Difference between revisions of "Research Topics"

From ForensicsWiki
Jump to: navigation, search
m (AFF Enhancement)
Line 27: Line 27:
* Detect and diagnose sanitization attempts.
* Detect and diagnose sanitization attempts.
===[[AFF]] Enhancement===
* Replace the AFF "BADFLAG" approach for indicating bad data with a bad sector bitmap.
* Modify aimage so that it can take a partial disk image and a disk and just image what's missing.
* Improve the data recovery features of aimage.
* Replace AFF's current table-of-contents system with one based on B+ Trees.
==Timeline Analysis==
==Timeline Analysis==

Revision as of 17:21, 25 August 2009

Interested in doing research in computer forensics? Looking for a master's topic, or just some ideas for a research paper? Here is my list. Please feel free to add your own ideas.

Stored Data Forensics

Flash Forensics

  • Access the physical layer of SD cards and/or USB flash devices. Reverse-engineer the Flash Translation Layer to find deleted data and files.

SleuthKit Enhancements

  • Add support for a new file system:
    • YAFFS2 flash file system. (YAFFS2 is currently used on the Google G1 phone.)
    • JFFS2 flash file system. (JFFS2 is currently used on the One Laptop Per Child laptop.)
    • XFAT
  • Enhance support for an existing file system:
    • EXT4
    • Add support for NTFS encrypted files.
    • Report the physical location on disk of compressed files.
  • Write a FUSE-based mounter for SleuthKit, so that disk images can be forensically mounted using TSK. (I've already started on this if you want the code.)

fiwalk Enhancements

  • Rewrite the metadata extraction system.

Stream Forensics

  • Process the entire disk with one pass, or at most two, to minimize seek time.

Evidence Falsification

  • Automatically detect falsified digital evidence.


  • Detect and diagnose sanitization attempts.

Timeline Analysis

Write a new timeline viewer that supports:

  • Logfile fusion (with offsets)
  • Logfile correlation
  • View logfiles in the frequency domain.

Cell Phone Exploitation


  • Image the contents of a cell phone physical memory using the JTAG interface.


  • Develop a tool for reassembling information in a cell phone memory

Corpora Development

Realistic Disk Corpora

There is need for realistic corpora that can be freely redistributed but do not contain any confidential personally identifiable information (PII).

These disk images may be either of an external drive or of a system boot drive. The drive images should have signs of wear --- that is, they should have resident files, deleted files, partially overwritten files, contiguous files, and fragmented files.

From DFRWS 2005 Frank Adelstein (ATC-NY), Yun Gao and Golden G. Richard III (University of New Orleans): Automatically Creating Realistic Targets for Digital Forensics Investigation http://www.dfrws.org/2005/program.shtml

Realistic Network Traffic

Generating realistic network traffic requires constructing a test network and either recording interactions within the network or with an external network.