• DocumentCode
    1804331
  • Title

    Forensic entropy analysis of microsoft windows storage volumes

  • Author

    Weston, Paul ; Wolthusen, Stephen D.

  • Author_Institution
    Inf. Security Group, Univ. of London, Egham, UK
  • fYear
    2013
  • fDate
    14-16 Aug. 2013
  • Firstpage
    1
  • Lastpage
    7
  • Abstract
    The use of file or volume encryption as a counter-forensic technique, particularly when combined with stegano-graphic mechanisms, depends on the ability to plausibly deny the presence of such encrypted data. Establishing the likely presence of encrypted data is hence highly desirable for forensic investigations, particularly if an automated heuristic can be devised. Similarly, forensic analysts must be able to identify whether a volume has been sanitised by re-installation and subsequent re-population with user data as otherwise significant information such as slack space contents and files of interest will be unavailable. We claim that the current or previous existence of encrypted volumes can be derived from studying file and volume entropy characteristics based on knowledge of the development of volume entropy over time. To validate our hypothesis, we have examined several versions of the Microsoft Windows operating system platform over a simulated installation life-cycle and established file and volume entropy metrics. Similarly, using the same mechanisms, we verified the hypothesis that the aging through regular use of an installation is identifiable through entropy fingerprint analysis. The results obtained allow the rapid identification of several volume-level operations including copying and wiping, but also to detect anomalous slack space entropy indicative of the use of encryption techniques. Similarly, entropy and randomness tests have been devised which provide heuristics for the differentiation of encrypted data from other high-entropy data such as compressed media data.
  • Keywords
    cryptography; digital forensics; operating systems (computers); steganography; Microsoft Windows operating system platform; Microsoft Windows storage volumes; anomalous slack space entropy detection; counter-forensic technique; entropy fingerprint analysis; file encryption; file entropy characteristics; file entropy metrics; forensic entropy analysis; stegano-graphic mechanisms; volume encryption; volume entropy characteristics; volume entropy metrics; volume-level operations; Aging; Cryptography; Entropy; Forensics; Image coding; Media; Operating systems; Encrypted File Systems; File System Entropy; Installation Aging;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Security for South Africa, 2013
  • Conference_Location
    Johannesburg
  • Type

    conf

  • DOI
    10.1109/ISSA.2013.6641056
  • Filename
    6641056