Skip to main content

Defining a Standard for Reporting Digital Evidence Items in Computer Forensic Tools

  • Conference paper
Digital Forensics and Cyber Crime (ICDF2C 2010)

Abstract

Due to the lack of standards in reporting digital evidence items, investigators are facing difficulties in efficiently presenting their findings. This paper proposes a standard for digital evidence to be used in reports that are generated using computer forensic software tools. The authors focused on developing a standard digital evidence items by surveying various digital forensic tools while keeping in mind the legal integrity of digital evidence items. Additionally, an online questionnaire was used to gain the opinion of knowledgeable and experienced stakeholders in the digital forensics domain. Based on the findings, the authors propose a standard for digital evidence items that includes data about the case, the evidence source, evidence item, and the chain of custody. Research results enabled the authors in creating a defined XML schema for digital evidence items.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The Common Evidence Format Working Group (Carrier, B., Casey, E, Garfinkel, S., Kornblum, J., Hosmer, C., Rogers, M., Turner, P.): Standardizing Digital Evidence Storage. Communications of the ACM (February 2006)

    Google Scholar 

  2. Anson, S., Bunting, S.: Mastering Windows Network Forensics and Investigation. Wiley Publishing, Inc., Canada (2007)

    Google Scholar 

  3. Devine, J.: The Importance of the Chain of Custody (October 30, 2009), http://ezinearticles.com/?The-Importance-of-the-Chain-of-Custody&id=3182472 (retrieved March 18, 2010)

  4. Garfinkel, S., Malan, S., Dubec, K., Stevens, C., Pham, C.: Disk Imaging with the Advanced Forensics Format, Library and Tools. In: The Second Annual IFIP WG 11.9 International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, USA, January 29-February 1 (2006)

    Google Scholar 

  5. Glendale, D.: Guidance Software EnCase (2010), retrieved from http://www.digitalintelligence.com/software/guidancesoftware/encase/

  6. Levine, B., Liberatore, M.: DEX: Digital evidence provenance supporting reproducibility and comparison. Digital Investigation 6, S48–S56 (2009)

    Article  Google Scholar 

  7. Liquid Technologies Limited: Liquid XML Studio 2010 (version 8.1.2.2399), [Software] available from http://www.liquid-technologies.com/

  8. Marcella, A.J., Menendez Jr., D.: Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes. In: Information Security, 2nd edn. Auerbach publications, Taylor & Francis Group (2007)

    Google Scholar 

  9. Nelson, B., Phillips, A., Enfringer, F., Steuart, C.: Guide to Computer Forensics and Investigations. GEX Publishing Services, Canada (2008)

    Google Scholar 

  10. Petruzzi, J.: How to Keep a Digital Chain of Custody (December 01, 2005), retrieved from http://www.csoonline.com/article/220718/How_to_Keep_a_Digital_Chain_of_Custody

  11. Pladna, B.: Computer Forensics Procedures, Tools, and Digital Evidence Bags: What They Are and Who Should Use Them. East Carolina University, East Carolina (2008)

    Google Scholar 

  12. ProDiscover. (n.d.) Technology Pathways, http://www.techpathways.com/DesktopDefault.aspx?tabindex=3&tabid=12 (retrieved February 22, 2010)

  13. Rand, A., Loftus, T.: Chain of Custody Procedure (2003), retrieved from http://www.lagoonsonline.com/laboratory-articles/custody.htm

  14. Steen, S., Hassell, J.: Computer Forensics 101 (October 2004), retrieved from http://www.expertlaw.com/library/forensic_evidence/computer_forensics_101.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Bariki, H., Hashmi, M., Baggili, I. (2011). Defining a Standard for Reporting Digital Evidence Items in Computer Forensic Tools. In: Baggili, I. (eds) Digital Forensics and Cyber Crime. ICDF2C 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 53. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19513-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-19513-6_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-19512-9

  • Online ISBN: 978-3-642-19513-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics