The growing impact of full disk encryption on digital forensics

被引:14
|
作者
Casey, Eoghan [1 ]
Fellows, Geoff [1 ]
Geiger, Matthew [1 ]
Stellatos, Gerasimos [1 ]
机构
[1] CmdLabs, Baltimore, MD 21218 USA
关键词
Digital forensics; Full disk encryption; Hard drive encryption; Volatile data; Memory forensics;
D O I
10.1016/j.diin.2011.09.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing use of full disk encryption (FDE) can significantly hamper digital investigations, potentially preventing access to all digital evidence in a case. The practice of shutting down an evidential computer is not an acceptable technique when dealing with FDE or even volume encryption because it may result in all data on the device being rendered inaccessible for forensic examination. To address this challenge, there is a pressing need for more effective on-scene capabilities to detect and preserve encryption prior to pulling the plug. In addition, to give digital investigators the best chance of obtaining decrypted data in the field, prosecutors need to prepare search warrants with FDE in mind. This paper describes how FDE has hampered past investigations, and how circumventing FDE has benefited certain cases. This paper goes on to provide guidance for gathering items at the crime scene that may be useful for accessing encrypted data, and for performing on-scene forensic acquisitions of live computer systems. These measures increase the chances of acquiring digital evidence in an unencrypted state or capturing an encryption key or passphrase. Some implications for drafting and executing search warrants to dealing with FDE are discussed. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:129 / 134
页数:6
相关论文
共 50 条
  • [21] Digital Forensics to Intelligent Forensics
    Irons, Alastair
    Lallie, Harjinder Singh
    FUTURE INTERNET, 2014, 6 (03): : 584 - 596
  • [22] File Allocation Chronology and its Impact on Digital Forensics
    Bahjat, Ahmed
    Jones, Jim
    2023 IEEE 13TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE, CCWC, 2023, : 612 - 618
  • [23] Big Data and Digital Forensics Rethinking Digital Forensics
    Adedayo, Oluwasola Mary
    2016 IEEE INTERNATIONAL CONFERENCE ON CYBERCRIME AND COMPUTER FORENSIC (ICCCF), 2016,
  • [24] Ensuring accountability in digital forensics with proxy re-encryption based chain of custody
    Patil R.Y.
    Patil Y.H.
    Bannore A.
    Ranjanikar M.
    International Journal of Information Technology, 2024, 16 (3) : 1841 - 1853
  • [25] Digital Forensics
    Caloyannides, Michael A.
    Memon, Nasir
    Venema, Wietse
    IEEE SECURITY & PRIVACY, 2009, 7 (02) : 16 - 17
  • [26] Digital Forensics
    Delp, Edward
    Memon, Nasir
    Wu, Min
    IEEE SIGNAL PROCESSING MAGAZINE, 2009, 26 (02) : 14 - 15
  • [27] Digital Forensics: Focusing on Image Forensics
    Khalaf, Rayan Sulaiman
    Varol, Asaf
    2019 7TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2019,
  • [28] The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
    Barrett, Diane
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2014, 9 (01) : 83 - 85
  • [29] What Users Should Know About Full Disk Encryption Based on LUKS
    Bossi, Simone
    Visconti, Andrea
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2015, 2015, 9476 : 225 - 237
  • [30] An Extensive Analysis of TrueCrypt Encryption Forensics
    Zhang, Lijun
    Deng, Xiaoyan
    Tan, Cheng
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2019), 2019,