in an inherited variety?
- RQ 3. Can a practitioner trace the contact artifacts of cover media?
3.1. Experimental Environment
3.2. Forensic Process Plan
- (1)
- Identification of evidential data
- (2)
- Classification/individualization of experimental objects
- (3)
- Associations from contact artifacts
- (4)
- Reconstructions of data hiding timestamps
- Temporal reconstruction to establish an event timeline,
- Functional reconstruction to uncover secret messages of former data hiding operations, and
- Relational reconstruction to correlate behavioral activities among crime scenes, victims, and suspects/criminals.
3.3. Observation Scenario
4. Experimental Analysis Results
4.1. Direct Analysis on Original Media (Temporal Reconstruction)
4.2. Cross-Sectional Analysis of Timestamp Orders (Relational Reconstruction)
- Who (m): original media (victims), marked media (suspects/criminals), and temporal attributes in file metadata (witness).
- What: ADS (data hiding) operations on cover media (files/folders) from suspects/criminals.
- When: temporal attributes in file metadata and temporal values in various timestamps.
- Where: crime scenes in different volumes, disks, targets, systems, locations, or devices.
- Which evidence (witness): file metadata, timestamps, Windows event logs, Prefetch files, link files, Registry keys, cookies, history records, and other sources.
- How: a good understanding of timestamp transfer and data hiding techniques.
4.3. ADS Analysis on Cover Media (Functional Reconstruction)
4.4. Analysis Results of File Sets
- (1)
- Temporal reconstruction from temporal values (RQ 1)
- $SI.E-time: The value of $SI.E-time in Step 24, c(tθ24), shows that the MFT entry record that points to the file is changed in this step.
- $SI.C-time and $FN.AC-time: The value of $SI.C-time and $FN.AC-time in Step 24, c(tθ3), shows its very original source file (F:\F1\W1.docx), which is created in Step 3 (Table 6).
- $FN.EM-time: The value of $FN.EM-time in Step 24, c(tθ15), shows that there is a hidden relation with former ADS operation file (F:\F1\W1.docx:EW-2.txt), which is created in Step 15 (Table 6).
- (2)
- Relational reconstruction in an inherited variety (RQ 2)
- A1–4 and B2–3 are inherited from A, c(tθ1)–c(tθ3).
- A3–4 and B2–3 are inherited from A2, c(tθ13)–c(tθ15).
- A4 and B2–3 are inherited from A3, c(tθ16)–c(tθ18).
- B1 are inherited from B, c(tθ7)–c(tθ9).
- (3)
- Functional reconstruction of cover media (RQ 3)
5. Discussions and Analyses on Case Examples
5.1. Case 1
5.2. Case 2
- Step C1. Word/txt file creation
- Step C2. Create data (text file) into the ADS of Word/text file
- Step C3. Decompress Word/text file
- Step C4. Create data (text, Word, PE, and jpg file) into the ADS of Word/text file
- Step C5. Extract the ADS from Word/text file
- Step C6. Delete the ADS from Word/text file
- (1)
- Finding timestamp rules from temporal values (RQ 1)
- Rule 1. When original media are created, all timestamps are technically equaled in Step C1. A time delay also happens during the process.
- Rule 2. When users delete the ADS from Word/text files, the $SI.E-time is updated in Step C6. Even though the user has different operations, their timestamp rules are the same situations with Rule 2 (modification or overwriting).
- Rule 3. Creating data (text, Word, PE, and jpg file) into the ADS of Word/text file will update the $SI.EM-time of original media in Step C2 and C4. Showing the actual file content becomes essential to identify their former ADS operations (creation, modification, or overwriting).
- Rule 6. Extracting the ADS from Word/text file will keep any timestamps unchanged in Step C5 and C6. The $SI timestamp order on original media (Rule 6) still holds.
- (2)
- Uncovering hidden relations in an inherited variety (RQ 2)
- W1 is inherited from W.
- W7 is inherited from W6.
- W8 is inherited from W4.
- T2 and T1 are inherited from T.
- T7 and T8 are inherited from T6.
- (3)
- Tracing the contact artifacts of cover media (RQ 3)
5.3. Limitations
- (1)
- The researcher cannot guarantee whether the timestamps have tampered.
- (2)
- Timestamp rules may change in different environments.
- (3)
- Every cybercrime case is unique.
6. Conclusions
Funding
Acknowledgments
Conflicts of Interest
Appendix A. Experimental Steps in Stage 1 (Creation)
- Step 1. F:\F1 Creation: (1) move to F drive, (2) press the rightmost button on a computer mouse, (3) add a new folder, and (4) rename the folder name as F1.
- Step 2. F:\F1\T1.txt Creation: (1) open Notepad and create a new text document, (2) input some data, and (3) save the text file name as T1.
- Step 3. F:\F1\W1.docx Creation: (1) open Microsoft Word and create a new text document, (2) input some data, and (3) save the Word file name as W1.
