Online Appendix to: Generalizing Database Forensics

نویسندگان

  • KYRIACOS E. PAVLOU
  • RICHARD T. SNODGRASS
چکیده

Figures 16–19 show different parts of the formulation of the forensic analysis protocol (broken across four diagrams). We will discuss Page Write Timestamp corruption (on disk), Attribute corruption (on disk), and Schema corruption (on disk) using the the four figures as a guide. Data corruptions which affect an entire tuple will not be discussed since no tools exist right now that adequately analyze these problems, even though we can detect that corruption is present. In general, the identification of leaves for which no forensic tools exist (marked with “Pending Future Work”) is part of our future work. After the section devoted to the common starting path of the forensic protocol, each of the following sections corresponds to the leaves of the above-listed major corruption subtypes. We emphasize that this protocol assumes a single corruption event. A diagram depicting the taxonomy and protocol together can be accessed at http://www.cs.arizona.edu/projects/tau/dragoon/taxonomy protocol.pdf. The upper portion of the figures show portions of the UML taxonomy of corruption events (in shaded rectangles). Everything appearing below the taxonomy depicts the steps taken and the tools used in the forensic analysis protocol, in order to reach the leaves in the taxonomy. Within the lower position of the protocol are conditionals in diamonds that denote questions distinguishing between variations of the same corruption subtype, directives in (unshaded) rectangles that indicate some computational task to be performed, and connectors in ellipses that connect the different parts of the protocol using unique labels. Observables are the results of conditionals and of the forensic analysis algorithms. Recall that forensic analysis is a one-to-one correspondence between the observables and the elements in the taxonomy. Such a strong correspondence might not be possible to establish, either because of lack of tools (in this case the forensic analysis algorithms) or due to the nature of the problem. Hence, we characterize forensic analysis as a mapping from observables to subsets of the taxonomy, which we term conclusion sets. Elements belonging to the same conclusion set are indistinguishable from one another given the available tools. Conclusion sets are shown in parallelograms. A legend in Figure 16 summarizes this useful information. The flow of analysis in the protocol is generally upward, as indicated by the arrows.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Appendix 1: Challenges in Software Quality Forensics and Litigation - A Case Study

Software forensic experts are called upon not only to perform authorship analysis and software copyright infringement forensics but also to perform software quality forensics. Because the prime evidence in such cases also are digital (in the form of software, databases etc.), the judiciary too often engages software forensic practitioners as expert witnesses to arrive at a considered judgment. ...

متن کامل

A Generalizing Database Forensics

In this paper we present refinements on previously-proposed approaches to forensic analysis of database tampering. We significantly generalize the basic structure of these algorithms to admit new characterizations of the “where” axis of the corruption diagram. Specifically, we introduce page-based partitioning as well as attribute-based partitioning along with their associated corruption diagra...

متن کامل

On Dimensions of Reconstruction in Database Forensics

Although very little amount of research has been done on database forensics, current research has tacitly focused on digital examination and reconstruction of databases from a number of dimensions. The general assumption is that only one of these dimensions needs to be handled during database forensics investigations. This paper analyses the dimensions in which research in database forensics ha...

متن کامل

Reconstruction in Database Forensics

The increasing usage of databases in the storage of critical and sensitive information in many organizations has led to an increase in the rate at which databases are exploited in computer crimes. Databases are often manipulated to facilitate crimes and as such are usually of interest during many investigations as useful information relevant to the investigation can be found therein. A branch o...

متن کامل

On metadata context in Database Forensics

Database Forensics is an important topic that has received hardly any research attention. This paper starts from the premise that this lack of research is due to the inherent complexity of databases that is not fully understood in a forensic context yet. The paper considers the relevant differences between file systems and databases and then transfers concepts of File System Forensics to Databa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013