Time for Truth: Forensic Analysis of NTFS Timestamps

被引:5
|
作者
Galhuber, Michael [1 ]
Luh, Robert [1 ,2 ]
机构
[1] St Polten Univ Appl Sci, Polten, Austria
[2] Univ Vienna, Vienna, Austria
关键词
digital forensics; windows; NTFS; timestamps; anti-forensics;
D O I
10.1145/3465481.3470016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Timeline forgery a widely employed technique in computer antiforensics. Numerous freely available and easy-to-use tampering tools make it difficult for forensic scientists to collect legally valid evidence and reconstruct a credible timeline. At the same time, the large number of possible file operations performed by a genuine user can result in a wide variety of timestamp patterns that pose a challenge when reconstructing a chain of events, especially since application-specific discrepancies are often disregarded. In this paper, we investigate timestamp patterns resulting from common user operations in NTFS, providing a much needed update to the Windows time rules derived from older experiments. We show that specific applications can cause deviations from expected behavior and provide analysts with a comprehensive set of behavioral rules for all permissible NTFS file operations. Finally, we analyze the effect and efficacy of 7 third party timestamp forgery tools as well as a custom PowerShell solution, and highlight forensic artifacts pointing at data falsification.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Reconstructing Timelines: From NTFS Timestamps to File Histories
    Bouma, Jelle
    Jonker, Hugo
    van der Meer, Vincent
    van den Aker, Eddy
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [2] Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS
    Neuner, Sebastian
    Voyiatzis, Artemios G.
    Schmiedecker, Martin
    Weippl, Edgar R.
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [3] Detection of Timestamps Tampering in NTFS using Machine Learning
    Mohamed, Alji
    Khalid, Chougdali
    10TH INT CONF ON EMERGING UBIQUITOUS SYST AND PERVAS NETWORKS (EUSPN-2019) / THE 9TH INT CONF ON CURRENT AND FUTURE TRENDS OF INFORMAT AND COMMUN TECHNOLOGIES IN HEALTHCARE (ICTH-2019) / AFFILIATED WORKOPS, 2019, 160 : 778 - 784
  • [4] Forensic Exchange Analysis of Contact Artifacts on Data Hiding Timestamps
    Kao, Da-Yu
    APPLIED SCIENCES-BASEL, 2020, 10 (13):
  • [5] TIME, TIMESTAMPS, AND TIMESCALES
    Stenn, Harlan
    REQUIREMENTS FOR UTC AND CIVIL TIMEKEEPING ON EARTH, 2013, 115 : 259 - 268
  • [6] Visualizing the truth: a survey of multimedia forensic analysis
    Diwan, Anjali
    Sonkar, Upasana
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (16) : 47979 - 48006
  • [7] Visualizing the truth: a survey of multimedia forensic analysis
    Anjali Diwan
    Upasana Sonkar
    Multimedia Tools and Applications, 2024, 83 : 47979 - 48006
  • [8] A computer forensic method for detecting timestamp forgery in NTFS
    Cho, Gyu-Sang
    COMPUTERS & SECURITY, 2013, 34 : 36 - 46
  • [9] Retruth Reconnaissance: A Digital Forensic Analysis of Truth Social
    Brown, Joseph
    Baggili, Ibrahim
    DIGITAL FORENSICS AND CYBER CRIME, PT 1, ICDF2C 2023, 2024, 570 : 96 - 113
  • [10] Truth Behind Speech:Forensic Linguistic Analysis on Speech
    唐电弟
    李艳萍
    海外英语, 2013, (23) : 278 - 279+282