- Step 4. F:\F1:EF-1.txt Creation: F:\> echo “EF-1.txt” > F1:EF-1.txt
- Step 5. F:\F1\T1.txt:ET-1.txt Creation: F:\F1\> echo “ET-1.txt” > T1.txt:ET-1.txt
- Step 6. F:\F1\W1.docx:EW-1.txt Creation: F:\F1\> echo “EW-1.txt” > W1.docx:EW-1.txt
- Step 7. G:\F3 Creation: (1) move to G drive, (2) press the rightmost button on a computer mouse, (3) add a new folder, and (4) rename the folder name as F3.
- Step 8. G:\F3\T3.txt Creation: (1) open Notepad and create a new text document, (2) input some data, and (3) save the text file name as T3.
- Step 9. G:\F3\W3.docx Creation: (1) open Microsoft Word and create a new text document, (2) input some data, and (3) save the Word file name as W3.
- Step 10. G:\F3:EF-1.txt Creation: G:\> echo “EF-1.txt” > F3:EF-1.txt
- Step 11. G:\F3\T3.txt:ET-1.txt Creation: G:\F3\> echo “ET-1.txt” > T3.txt:ET-1.txt
- Step 12. G:\F3\W3.docx:EW-1.txt Creation: G:\F3\> echo “EW-1.txt” > W3.docx:EW-1.txt
- Step 13. F:\F1:EF-2.txt Creation: F:\> echo “EF-2.txt” > F1:EF-2.txt
- Step 14. F:\F1\T1.txt:ET-2.txt Creation: F:\F1\> echo “ET-2.txt” > T1.txt:ET-2.txt
- Step 15. F:\F1\W1.docx:EW-2.txt Creation: F:\F1\> echo “EW-2.txt” > W1.docx:EW-2.txt
Appendix B. Experimental Steps in Stage 2 (Modification)
- Step 16. Rename F:\F1 as F:\F3 (F:\> rename F:\F1 F:\F3)
- Step 17. Rename F:\F3\T1.txt as F:\F3\T3.txt (F:\> rename F:\F3\T1.txt F:\F3\T3.txt)
- Step 18. Rename F:\F3\W1.docx as F:\F3\W2.docx (F:\> rename F:\F3\W1.docx F:\F3\W2.docx)
- Step 19. F:\F3:EF-1.txt Modification: (1) F:\> notepad “F3:EF-1.txt,” (2) modify data, and (3) save it.
- Step 20. F:\F3\T3.txt:ET-1.txt Modification: (1) F:\F3\> notepad “T3.txt:ET-1.txt,” (2) modify data, and (3) save it.
- Step 21. F:\F3\W3.docx:EW-1.txt Modification: (1) F:\F3\> notepad “W3.docx:EW-1.txt,” (2) modify data, and (3) save it.
Appendix C. Experimental Steps in Stage 3 (Overwriting)
- Step 22. G:\F3 Overwrite F:\F3 (copy and replace)
- Step 23. G:\F3\T3.txt Overwrite F:\F3\T3.txt (copy and replace)
- Step 24. G:\F3\W3.docx Overwrite F:\F3\W3.docx (copy and replace)
- Step 25. F:\> type G:\F3:EF-1.txt > F3:EF-1.txt
- Step 26. F:\F3\> type G:\F3\T3.txt:ET-1.txt > T3.txt:ET-1.txt
- Step 27. F:\F3\> type G:\F3\W3.docx:EW-1.txt > W3.docx:EW-1.txt
References
- Palmbach, D.; Breitinger, F. Artifacts for Detecting Timestamp Manipulation in NTFS on Windows and Their Reliability. Forensic Sci. Int. Digit. Investig. 2020, 32S, 300920. [Google Scholar] [CrossRef]
- Dargahi, T.; Dehghantanha, A.; Bahrami, P.N.; Conti, M.; Bianchi, G.; Benedetto, L. A Cyber-Kill-Chain Based Taxonomy of Crypto-Ransomware Features. J. Comput. Virol. Hacking Tech. 2019, 15, 277–305. [Google Scholar] [CrossRef] [Green Version]
- Bang, J.; Yoo, B.; Lee, S. Analysis of Changes in File Time Attributes With File Manipulation. Digit. Investig. 2011, 7, 135–144. [Google Scholar] [CrossRef]
- Willassen, S.Y. Methods for Enhancement of Timestamp Evidence in Digital Investigations. Ph.D. Thesis, Norwegian University of Science and Technology, Trondheim, Norway, January 2008; pp. 106–124. [Google Scholar]
- Willassen, S.Y. Timestamp Evidence Correlation by Model Based Clock Hypothesis Testing. In Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, Adelaide, Australia, 21–23 January 2008. [Google Scholar]
- Šustr, J. Malware and the Possibilities of Its Evolution. Master’s Thesis, VŠB—Technical University of Ostrava, Ostrava, Czech, 2019; pp. 17–22. [Google Scholar]
