skip to main content
10.1145/3183399.3183426acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Towards forensic-ready software systems

Published: 27 May 2018 Publication History

Abstract

As software becomes more ubiquitous, and the risk of cyber-crimes increases, ensuring that software systems are forensic-ready (i.e., capable of supporting potential digital investigations) is critical. However, little or no attention has been given to how well-suited existing software engineering methodologies and practices are for the systematic development of such systems. In this paper, we consider the meaning of forensic readiness of software, define forensic readiness requirements, and highlight some of the open software engineering challenges in the face of forensic readiness. We use a real software system developed to investigate online sharing of child abuse media to illustrate the presented concepts.

References

[1]
1967. Katz v. United States. (1967), 347 pages.
[2]
Rui Abreu, Dave Archer, Erin Chapman, James Cheney, Hoda Eldardiry, and Adrià Gascón. 2016. Provenance Segmentation. In Proc. of the 8th USENIX Workshop on the Theory and Practice of Provenance.
[3]
D. Alrajeh, L. Pasquale, and B. Nuseibeh. 2017. On Evidence Preservation Requirements for Forensic-ready Systems. In Proc. of the 11th Joint Meeting on Foundations of Software Engineering. 559--569.
[4]
A. Avizienis, J. C. Laprie, B. Randell, and C. Landwehr. 2004. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing 1, 1 (2004), 11--33.
[5]
D. Barske, A. Stander, and J. Jordaan. 2010. A Digital Forensic Readiness framework for South African SME's. In Information Security for South Africa. 1--6.
[6]
Sheung Chi Chan, Ashish Gehani, James Cheney, Ripduman Sohan, and Hassaan Irshad. 2017. Expressiveness Benchmarking for System-Level Provenance. In Proc. of the 9th USENIX Workshop on the Theory and Practice of Provenance.
[7]
Symantec Corporation. 2017. Internet Security Threat Report. https://www.symantec.com/security-center/threat-report. (2017).
[8]
J. Cosic and M. Baca. 2010. Do We Have Full Control Over Integrity in Digital Evidence Life Cycle?. In Proc. of the 32nd International Conference on Information Technology Interfaces. 429--434.
[9]
M. Elyas, S. B. Maynard, A. Ahmad, and A. Lonie. 2014. Towards A Systemic Framework for Digital Forensic Readiness. Journal of Computer Information Systems 54, 3 (2014), 97--105.
[10]
B. Endicott-Popovsky, N. Kuntze, and C. Rudolph. 2015. Forensic readiness: Emerging discipline for creating reliable and secure digital evidence. Journal of Harbin Institute of Technology (New Series) 22 (2015), 1--8. Issue 1.
[11]
B. E. Endicott-Popovsky and D. A. Frincke. 2006. Embedding Forensic Capabilities into Networks: Addressing Inefficiencies in Digital Forensics Investigations. In Proc. of the IEEE Workshop on Information Assurance. 133--139.
[12]
S. L. Garfinkel. 2006. Forensic Feature Extraction and Cross-Drive Analysis. Digital Investigation 3 (2006), 71--81.
[13]
C. P. Grobler and C. P. Louwrens. {n. d.}. Digital Forensic Readiness as a Component of Information Security Best Practice. 13--24.
[14]
J. Grover. 2013. Android forensics: Automated Data Collection and Reporting from a Mobile Device. Digital Investigation 10 (2013), S12--S20.
[15]
I. Hong, H. Yu, S. Lee, and K. Lee. 2013. A New Triage Model Conforming to the Needs of Selective Search and Seizure of Electronic Evidence. Digital Investigation 10, 2 (2013), 175--192.
[16]
V. R. Kebande and H. S. Venter. 2016. On Digital Forensic Readiness in the Cloud Using a Distributed Agent-Based Solution: Issues and Challenges. Australian Journal of Forensic Sciences (2016), 1--30.
[17]
J. T. King, J. Stallings, M. Riaz, and L. Williams. 2017. To Log, or Not To Log: Using Heuristics to Identify Mandatory Log Events - A Controlled Experiment. Empirical Software Engineering 22, 5 (2017), 2684--2717.
[18]
R. McKemmish. 2008. When is Digital Evidence Forensically Sound? 3--15.
[19]
L. Pasquale, S. Hanvey, M. Mcgloin, and B. Nuseibeh. 2016. Adaptive Evidence Collection in the Cloud Using Attack Scenarios. Computers & Security 59 (2016), 236--254.
[20]
C. Peersman, C. Schulze, A. Rashid, M. Brennan, and C. Fischer. 2016. iCOP: Live Forensics to Reveal Previously Unknown Criminal Media on P2P Networks. Digital Investigation 18 (2016), 50--64.
[21]
MET Police. 2017. Figures released ahead of National Child Sexual Exploitation Awareness Day. (2017). Retrieved 23.10.2017 from http://news.met.police.uk/news/figures
[22]
A. Pooe and L. Labuschagne. 2012. A conceptual model for digital forensic readiness. In Information Security for South Africa. 1--8.
[23]
D. Quick and K. R. Choo. 2016. Big Forensic Data Reduction: Digital Forensic Images and Electronic Evidence. Cluster Computing 19, 2 (2016), 723--740.
[24]
R. Rowlingson. 2004. A Ten Step Process for Forensic Readiness. International Journal of Digital Evidence 2, 3 (2004), 1--28.
[25]
C. Shields, O. Frieder, and M. Maloof. 2011. A System for the Proactive, Continuous, and Efficient Collection of Digital Forensic Evidence. In Digital Investigations, Vol. 8. 3--13.
[26]
J. Stüttgen. 2011. Selective Imaging: Creating Efficient Forensic Images by Selecting Content First. Mannheim University (2011).
[27]
J. Tan. 2001. Forensic Readiness. Cambridge, MA:@ Stake (2001), 1--23.
[28]
P. Turner. 2006. Selective and Intelligent Imaging Using Digital Evidence Bags. Digital Investigation 3 (2006), 59--64.
[29]
M. Yoshizawa, H. Washizaki, Y. Fukazawa, T. Okubo, H. Kaiya, and N. Yoshioka. 2016. Implementation Support of Security Design Patterns Using Test Templates. Information 7, 2 (2016), 34.
[30]
S. A. Zonouz, K. R. Joshi, and W. H. Sanders. 2011. Floguard: Cost-Aware Systemwide Intrusion Defense Via Online Forensics and On-Demand IDS Deployment. In International conference on Computer safety, reliability, and security. Springer, 338--354.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICSE-NIER '18: Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results
May 2018
130 pages
ISBN:9781450356626
DOI:10.1145/3183399
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 May 2018

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

ICSE '18
Sponsor:

Upcoming Conference

ICSE 2025

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)21
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Feb 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media