Difference between pages "Research Topics" and "Linux Unified Key Setup (LUKS)"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m (fiwalk Enhancements)
 
(External Links)
 
Line 1: Line 1:
Interested in doing research in computer forensics? Looking for a master's topic, or just some ideas for a research paper? Here is my list. Please feel free to add your own ideas.
+
{{expand}}
  
==Stored Data Forensics==
+
Linux Unified Key Setup (LUKS) is commonly used by Linux to encrypt storage media volumes. LUKS is implemented in the Linux kernel in dm-crypt (dm = Device Mapper) and the user-space component cryptsetup.
===Flash Forensics===
+
* Access the physical layer of SD cards and/or USB flash devices. Reverse-engineer the Flash Translation Layer to find deleted data and files.
+
===SleuthKit Enhancements===
+
* Support for YAFFS2 flash file system. (YAFFS2 is currently used on the Google G1 phone.)
+
* Support for JFFS2 flash file system. (JFFS2 is currently used on the One Laptop Per Child laptop.)
+
* Write a FUSE-based mounter for SleuthKit, so that disk images can be forensically mounted using TSK. (I've already started on this if you want the code.)
+
* Add support for NTFS encrypted files.
+
* Report the physical location on disk of compressed files.
+
  
===fiwalk Enhancements===
+
LUKS supports various encryption methods, like:
* Rewrite the metadata extraction system.
+
* [[AES]]
 +
* [[Anubis]]
 +
* [[Blowfish|BlowFish]]
 +
* [[Cast5]]
 +
* [[Cast6]]
 +
* [[Serpent]]
 +
* [[Twofish|TwoFish]]
  
===Stream Forensics===
+
These encryption methods can be used in various chaining modes and with various initialization vector modes.
* Process the entire disk with one pass, or at most two, to minimize seek time.
+
  
===Evidence Falsification===
+
== External Links ==
* Automatically detect falsified digital evidence.
+
* [http://clemens.endorphin.org/nmihde/nmihde-A4-ds.pdf New Methods in Hard Disk Encryption], by Clemens Fruhwirth, July 18, 2005
 +
* [http://wiki.cryptsetup.googlecode.com/git/LUKS-standard/on-disk-format.pdf LUKS On-Disk Format Specification - Version 1.2.1], by Clemens Fruhwirth, October 16, 2011
 +
* [https://access.redhat.com/site/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security_Guide/sect-Security_Guide-LUKS_Disk_Encryption.html LUKS Disk Encryption], by [[RedHat]]
 +
* [https://googledrive.com/host/0B3fBvzttpiiSNUVYSFF1TmRONmc/Linux%20Unified%20Key%20Setup%20(LUKS)%20Disk%20Encryption%20format.pdf LUKS Disk Encryption format specification], by the [[libluksde|libluksde project]], July 2013
 +
* [http://www.jakoblell.com/blog/2013/12/22/practical-malleability-attack-against-cbc-encrypted-luks-partitions/ Practical malleability attack against CBC-Encrypted LUKS partitions], by Jakob Lell, December 22, 2013
  
===Sanitization===
 
* Detect and diagnose sanitization attempts.
 
  
 
+
[[Category:Disk encryption]]
===[[AFF]] Enhancement===
+
[[Category:Linux]]
* Replace the AFF "BADFLAG" approach for indicating bad data with a bad sector bitmap.
+
 
+
* Modify aimage so that it can take a partial disk image and a disk and just image what's missing.
+
 
+
* Improve the data recovery features of aimage.
+
 
+
* Replace AFF's current table-of-contents system with one based on B+ Trees.
+
 
+
==Timeline Analysis==
+
Write a new timeline viewer that supports:
+
* Logfile fusion (with offsets)
+
* Logfile correlation
+
* View logfiles in the frequency domain.
+
 
+
==Carving==
+
===JPEG Validator===
+
Create a JPEG decompresser that supports restarts and checkpointing for use in high-speed carving.
+
 
+
==Cell Phone Exploitation==
+
===Imaging===
+
Develop a tool for imaging the contents of a cell phone memory
+
===Interpretation===
+
* Develop a tool for reassembling information in a cell phone memory
+
 
+
 
+
==Corpora Development==
+
===Realistic Disk Corpora===
+
There is need for realistic corpora that can be freely redistributed but do not contain any confidential personally identifiable information (PII).
+
 
+
These disk images may be either of an external drive or of a system boot drive. The drive images should have signs of ''wear'' --- that is, they should have resident files, deleted files, partially overwritten files, contiguous files, and fragmented files.
+
 
+
From DFRWS 2005
+
Frank Adelstein (ATC-NY), Yun Gao and Golden G. Richard III (University of New Orleans): Automatically Creating Realistic Targets for Digital Forensics Investigation http://www.dfrws.org/2005/program.shtml
+
 
+
===Realistic Network Traffic===
+
Generating realistic network traffic requires constructing a test network and either recording interactions within the network or with an external network.
+

Revision as of 12:35, 23 December 2013

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

Linux Unified Key Setup (LUKS) is commonly used by Linux to encrypt storage media volumes. LUKS is implemented in the Linux kernel in dm-crypt (dm = Device Mapper) and the user-space component cryptsetup.

LUKS supports various encryption methods, like:

These encryption methods can be used in various chaining modes and with various initialization vector modes.

External Links