- Krahl, K.M. Using Microsoft Word to Hide Data. Master’s Thesis, Utica College, Utica, NY, USA, 2017; pp. 1–13. [Google Scholar]
- Anson, S. Applied Incident Response; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 2020; pp. 311–318. [Google Scholar]
- Mahajan, R. Stealth ADS: Enhanced Framework for Alternate Data Streams. In Proceedings of the 2016 International Conference on Recent Advances and Innovations in Engineering (ICRAIE), Jaipur, India, 23–25 December 2016; pp. 1–5. [Google Scholar]
- Schneider, J.; Wolf, J.; Freiling, F. Tampering with Digital Evidence is Hard: The Case of Main Memory Images. Forensic Sci. Int. Digit. Investig. 2020, 32S, 300924. [Google Scholar] [CrossRef]
- Kao, D.Y.; Chan, Y.P. Identifying Temporal Patterns Using ADS in NTFS for Digital Forensics. Adv. Intell. Syst. Comput. 2018, 733, 273–285. [Google Scholar]
- Stephenson, P. Official (ISC)2® Guide to the Certified Cyber Forensics Professional (CCFP) Common Body of Knowledge (CBK); CRC Press: Boca Raton, FL, USA, 2014; pp. 293–404. [Google Scholar]
- Franqueira, V.N.L.; Horsman, G. Towards Sound Forensic Arguments: Structured Argumentation Applied to Digital Forensics Practice. Forensic Sci. Int. Digit. Investig. 2020, 32S, 300923. [Google Scholar] [CrossRef]
- Zola, F.; Bruse, J.L.; Eguimendia, M.; Galar, M.; Urrutia, R.O. Bitcoin and Cybersecurity: Temporal Dissection of Blockchain Data to Unveil Changes in Entity Behavioral Patterns. Appl. Sci. 2019, 9, 5003. [Google Scholar] [CrossRef] [Green Version]
- Shavers, B. Placing the Suspect behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects; Syngress Publishing: Waltham, MA, USA, 2013; pp. 85–122. [Google Scholar]
- Inman, K.; Rudin, N. Principles and Practice of Criminalistics: The Profession of Forensic Science; CRC Press: Boca Raton, FL, USA, 2000; pp. 113–192. [Google Scholar]
- Casey, E. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet, 3rd ed.; Elsevier Inc.: Amsterdam, The Netherlands, 2011; pp. 187–464. [Google Scholar]
- Casey, E. Handbook of Digital Forensics and Investigation; Elsevier Inc.: Amsterdam, The Netherlands, 2010; pp. 209–300. [Google Scholar]
- Carrier, B. File System Forensic Analysis; Pearson Education: London, UK, 2005; pp. 173–396. [Google Scholar]
- Kao, D.Y.; Lin, H.C. Dissecting Alternate Data Streams in Anti-Digital Forensics. Law Enforc. Rev. 2017, 13, 39–68. [Google Scholar]
- Raggo, M.; Hosmer, C. Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices, and Network Protocols; Syngress Publisher: Waltham, MA, USA, 2012; pp. 133–166. [Google Scholar]
- Mahant, S.H.; Meshram, B.B. ADS Examiner: Tool for NTFS Alternate Data Streams Forensics Analysis. Int. J. Eng. Res. Technol. IJERT 2012, 1, 1–10. [Google Scholar]
- Microsoft Corporation. API Index for Desktop Windows Applications. Available online: https://docs.microsoft.com/en-us/windows/win32/apiindex/windows-api-list (accessed on 30 April 2020).
- Microsoft Corporation. File Times. Available online: https://docs.microsoft.com/en-us/windows/win32/sysinfo/file-times (accessed on 30 April 2020).
- Microsoft Corporation. [SMS-FSA]: File System Algorithms. Available online: https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-fsa/860b1516-c452-47b4-bdbc-625d344e2041 (accessed on 30 April 2020).
