July 9, 2004 www.nsrl.nist.gov 1 National Software Reference Library Douglas White Information Technology Laboratory July 2004.

Slides:



Advertisements
Similar presentations
Collaboration Model for Law Enforcement X-Ways Investigator (investigator version of X-Ways Forensics)
Advertisements

Pinpoint Labs Software Presented by: Jonathan P. Rowe President and CEO Certified Computer Examiner Member: The International Society of Forensic Computer.
No Nonsense File Collection Presented by: Pinpoint Labs Presenter: Jon Rowe, CCE, ISFCE Certified Computer Examiner Members: The International Society.
An Introduction to Computer Forensics James L. Antonakos Professor Computer Science Department.
Guide to Computer Forensics and Investigations, Second Edition
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Guide to Computer Forensics and Investigations Fourth Edition
Guide to Computer Forensics and Investigations Fourth Edition
Computer & Network Forensics
Tools and Services for the Long Term Preservation and Access of Digital Archives Joseph JaJa, Mike Smorul, and Sangchul Song Institute for Advanced Computer.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 2 Installing Windows Server 2008.
COEN 252 Computer Forensics
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Security of Electronic Records 29th Meeting of the ICA / SIO Geneva -13 May 2003 Milovan Misic.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
ACCB 133 Information Technology and Accounting Applications Lecture 6: Application Software.
NIST CFTT: Testing Disk Imaging Tools James R. Lyle National Institute of Standards and Technology Gaithersburg Md.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Information Systems Security Computer System Life Cycle Security.
Preserving Evidence ● Number one priority ● Must also find incriminating evidence ● Must search the contents of the hard drive ● Can not change the hard.
1 INTRODUCTION TO DATABASE MANAGEMENT SYSTEM L E C T U R E
Digital Preservation 101, or, How to Keep Bits for Centuries Julie C. Swierczek Digital Asset Manager and Digital Archivist Harvard Art Museums.
Ben Livelsberger NIST Information Technology Laboratory, CFTT Program
Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
I.Information Building & Retrieval Learning Objectives: the process of Information building the responsibilities and interaction of each data managing.
Guide to Computer Forensics and Investigations Fourth Edition
Chidambaranathan C.M SRM University,Haryana. Memory:- As the word implies “memory” means the place where we have to store any thing, this is very essential.
Operating Systems Foundation Computing Half the people you know are below average.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Public Key Infrastructure (PKI) Chien-Chung Shen
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
DIGITAL SIGNATURE.
CJ 317 – Computer Forensics
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Preserving Electronic Mailing Lists as Scholarly Resources: The H-Net Archives Lisa M. Schmidt
Chapter 8: Installing Linux The Complete Guide To Linux System Administration.
Software Installation and Copyrights Basic Computer Concepts Installation Basics  Installation Process  Copy files from distribution disks.
Microsoft ® Official Course Module 6 Managing Software Distribution and Deployment by Using Packages and Programs.
Next VVSG Training Security: Testing Requirements October 15-17, 2007 Nelson Hastings Alicia Clay Jones National Institute of Standards and Technology.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael Jones2Digital Forensic Investigations.
Chapter 8 Forensic Duplication Spring Incident Response & Computer Forensics.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
Forensic Investigation Techniques Michael Jones. Overview Purpose People Processes Michael JonesDigital Forensic Investigations2.
Database Principles: Fundamentals of Design, Implementation, and Management Chapter 1 The Database Approach.
KEEPS – a system for UELMA preservation and security
National Software Reference Library
KEEPS – a system for UELMA preservation and security
Class Agenda – 09/07/2011 Present computer data organization
Presented by Steve Abrams, M.S. Charleston, SC / Long Island, NY
Tools for identifying duplicate files and known software files
Chapter 5: The Art of Ensuring Integrity
Guide to Computer Forensics and Investigations Fifth Edition
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Digital Forensics 2 Lecture 2: Understanding steganography in graphic files Presented by : J.Silaa Lecture: FCI Based on Guide to Computer Forensics and.
Chapter 5 EnCase Concepts.
Lesson #7 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 7 Configuring Devices and Updates.
CHFI & Digital Forensics [Part.1] - Basics & FTK Imager
Managing data Resources:
Digital Forensics Dr. Bhavani Thuraisingham
Instructor Materials Chapter 5: The Art of Ensuring Integrity
Exam Information CSI5107 Network Security.
Computer Forensics Lab 1 INFORMATION TECHNOLOGY DEPARTMENT LEBANESE FRENCH UNIVERSITY (LFU) COURSE CODE: IT402CF 1.
ບົດທີ 6 ການຄຸ້ມຄອງຊັບພະຍາກອນຂໍ້ມູນ (Managing Data Resource)
Instructor Materials Chapter 5: Ensuring Integrity
Presentation transcript:

July 9, National Software Reference Library Douglas White Information Technology Laboratory July 2004

July 9, Introduction The National Software Reference Library is: A physical collection of over 5,000 software packages on secured shelves A physical collection of over 5,000 software packages on secured shelves A database of file “fingerprints” (or “hashes”) and additional information to uniquely identify each file on the shelves A database of file “fingerprints” (or “hashes”) and additional information to uniquely identify each file on the shelves A Reference Data Set (RDS) extracted from the database onto CD, used by law enforcement, investigators, researchers, others A Reference Data Set (RDS) extracted from the database onto CD, used by law enforcement, investigators, researchers, others

July 9, Use of the NSRL Eliminate as many known files as possible from the examination process using automated means Eliminate as many known files as possible from the examination process using automated means Discover expected file name with unknown contents Discover expected file name with unknown contents Identify origins of files Identify origins of files Look for malicious files, e.g., hacker tools Look for malicious files, e.g., hacker tools Identify duplicate files Identify duplicate files Provide rigorously verified data for forensic investigations Provide rigorously verified data for forensic investigations

