The growing impact of full disk encryption on digital forensics

被引:14
|
作者
Casey, Eoghan [1 ]
Fellows, Geoff [1 ]
Geiger, Matthew [1 ]
Stellatos, Gerasimos [1 ]
机构
[1] CmdLabs, Baltimore, MD 21218 USA
关键词
Digital forensics; Full disk encryption; Hard drive encryption; Volatile data; Memory forensics;
D O I
10.1016/j.diin.2011.09.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing use of full disk encryption (FDE) can significantly hamper digital investigations, potentially preventing access to all digital evidence in a case. The practice of shutting down an evidential computer is not an acceptable technique when dealing with FDE or even volume encryption because it may result in all data on the device being rendered inaccessible for forensic examination. To address this challenge, there is a pressing need for more effective on-scene capabilities to detect and preserve encryption prior to pulling the plug. In addition, to give digital investigators the best chance of obtaining decrypted data in the field, prosecutors need to prepare search warrants with FDE in mind. This paper describes how FDE has hampered past investigations, and how circumventing FDE has benefited certain cases. This paper goes on to provide guidance for gathering items at the crime scene that may be useful for accessing encrypted data, and for performing on-scene forensic acquisitions of live computer systems. These measures increase the chances of acquiring digital evidence in an unencrypted state or capturing an encryption key or passphrase. Some implications for drafting and executing search warrants to dealing with FDE are discussed. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:129 / 134
页数:6
相关论文
共 50 条
  • [1] Growing societal impact of digital forensics and incident response
    [J]. Casey, E. (eoghan@disclosedigital.com), 1600, Elsevier Ltd (11):
  • [2] Growing societal impact of digital forensics and incident response
    Casey, Eoghan
    [J]. DIGITAL INVESTIGATION, 2014, 11 (01) : 1 - 2
  • [3] Extending Full Disk Encryption for the Future
    Broz, Milan
    [J]. SECURITY PROTOCOLS XXV, 2017, 10476 : 109 - 115
  • [4] A Novel Digital Audio Encryption and Forensics Watermarking Scheme
    He, Junjie
    Zhu, Pei
    Liu, Zhenghui
    Cao, Yi
    [J]. IEEE ACCESS, 2024, 12 : 103565 - 103582
  • [5] A Systematic Assessment of the Security of Full Disk Encryption
    Mueller, Tilo
    Freiling, Felix C.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (05) : 491 - 503
  • [6] Full Disk Encryption: Bridging Theory and Practice
    Khati, Louiza
    Mouha, Nicky
    Vergnaud, Damien
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 241 - 257
  • [7] Comparing the Power of Full Disk Encryption Alternatives
    Fujimoto, Aaron
    Peterson, Peter
    Reiher, Peter
    [J]. 2012 INTERNATIONAL GREEN COMPUTING CONFERENCE (IGCC), 2012,
  • [8] DATA STORAGE SECURITY AND FULL DISK ENCRYPTION
    Alekseev, E. K.
    Akhmetzyanova, L. R.
    Babueva, A. A.
    Smyshlyaev, S., V
    [J]. PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2020, (49): : 78 - 97
  • [9] Privacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology
    Balogun, Adedayo M.
    Zhu, Shao Ying
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (05) : 36 - 40
  • [10] Full Disk Encryption: A Comparison on Data Management Attributes
    Hasan, Shiza
    Awais, Muhammad
    Shah, Munam Ali
    [J]. 2ND INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND DATA MINING (ICISDM 2018), 2018, : 39 - 43