- Shook, S. Cybercrime Investigation Body of Knowledge; CIBOK Editor Committee: Tokyo, Japan, 2017; pp. 155–200. [Google Scholar]
- Đuranec, A.; Topolčić, D.; Hausknecht, K.; Delija, D. Investigating File Use and Knowledge with Windows 10 Artifacts. In Proceedings of the 2019 42nd IEEE International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), Opatija, Croatia, 20–24 May 2019. [Google Scholar]
- Moreno, J.; Serrano, M.A.; Fernandez, E.B.; Fernández-Medina, E. Improving Incident Response in Big Data Ecosystems by Using Blockchain Technologies. Appl. Sci. 2020, 10, 724. [Google Scholar] [CrossRef] [Green Version]
- Nowostawski, M.; Tøn, J. Evaluating Methods for the Identification of Off-Chain Transactions in the Lightning Network. Appl. Sci. 2019, 9, 2519. [Google Scholar] [CrossRef] [Green Version]
- Din, R.; Mahmuddin, M.; Qasim, A.J. Review on Steganography Methods in Multi-Media Domain. Int. J. Eng. Technol. 2019, 8, 288–292. [Google Scholar]
- Hassan, N.A.; Hijazi, R. Data Hiding Techniques in Windows OS. A Practical Approach to Investigation and Defense; Syngress Publisher: Cambridge, MA, USA, 2016; pp. 267–289. [Google Scholar]
- Ho, S.M.; Kao, D.Y.; Wu, W.Y. Following the breadcrumbs: Timestamp pattern identification for cloud forensics. Digit. Investig. 2018, 24, 79–94. [Google Scholar] [CrossRef]
- Kao, D.Y.; Chen, Y.P.; Shih, N.H. Reconstructing ADS Data Hiding in Windows NTFS: A Temporal Analysis. Digit. Investig. 2018, 26, S137. [Google Scholar] [CrossRef]
- Akhgar, B.; Staniforth, A.; Bosco, F. Cyber Crime and Cyber Terrorism Investigator’s Handbook; Elsevier Publishing: Amsterdam, The Netherlands, 2014; pp. 88–90. [Google Scholar]
- Microsoft Corporation. File System Behavior in the Microsoft Windows Environment. Available online: http://download.microsoft.com/download/4/3/8/43889780-8d45-4b2e-9d3a-c696a890309f/filesystembehavioroverview.pdf (accessed on 30 April 2020).
- Bunting, S. EnCase Computer Forensics the Official EnCE Certified Examiner Study Guide, 3rd ed.; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 2012; pp. 33–88. [Google Scholar]
- Lee, W.Y.; Kim, K.H.; Lee, H. Extraction of Creation-Time for Recovered Files on Windows FAT32 File System. Appl. Sci. 2019, 9, 5522. [Google Scholar] [CrossRef] [Green Version]
- Criminal Investigation Bureau. News Releases. Available online: https://www.cib.gov.tw/News/Detail/42669 (accessed on 30 April 2020).
- Kävrestad, J. Guide to Digital Forensics—A Concise and Practical Introduction; Springer International Publishing: Cham, Switzerland, 2017; pp. 3–8. [Google Scholar]
Temporal Attributes | Properties in FTK | ||
---|---|---|---|
EMAC-time | $SI (STANDARD_INFORMATION) | $SI.E-time | INDX Entry Date Changed |
$SI.M-time | INDX Entry Date Modified | ||
$SI.A-time | INDX Entry Date Accessed | ||
$SI.C-time | INDX Entry Date Created | ||
$FN ($FILE_NAME) | $FN.E-time | Filename Date Changed (MFT) | |
$FN.M-time | Filename Date Modified (MFT) | ||
$FN.A-time | Filename Date Accessed (MFT) | ||
$FN.C-time | Filename Date Created (MFT) |
Type | Tools | Statement | Sample |
---|---|---|---|
Creation | Echo | Add data to ADS | echo “This is another ADS test file”> test.txt:ads.txt |
Type or copy | type marked.exe > test.txt:ads.exe copy marked.exe > test.txt:ads.exe | ||
> | marked.txt > original.txt:malicious.txt | ||
List | DIR /r | Lists the ADS files | dir/r |
LADS | |||
Streams | |||
