The growing impact of full disk encryption on digital forensics

Details

Ressource 1Download: 1-s2.0-S1742287611000727-main.pdf (1087.15 [Ko])
State: Public
Version: Final published version
Serval ID
serval:BIB_52974E4C51C4
Type
Article: article from journal or magazin.
Collection
Publications
Title
The growing impact of full disk encryption on digital forensics
Journal
Digital Investigation
Author(s)
Casey Eoghan, Fellows Geoff, Geiger Matthew, Stellatos Gerasimos
ISSN
1742-2876
Publication state
Published
Issued date
2011
Volume
8
Number
2
Pages
129-134
Language
english
Abstract
The increasing use of full disk encryption (FDE) can significantly hamper digital investigations, potentially preventing access to all digital evidence in a case. The practice of shutting down an evidential computer is not an acceptable technique when dealing with FDE or even volume encryption because it may result in all data on the device being rendered inaccessible for forensic examination. To address this challenge, there is a pressing need for more effective on-scene capabilities to detect and preserve encryption prior to pulling the plug. In addition, to give digital investigators the best chance of obtaining decrypted data in the field, prosecutors need to prepare search warrants with FDE in mind. This paper describes how FDE has hampered past investigations, and how circumventing FDE has benefited certain cases. This paper goes on to provide guidance for gathering items at the crime scene that may be useful for accessing encrypted data, and for performing on-scene forensic acquisitions of live computer systems. These measures increase the chances of acquiring digital evidence in an unencrypted state or capturing an encryption key or passphrase. Some implications for drafting and executing search warrants to dealing with FDE are discussed.
Keywords
Digital forensics, Full disk encryption, Hard drive encryption, Volatile data, Memory forensics
Create date
16/01/2019 21:48
Last modification date
20/08/2019 14:08
Usage data