Fast Fingerprinting for File-System Forensics

被引:0
|
作者
Chawathe, Sudarshan S. [1 ]
机构
[1] Univ Maine, Sch Comp & Informat Sci, Orono, ME 04469 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An important method used to speed up forensic file-system analysis is white-listing of files: Well-known files are detected using signatures (message digests) or similar methods, and omitted from further analysis initially, in order to better focus the initial analysis on files likely to be more important. Typical examples of such well-known files include files used by operating systems, popular applications, and software libraries. This paper presents methods for improving the effectiveness and efficiency of such signature-based white-listing during file-system forensics. One concern for effectiveness is the resilience of the white-listing method to an adversary who has complete knowledge of the method and who may make small, inconsequential changes to a large number of well-known files on a target file-system in order to overload the analysis and thereby practically defeat it. Another concern is the ability to detect near-matches in addition to exact matches. Efficiency refers to primarily the rate at which a target file system may be processed during analysis; preparation-time, or indexing, efficiency is a lesser concern as that computation may be performed during non-critical times. Our work builds on techniques such as locality-sensitive hashing to yield an effective filter for further analysis tools.
引用
收藏
页码:591 / 596
页数:6
相关论文
共 50 条
  • [21] CrashMonkey and ACE: Systematically Testing File-System Crash Consistency
    Mohan, Jayashree
    Martinez, Ashlie
    Ponnapalli, Soujanya
    Raju, Pandian
    Chidambaram, Vijay
    ACM TRANSACTIONS ON STORAGE, 2019, 15 (02)
  • [22] Fast probabilistic file fingerprinting for big data
    Tretyakov, Konstantin
    Laur, Sven
    Smant, Geert
    Vilo, Jaak
    Prins, Pjotr
    BMC GENOMICS, 2013, 14
  • [23] Fast probabilistic file fingerprinting for big data
    Konstantin Tretyakov
    Sven Laur
    Geert Smant
    Jaak Vilo
    Pjotr Prins
    BMC Genomics, 14
  • [24] BuddyFS: A File-System to Improve Data Deduplication in Virtualization Environments
    Wanigasekara, Nirandika
    Keppittiyagama, Chamath. I.
    2014 EIGHTH INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS (CISIS),, 2014, : 198 - 204
  • [25] A Control Point for Reducing Root Abuse of File-System Privileges
    Wurster, Glenn
    van Oorschot, Paul C.
    PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 224 - 236
  • [26] AUTOMATIC EVALUATION OF FILE-SYSTEM PROBLEM-SOLVING SKILLS
    Fiorentino, Giuseppe
    Fabrizio, Annalina
    Fiorentini, Daniele
    5TH INTERNATIONAL CONFERENCE OF EDUCATION, RESEARCH AND INNOVATION (ICERI 2012), 2012, : 5067 - 5074
  • [27] Multimedia file forensics system exploiting file similarity search
    Min-Ja Kim
    Chuck Yoo
    Young-Woong Ko
    Multimedia Tools and Applications, 2019, 78 : 5233 - 5254
  • [28] TxFS: Leveraging File-system Crash Consistency to Provide ACID Transactions
    Hu, Yige
    Zhu, Zhiting
    Neal, Ian
    Kwon, Youngjin
    Cheng, Tianyu
    Chidambaram, Vijay
    Witchel, Emmett
    ACM TRANSACTIONS ON STORAGE, 2019, 15 (02)
  • [29] Multimedia file forensics system exploiting file similarity search
    Kim, Min-Ja
    Yoo, Chuck
    Ko, Young-Woong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (05) : 5233 - 5254
  • [30] A Reliable Non-Volatile Memory System: Exploiting File-System Characteristics
    Wu, Chin-Hsien
    Chang, Wen-Yen
    Hong, Zen-Wei
    IEEE 15TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2009, : 202 - +