AlternateStreamView | |||
Access, modification or overwriting | Notepad | Open, modify, or overwrite ADS text file | notepad test.txt:ads.txt |
MSPaint | Open, modify or overwrite images and graphics | mspaint test.txt:ads.jpg | |
Start | Execute PE file (Disable after Windows Vista version) | start test.txt:ads.exe | |
Deletion | Echo | Remove ADS file | echo “deleted ADS” > test.txt:ads.exe |
Analyses | Techniques | ||
---|---|---|---|
Native | Third-Party | ||
DOS DIR/r Command | LADS, Streams, AlternateStreamView | FTK | |
Differences | A Windows function | ADS detection tools | Forensic toolkit |
Similarities | All techniques can find and retrieve ADS information in NTFS artifacts |
Tool | |||
---|---|---|---|
Type | Details | Application Name | Details |
OS | Windows 7 Ultimate, 64-bit | Edit | Microsoft Office Word Notepad |
File system | NTFS file system | Forensic Toolkit | AccessData FTK Toolkit 6.2.1 AccessData FTK Imager 3.4.2.6. |
Drive | F and G | ADS Detection | AlternateStreamView v1.53, 64-bit |
Experimental objects | Folder, Text, and Word | Visual Analysis | IBM i2 Analyst’s Notebook v8.9 |
No | Stage | Experiment Setting | Cover Media Observations | |||||||
---|---|---|---|---|---|---|---|---|---|---|
Original Media | Marked Media | |||||||||
ADS Operations | Command | Drive | Without ADS | 1st ADS | 2nd ADS | |||||
Time | Variety | Time | Variety | Time | Variety | |||||
1 | Creation | Open and save | Echo | F | 1(a):θ1–3 | A | 1(b):θ4–6 | A1 | 1(e):θ13–15 | A2 |
G | 1(c):θ7–9 | B | 1(d):θ10–12 | B1 | N/A | |||||
2 | Modification | Rename and modify | Notepad | F | 2(a):θ16–18 | A3 | 2(b):θ19–21 | A4 | ||
3 | Overwriting | Copy and replace | Type | F/G | 3(a):θ22–24 | B2 | 3(b):θ25–27 | B3 |
Timestamp Rule | Creation Object | Time tθn | Experimental Objects | Temporal Value c(tθn) | |||||||
---|---|---|---|---|---|---|---|---|---|---|---|
$SI f,g | $FN e | ||||||||||
E | M | A | C | E | M | A | C | ||||
1(a): F Drive 1st Creation on Original Media (A) | |||||||||||
1 | F:\F1 | 12:52:34 PM(1) 12:52:35 PM(1’) * | Folder a | 1’ | 1 | 1 | 1 | 1 | 1 | 1 | 1 |
4 | F:\F1\T1.txt | 12:53:45 PM(2) | Folder d | 2 | 2 | 2 | 1 | 1 | 1 | 1 | 1 |
1 | Text a | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 2 | ||
4 | F:\F1\W1.docx | 12:55:02 PM(3) 12:55:03 PM(3’) * 12:55:04 PM(3’’) * | Folder d | 3’’ | 3’’ | 3’’ | 1 | 1 | 1 | 1 | 1 |
1 | Word a | 3’ | 3’ | 3’ | 3 | 3’ | 3’ | 3’ | 3 | ||
1(b): F Drive 1st ADS Creation on Marked Media (A1) | |||||||||||
3 | F:\F1:EF-1.txt | 12:58:00 PM(4) | Folder c | 4 | 4 | 3’’ | 1 | 1 | 1 | 1 | 1 |
7 | Folder: EF-1.txt g | N/A | 4 | 3’’ | 1 | N/A | |||||
F:\F1\T1.txt:ET-1.txt | 01:00:36 AM(5) | Folder | 4 | 4 | 3’’ | 1 | 1 | 1 | 1 | 1 | |
3 | Text c | 5 | 5 | 2 | 2 | 2 | 2 | 2 | 2 | ||
7 | Text: ET-1.txt g | N/A | 5 | 2 | 2 | N/A | |||||
F:\F1\W1.docx:EW-1.txt | 01:03:20 AM(6) | Folder | 4 | 4 | 3’’ | 1 | 1 | 1 | 1 | 1 | |
3/5 | Word c | 6 | 6 | 3’ | 3 | 3’e | 3’ e | 3’ e | 3 e | ||
7 | Word: EW-1.txt g | N/A | 6 | 3’ | 3 | N/A | |||||
1(c): G Drive 1st Creation on Original Media (B) | |||||||||||
1 | G:\F3 | 01:05:47 AM(7) | Folder a | 7 | 7 | 7 | 7 | 7 | 7 | 7 | 7 |
4 | G:\F3\T3.txt | 01:06:40 AM(8) | Folder d | 8 | 8 | 8 | 7 | 7 | 7 | 7 | 7 |
1 | Text a | 8 | 8 | 8 | 8 | 8 | 8 | 8 | 8 | ||
4 | G:\F3\W3.docx | 01:08:06 AM(9) 01:08:07 AM(9’) * | Folder d | 9’ | 9’ | 9’ | 7 | 7 | 7 | 7 | 7 |