July 9, How Did the NSRL Start? Law Enforcement needed software hashes that could be used in investigations and in court. Source must be unbiased - NIST is a neutral organization Source must be unbiased - NIST is a neutral organization Data produced must be of the highest quality Data produced must be of the highest quality Data must be traceable and repeatable Data must be traceable and repeatable There must be a repository of original software There must be a repository of original software NIST provides an open rigorous process NIST provides an open rigorous process

July 9, NSRL Software Collection Balance of most popular (encountered often) and most desired (pirated often) Balance of most popular (encountered often) and most desired (pirated often) Currently 32 languages, used internationally Currently 32 languages, used internationally Software is purchased commercially Software is purchased commercially Software is donated under non-use policy Software is donated under non-use policy List of contents available on website List of contents available on websitewww.nsrl.nist.gov

July 9, NSRL Software Database Information to uniquely identify every file on every piece of media in every application Information to uniquely identify every file on every piece of media in every application Database schema is available on website Database schema is available on website 4,200 Bytes per application 4,200 Bytes per application 750 Bytes per file 750 Bytes per file Total database size now 20 GB for 5,000 applications with 31,900,000 files Total database size now 20 GB for 5,000 applications with 31,900,000 files

July 9, NSRL Reference Data Set The Reference Data Set (RDS) is a selection of information from the NSRL database The Reference Data Set (RDS) is a selection of information from the NSRL database Allows positive identification of manufacturer, product, operating system, version, file name from file “signature” Allows positive identification of manufacturer, product, operating system, version, file name from file “signature” Data format available for forensic tool developers Data format available for forensic tool developers Published quarterly, free redistribution Published quarterly, free redistribution Possible to publish critical data out of regular schedule; in February 2004 NSRL supplied 500,000 Arabic file signatures to FBI & DoD Possible to publish critical data out of regular schedule; in February 2004 NSRL supplied 500,000 Arabic file signatures to FBI & DoD

July 9, RDS Field Use Concept KNOWN FILES RDS ANALYSIS PROGRAM UNKNOWN FILES FILES Disk Drive

July 9, RDS Field Use Example Windows 2000 operating system software contains 5933 images which are known gifs, icons, jpeg files You are looking for sensitive facility maps on a computer which is running Windows By using the RDS and an analysis program the investigator would not have to look at these files to complete his investigation. e.g.,

July 9, Hashes Like a person’s fingerprint Like a person’s fingerprint Uniquely identifies the file based on contents Uniquely identifies the file based on contents You can’t create the file from the hash You can’t create the file from the hash Primary hash value used is Secure Hash Algorithm (SHA-1) specified in FIPS 180-1, a 160-bit hashing algorithm Primary hash value used is Secure Hash Algorithm (SHA-1) specified in FIPS 180-1, a 160-bit hashing algorithm combinations of 160-bit values combinations of 160-bit values “Computationally infeasible” to find two different files less than 2 64 bits in size producing the same SHA-1 “Computationally infeasible” to find two different files less than 2 64 bits in size producing the same SHA bits is one million terabytes 2 64 bits is one million terabytes

July 9, Hash Examples Filename Bytes SHA-1 NT4\ALPHA\notepad.exe F1F284D5D757039DEC1C44A05AC148B9D204E467 NT4\I386\notepad.exe C4E15A C61548A981A4AC BE37 NT4\MIPS\notepad.exe E4DBBA665E FE5E E69 NT4\PPC\notepad.exe BB7AF0E4DD565ED75DEB492D8C17B1BFD3FB23 WINNT31.WKS\I386\notepad.exe E0849CF327709FC46B705EEAB5E57380F5B1F67 WINNT31.SRV\I386\notepad.exe E0849CF327709FC46B705EEAB5E57380F5B1F67

July 9, NSRL & National Archives and Records Administration Use hashing process on non-classified Presidential materials Use hashing process on non-classified Presidential materials Identify application files Identify application files Identify duplicate files Identify duplicate files Access to older installed software Access to older installed software

July 9, NSRL & Voting Systems Needs Determine that software used during elections is the expected software Determine that software used during elections is the expected software Tested, certified version is definitively identifiable Tested, certified version is definitively identifiable Same during distribution, installation, setup, or use Same during distribution, installation, setup, or use “Chain of custody” “Chain of custody” Transparency Transparency The NSRL methodology is in the public domain, available for inspection The NSRL methodology is in the public domain, available for inspection Jurisdictions can share knowledge with each other Jurisdictions can share knowledge with each other

July 9, EAC & NSRL Can verify that operating system file contents have not been modified Can verify that operating system file contents have not been modified Can verify that application file contents have not been modified Can verify that application file contents have not been modified Can verify that known static sections of files have not been modified Can verify that known static sections of files have not been modified At 866MHz, SHA-1 of 50MB takes ~5 sec., MD5 of 50MB takes ~4 sec. At 866MHz, SHA-1 of 50MB takes ~5 sec., MD5 of 50MB takes ~4 sec.

July 9, Voting Research Issues  Working with software companies to get access to software  Distribution vs. installation hashes  If there is any setup after the hashes are made, how do you know what changes are valid?  Possible/practical to have on-location, time-of- certification hashing?  Verification within time/ space/ security constraints

July 9, Discussion Questions about the NSRL Questions about the NSRL Discussion of the NSRL and Voting Systems Discussion of the NSRL and Voting Systems

July 9, Contact Douglas White Software Diagnostics and Conformance Testing Information Technology Laboratory Telephone: Web: