2008
DOI: 10.1145/1412331.1412342
|View full text |Cite
|
Sign up to set email alerts
|

Forensic analysis of database tampering

Abstract: Mechanisms now exist that detect tampering of a database, through the use of cryptographically-strong hash functions. This paper addresses the next problem, that of determining who, when, and what, by providing a systematic means of performing forensic analysis after such tampering has been uncovered. We introduce a schematic representation termed a "corruption diagram" that aids in intrusion investigation. We use these diagrams to fully analyze the original proposal, that of a linked sequence of hash values. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
56
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 58 publications
(59 citation statements)
references
References 15 publications
(2 reference statements)
1
56
0
Order By: Relevance
“…Then, during forensic analysis of a subsequent validation that detected tampering, those chains can be rehashed to provide a sequence of truth values (success or failure), which can be used to narrow down "what. " We have elsewhere [7] proposed the Monochromatic, RGB, and Polychromatic forensic analysis algorithms. These algorithms differ in the amount of work necessary during normal processing (computing additional hash chains during periodic validation) and the precision of the when and what estimates produced by forensic analysis.…”
Section: Motivationmentioning
confidence: 99%
See 4 more Smart Citations
“…Then, during forensic analysis of a subsequent validation that detected tampering, those chains can be rehashed to provide a sequence of truth values (success or failure), which can be used to narrow down "what. " We have elsewhere [7] proposed the Monochromatic, RGB, and Polychromatic forensic analysis algorithms. These algorithms differ in the amount of work necessary during normal processing (computing additional hash chains during periodic validation) and the precision of the when and what estimates produced by forensic analysis.…”
Section: Motivationmentioning
confidence: 99%
“…Avoiding tamper detection comes down to inverting the cryptographically-strong one-way hash function. An extensive presentation of the approach, performance limitations, tamper detection, threat model and other forensic analysis algorithms can be found elsewhere [8], [10].…”
Section: Parties Involved and Threat Modelmentioning
confidence: 99%
See 3 more Smart Citations