1 | Word a | 9 | 9 | 9 | 9 | 9 | 9 | 9 | 9 | ||
1(d): G Drive 1st ADS Creation on Marked Media (B1) | |||||||||||
3 | G:\F3:EF-1.txt | 01:10:54 AM(10) | Folder c | 10 | 10 | 9’ | 7 | 7 | 7 | 7 | 7 |
7 | Folder: EF-1.txt g | N/A | 10 | 9’ | 7 | N/A | |||||
G:\F3\T3.txt:ET-1.txt | 01:15:07 AM(11) | Folder | 10 | 10 | 9’ | 7 | 7 | 7 | 7 | 7 | |
3 | Text c | 11 | 11 | 8 | 8 | 8 | 8 | 8 | 8 | ||
7 | Text: ET-1.txt g | N/A | 11 | 8 | 8 | N/A | |||||
G:\F3\W3.docx:EW-1.txt | 01:17:48 AM(12) | Folder | 10 | 10 | 9’ | 7 | 7 | 7 | 7 | 7 | |
3 | Word c | 12 | 12 | 9 | 9 | 9 | 9 | 9 | 9 | ||
7 | Word: EW-1.txt g | N/A | 12 | 9 | 9 | N/A | |||||
1(e): F Drive 2nd ADS Creation on Marked Media (A2) | |||||||||||
3/6 | F:\F1:EF-2.txt | 01:21:39 AM(13) | Folderc | 13 f | 13 f | 3’’ f | 1 f | 1 | 1 | 1 | 1 |
7 | Folder:EF-1.txt g | N/A | 13 | 3’’ | 1 | N/A | |||||
7 | Folder:EF-2.txt g | 13 | 3’’ | 1 | |||||||
F:\F1\T1.txt:ET-2.txt | 01:26:02 AM(14) | Folder | 13 | 13 | 3’’ | 1 | 1 | 1 | 1 | 1 | |
3/6 | Textc | 14 f | 14 f | 2 f | 2 f | 2 | 2 | 2 | 2 | ||
7 | Text:ET-1.txt g | N/A | 14 | 2 | 2 | N/A | |||||
7 | Text:ET-2.txt g | 14 | 2 | 2 | |||||||
F:\F1\W1.docx:EW-2.txt | 01:28:21 AM(15) | Folder | 13 | 13 | 3’’ | 1 | 1 | 1 | 1 | 1 | |
3/5/6 | Wordc | 15 f | 15 f | 3’ f | 3 f | 3’ e | 3’ e | 3’ e | 3 e | ||
7 | Word:EW-1.txt g | N/A | 15 | 3’ | 3 | N/A | |||||
7 | Word:EW-2.txt g | 15 | 3’ | 3 |
Timestamp Rule | Modification Object | Time tθn | Experimental Objects | Temporal Value c(tθn) | |||||||
---|---|---|---|---|---|---|---|---|---|---|---|
$SI f,g | $FN e | ||||||||||
E | M | A | C | E e | M e | A | C | ||||
2(a): F Drive Modification on Original Media (A3) | |||||||||||
2/5/6 | F:\F3 | 01:30:34 AM(16) | Folder f | 16 b,f | 13 e,f | 3’’ f | 1 f | 13 e | 13 e | 3’’ e | 1 e |
4 | F:\F3\T3.txt | 01:32:34 AM(17) | Folder d | 17 | 17 | 17 | 1 | 13 | 13 | 3’’ | 1 |
2/5/6 | Text f | 17 b,f | 14e,f | 2 f | 2 f | 14 e | 14 e | 2 | 2 | ||
4 | F:\F3\W3.docx | 01:35:31 AM(18) | Folder d | 18 | 18 | 18 | 1 | 13 | 13 | 3’’ | 1 |
2/5/6 | Word f | 18 b,f | 15 e,f | 3’ f | 3 f | 15 e | 15 e | 3’ | 3 | ||
2(b): F Drive 1st ADS Modification on Marked Media (A4) | |||||||||||
3 | F:\F3:EF-1.txt | 01:43:48 AM(19) | Folder c | 19 | 19 | 18 | 1 | 13 | 13 | 3’’ | 1 |
7 | Folder:EF-1.txt g | N/A | 19 g | 18 g | 1 g | N/A | |||||
Folder:EF-2.txt g | 19 g | 18 g | 1 g | ||||||||
F:\F3\T3.txt:ET-1.txt | 01:46:41 AM(20) | Folder | 19 | 19 | 18 | 1 | 13 | 13 | 3’’ | 1 | |
3 | Text c | 20 | 20 | 2 | 2 | 14 | 14 | 2 | 2 | ||
7 | Text:ET-1.txt g | N/A | 20 | 2 | 2 | N/A | |||||
Text:ET-2.txt g | 20 | 2 | 2 | ||||||||
F:\F3\W3.docx: EW-1.txt | 01:49:23 AM (21) | Folder | 19 | 19 | 18 | 1 | 13 | 13 | 3’’ | 1 | |
3 | Word c | 21 | 21 | 3’ | 3 | 15 | 15 | 3’ | 3 | ||
7 | Word:EW-1.txt g | N/A | 21 | 3’ | 3 | N/A | |||||
Word:EW-2.txt g | 21 | 3’ | 3 |
Timestamp Rule | Overwriting Object | Time tθn | Experimental Objects | Temporal Value c(tθn) | |||||||
---|---|---|---|---|---|---|---|---|---|---|---|
$SI | $FN | ||||||||||
E | M | A | C | E | M | A | C | ||||
3(a): F: Overwriting on Original Media (B2) | |||||||||||
G:\F3 overwrite F:\F3 | 01:51:42 AM(22) | Folder | 19 | 19 | 18 | 1 | 13 | 13 | 3’’ | 1 | |
2 | Text b | 22 | 11 | 2 | 2 | 14 | 14 | 2 | 2 | ||
Word b | 22 | 12 | 3’ | 3 | 15 | 15 | 3’ | 3 | |||
G:\F3\T3.txt overwrite F:\F3\T3.txt | 01:57:00 AM(23) | Folder | 19 | 19 | 18 | 1 | 13 | 13 | 3’’ | 1 | |
