A methodology for the repeatable forensic analysis of encrypted drives

  • Authors:
  • Cory Altheide;Claudio Merloni;Stefano Zanero

  • Affiliations:
  • IBM ISS, Mountain View, CA;Secure Network S.r.l., Agrate Brianza, Italy;DEI - Politecnico di Milano, Milano, Italy

  • Venue:
  • Proceedings of the 1st European Workshop on System Security
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we propose a sound methodology to perform the forensic analysis of hard disks protected with whole-disk encryption software, supposing to be in possession of the appropriate encryption keys. We demonstrate how to create a forensically sound clone-copy of the seized media, and how to access the information contained in the media in a repeatable way, minimizing the usage of unverified and proprietary software. We discuss the impact of such encryption solutions on the capability of forensic analysis software to reconstruct deleted files. We propose and perform scientific tests for validating each step of our proposed procedure.