TY - JOUR
T1 - Manipulation of hard drive firmware to conceal entire partitions
AU - Read, Huw
AU - Xynos, Konstantinos
AU - Sutherland, Iain
AU - Davies, Gareth
AU - Houiellebecq, Tom
AU - Roarson, Frode
AU - Blyth, Andrew
PY - 2013/12/1
Y1 - 2013/12/1
N2 - Tools created by the computer hacking community to circumvent security protection on hard drives can have unintentional consequences for digital forensics. Tools originally developed to circumvent Microsoft's Xbox 360 hard drive protection can be used, independently of the Xbox 360 system, to change the reported size/model of a hard drive enabling criminals to hide data from digital forensic software and hardware. The availability of such concealment methods raises the risk of evidence being overlooked, particularly as triage and on-scene inspections of digital media become more common. This paper presents two case studies demonstrating the process using Western Digital and Fujitsu branded drives. It outlines the difficulties faced by standard computer forensic analysis techniques in revealing the true nature of the drive and finally provides suggestions for extra checks to reveal this type of concealment.
AB - Tools created by the computer hacking community to circumvent security protection on hard drives can have unintentional consequences for digital forensics. Tools originally developed to circumvent Microsoft's Xbox 360 hard drive protection can be used, independently of the Xbox 360 system, to change the reported size/model of a hard drive enabling criminals to hide data from digital forensic software and hardware. The availability of such concealment methods raises the risk of evidence being overlooked, particularly as triage and on-scene inspections of digital media become more common. This paper presents two case studies demonstrating the process using Western Digital and Fujitsu branded drives. It outlines the difficulties faced by standard computer forensic analysis techniques in revealing the true nature of the drive and finally provides suggestions for extra checks to reveal this type of concealment.
U2 - 10.1016/j.diin.2013.10.001
DO - 10.1016/j.diin.2013.10.001
M3 - Article
SN - 1742-2876
VL - 10
SP - 281
EP - 286
JO - Digital Investigation
JF - Digital Investigation
IS - 4
ER -