2 | Text b | 23 | 11 | 2 | 2 | 14 | 14 | 2 | 2 | ||
G:\F3\W3.docx overwrite F:\F3\W3.docx | 01:58:42 AM(24) | Folder | 19 | 19 | 18 | 1 | 13 | 13 | 3’’ | 1 | |
2 | Word b | 24 | 12 | 3’ | 3 | 15 | 15 | 3’ | 3 | ||
3(b): F: 1st ADS Overwriting on Marked Media (B3) | |||||||||||
3 | F:\F3:EF-1.txt | 02:07:53 AM(25) | Folder c | 25 | 25 | 18 | 1 | 13 | 13 | 3’’ | 1 |
7 | Folder:EF-1.txt g | N/A | 25 | 18 | 1 | N/A | |||||
Folder:EF-2.txt g | 25 | 18 | 1 | ||||||||
F:\F3\T3.txt:ET-1.txt | 02:11:03 AM(26) | Folder | 25 | 25 | 18 | 1 | 13 | 13 | 3’’ | 1 | |
3 | Text c | 26 | 26 | 2 | 2 | 14 | 14 | 2 | 2 | ||
7 | Text:ET-1.txt g | N/A | 26 | 2 | 2 | N/A | |||||
Text:ET-2.txt * | N/A | ||||||||||
F:\F3\W3.docx: EW-1.txt | 03:06:31 AM(27) | Folder | 25 | 25 | 18 | 1 | 13 | 13 | 3’’ | 1 | |
3 | Word c | 27 | 27 | 3’ | 3 | 15 | 15 | 3’ | 3 | ||
7 | Word:EW-1.txt g | N/A | 27 | 3’ | 3 | N/A | |||||
Word:EW-2.txt * | N/A |
RQ | Analysis | Reconstruction | Aim | Observation | Rule | Details |
---|---|---|---|---|---|---|
1 | Direct analysis on original media | Temporal reconstruction from temporal values | Finding timestamp rules | 1 | 1 | Created time similarity |
2 | 2 | Updated time in modification/overwriting | ||||
3 | 3 | Updated time inherited from its marked media | ||||
4 | 4 | Updated folder time inherited from its file creation | ||||
2 | Cross-sectional analysis of timestamp orders | Relational reconstruction in an inherited variety | Uncovering hidden relations | 5 | 5 | $FN timestamp order on original media |
6 | 6 | $SI timestamp order on original media | ||||
7 | 7 | $SI timestamp order on marked media | ||||
3 | ADS analysis on cover media | Functional reconstruction of cover media | Tracing the contact artifacts | 8 | 1/2 | Baseline observation without any ADS operations |
9 | 6 | Original media ($SI.E-time) after ADS operations | ||||
10 | 7 | Marked media ($SI.M-time) after ADS operations |
Stage/Type | Drive | Cover Media | |||||
---|---|---|---|---|---|---|---|
Original Media | Marked Media | ||||||
Folder | Text File | Word File | Folder | Text File | Word File | ||
1(a)1(b) | F: | F:\F1 | F:\F1\T1.txt | F:\F1\W1.docx | F:\F1:EF-1.txt | F:\F1\T1.txt:ET-1.txt | F:\F1\W1.docx:EW-1.txt |
1(c)1(d) | G: | G:\F3 | G:\F3\T3.txt | G:\F3\W3.docx | G:\F3:EF-1.txt | G:\F3\T3.txt:ET-1.txt | G:\F3\W3.txt:EW-1.txt |
1(e) | F: | F:\F1 | F:\F1\T1.txt | F:\F1\W1.docx | F:\F1:EF-2.txt | F:\F1\T1.txt:ET-2.txt | F:\F1\W1.docx:EW-2.txt |
2 | F: | F:\F3 | F:\F3\T3.txt | F:\F3\W3.docx | F:\F3:EF-1.txt | F:\F3\T3.txt:ET-1.txt | F:\F3\W3.docx:EW-1.txt |
3 | F: | F:\F3 | F:\F3\T3.txt | F:\F3\W3.docx | F:\F3:EF-1.txt | F:\F3\T3.txt:ET-1.txt | F:\F3\W3.docx:EW-1.txt |
Creation | $SI $FN | $SI.EMAC-time ≒ $FN.EMAC-time a | Missing value for $SI.E-time and $FN.EMAC-time | ||||
Updated Rule | $SI | $SI.E-time b, $SI.EM-time c | $SI.A-time g | $SI.M-timeg | |||
$SI.EMA-time d | N/A | ||||||
$FN | $FN.A-time e | $FN.EM-time e | N/A | ||||
Sequential Order | $SI | $SI.C-time ≤ $SI.A-time ≤ $SI.M-time$SI.E-time f | $SI.AC-time ≤ $SI.M-time g | ||||
$FN | $FN.C-time ≤ $FN.A-time ≤ $FN.EM-time e | N/A |
Timestamp Rule | Stage | 1. Creation | 2. Modification | 3. Overwriting | |||
---|---|---|---|---|---|---|---|
Observation | |||||||
Rule | Cover Media | Experimental Objects | Table 6 | Table 7 | Table 8 | ||
1 | Original | File/Folder | ≒ a | N/A | |||
2 | File | N/A | $SI.E-time b | ||||
3 | File/Folder | $SI.EM-time c | |||||
4 | Folder | $SI.EMA-time d | N/A | ||||
5 | File/Folder | $FN.EM-time e | $FN.A-time e | N/A | |||
6 | Marked | $SI.M-time g | $SI.MA-time g | ||||
Without ADS operations | Original | EMAC-time a | $SI.E-time b | ||||
With ADS operations | $SI.EM-time c | ||||||
Marked | $SI.M-time g |
Timestamp Rule | ADS Operation Steps | Original Media Time tθn | Inherited Variety | Temporal Value c(tθn) | |||||||
---|---|---|---|---|---|---|---|---|---|---|---|
$SI | $FN | ||||||||||
E | M | A | C | E | M | A | C | ||||
1 | C1.1:Word file creation | 05:03:09(1)/ 05:03:10(1′) | W | 1′ | 1′ | 1′ | 1 | 1′ | 1′ | 1′ | 1 |
3 | C2.1: Create data (text file) into the ADS of Word file | 05:10:46(3) | W1 | 3 | 3 | 1′ | 1 | 1′ | 1′ | 1′ | 1 |
N/A | C3.1: Decompress Word file | 09:44:27(5) | W2 | 5 | 1′ | 5 | 5 | 5 | 5 | 5 | 5 |
3 | C4.1: Create data (text file) into the ADS of Word file | 09:50:26(7) | W3 | 7 | 7 | 5 | 5 | 5 | 5 | 5 | 5 |
3 | C4.3: Create data (Word file) into the ADS of Word file | 09:52:23(9) | W4 | 9 | 9 | 5 | 5 | 5 | 5 | 5 | 5 |
3 | C4.5: Create data (PE file) into the ADS of Word file | 09:54:36(11) | W5 | 11 | 11 | 5 | 5 | 5 | 5 | 5 | 5 |
3 | C4.7: Create data (jpg file) into the ADS of Word file | 09:56:28(13) | W6 | 13 | 13 | 5 | 5 | 5 | 5 | 5 | 5 |
6 | C5.1: Extract the ADS from Word file | 10:07:42(15) | W7 | 13 | 13 | 5 | 5 | 5 | 5 | 5 | 5 |
2/6 | C6.1: Delete the ADS from Word file | 10:09:00(17) | W8 | 17 | 9 | 5 | 5 | 5 | 5 | 5 | 5 |
Timestamp Rule | ADS Operation Steps | Original Media Time tθn | Inherited Variety | Temporal Value c(tθn) | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|
$SI | $FN | |||||||||||
E | M | A | C | E | M | A | C | |||||
1 | C1.2: Text file creation | 05:03:20 (2) | T | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 2 | |
3 | C2.2: Create data (text file) into the ADS of text file | 05:11:41(4) | T1 | 4 | 4 | 2 | 2 | 2 | 2 | 2 | 2 | |
N/A | C3.2: Decompress text file | Typo [11] | 05:03:20 (2) | T2 | 2 | 1′ | 2 | 2 | 2 | 2 | 2 | 2 |
Correct | 09:44:27 (5) = (6) | 5 | 2 | 5 | 5 | 5 | 5 | 5 | 5 | |||
3 | C4.2: Create data (text file) into the ADS of text file | 09:50:58(8) | T3 | 8 | 8 | 5 | 5 | 5 | 5 | 5 | 5 | |
3 | C4.4: Create data (Word file) into the ADS of text file | 09:52:57(10) | T4 | 10 | 10 | 5 | 5 | 5 | 5 | 5 | 5 | |
3 | C4.6: Create data (PE file) into the ADS of text file | 09:55:10(12) | T5 | 12 | 12 | 5 | 5 | 5 | 5 | 5 | 5 | |
3 | C4.8: Create data (jpg file) into the ADS of text file | 09:56:59(14) | T6 | 14 | 14 | 5 | 5 | 5 | 5 | 5 | 5 | |
6 | C5.2: Extract the ADS from text file | 10:08:01(16) | T7 | 14 | 14 | 5 | 5 | 5 | 5 | 5 | 5 | |
2/6 | C6.2: Delete the ADS from text file | 10:09:07(18) | T8 | 18 | 14 | 5 | 5 | 5 | 5 | 5 | 5 |
© 2020 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kao, D.-Y. Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps. Appl. Sci. 2020, 10, 4686. https://doi.org/10.3390/app10134686
Kao D-Y. Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps. Applied Sciences. 2020; 10(13):4686. https://doi.org/10.3390/app10134686
Chicago/Turabian StyleKao, Da-Yu. 2020. "Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps" Applied Sciences 10, no. 13: 4686. https://doi.org/10.3390/app10134686
APA StyleKao, D.-Y. (2020). Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps. Applied Sciences, 10(13), 4686. https://doi.org/10.3390/app10134686