Fast Fingerprinting for File-System Forensics

被引:0
|
作者
Chawathe, Sudarshan S. [1 ]
机构
[1] Univ Maine, Sch Comp & Informat Sci, Orono, ME 04469 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An important method used to speed up forensic file-system analysis is white-listing of files: Well-known files are detected using signatures (message digests) or similar methods, and omitted from further analysis initially, in order to better focus the initial analysis on files likely to be more important. Typical examples of such well-known files include files used by operating systems, popular applications, and software libraries. This paper presents methods for improving the effectiveness and efficiency of such signature-based white-listing during file-system forensics. One concern for effectiveness is the resilience of the white-listing method to an adversary who has complete knowledge of the method and who may make small, inconsequential changes to a large number of well-known files on a target file-system in order to overload the analysis and thereby practically defeat it. Another concern is the ability to detect near-matches in addition to exact matches. Efficiency refers to primarily the rate at which a target file system may be processed during analysis; preparation-time, or indexing, efficiency is a lesser concern as that computation may be performed during non-critical times. Our work builds on techniques such as locality-sensitive hashing to yield an effective filter for further analysis tools.
引用
收藏
页码:591 / 596
页数:6
相关论文
共 50 条
  • [1] Ffsck: The Fast File-System Checker
    Ma, Ao
    Dragga, Chris
    Arpaci-Dusseau, Andrea C.
    Arpaci-Dusseau, Remzi H.
    Mckusick, Marshall Kirk
    ACM TRANSACTIONS ON STORAGE, 2014, 10 (01)
  • [2] File-System Litter
    Neville-Neil, George V.
    COMMUNICATIONS OF THE ACM, 2011, 54 (10) : 25 - 26
  • [3] Heterogeneous File Sharing by File-System Emulation
    Ing, Cherng-Ying
    Lee, Tzao-Lin
    2008 13TH ASIA-PACIFIC COMPUTER SYSTEMS ARCHITECTURE CONFERENCE, 2008, : 376 - 379
  • [4] Cashing in on the File-System Cache
    Tiwari, Trishita
    Trachtenberg, Ari
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2303 - 2305
  • [5] FILE-SYSTEM WORKLOAD ON A SCIENTIFIC MULTIPROCESSOR
    KOTZ, D
    NIEUWEJAAR, N
    IEEE PARALLEL & DISTRIBUTED TECHNOLOGY, 1995, 3 (01): : 51 - 60
  • [6] A file-system abstraction for virtualized infrastructure
    Danciu, Vitalian A.
    2015 11TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2015, : 419 - 427
  • [7] FILE-SYSTEM DEVELOPMENT WITH STACKABLE LAYERS
    HEIDEMANN, JS
    POPEK, GJ
    ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1994, 12 (01): : 58 - 89
  • [8] Analysis and Improvement of Linux File-system
    Xiong, Ping
    DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 1255 - 1259
  • [9] Study on the Method of Encrypting File-system on Android
    Li, Xiu
    Li, Dai-Ping
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 1001 - 1006
  • [10] MR-AFS: a global hierarchical file-system
    Reuter, H
    FUSION ENGINEERING AND DESIGN, 2000, 48 (1-2) : 199 - 204