2017
DOI: 10.1155/2017/1306802
|View full text |Cite
|
Sign up to set email alerts
|

Similarity Digest Search: A Survey and Comparative Analysis of Strategies to Perform Known File Filtering Using Approximate Matching

Abstract: Digital forensics is a branch of Computer Science aiming at investigating and analyzing electronic devices in the search for crime evidence. There are several ways to perform this search. Known File Filter (KFF) is one of them, where a list of interest objects is used to reduce/separate data for analysis. Holding a database of hashes of such objects, the examiner performs lookups for matches against the target device. However, due to limitations over hash functions (inability to detect similar objects), new me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 30 publications
(60 reference statements)
0
8
0
1
Order By: Relevance
“…In this work, we provide a solution for malware (repacked) detection using static analysis with fuzzy hashes. Two approaches are used for malware analysis, i.e., static analysis [12] and dynamic analysis [13]. In this study, our focus is on the static analysis of malware with the help of fuzzy hashes.…”
Section: Introductionmentioning
confidence: 99%
“…In this work, we provide a solution for malware (repacked) detection using static analysis with fuzzy hashes. Two approaches are used for malware analysis, i.e., static analysis [12] and dynamic analysis [13]. In this study, our focus is on the static analysis of malware with the help of fuzzy hashes.…”
Section: Introductionmentioning
confidence: 99%
“…In the context of database forensics and data acquisition, the challenges of big data analysis and data mining techniques for digital forensics [72], [73], and text clustering [74] were investigated. Moreover, a survey of techniques to perform similarity digest search is provided in [75].…”
Section: E Filesystems Memory and Data Storage Forensicsmentioning
confidence: 99%
“…[58], [61], [66], [67], [69], [75] Lack of standardized tools and technologies [59], [65], [66], [69], [70], [74] Forensic seizure and analysis of proprietary and/or distributed filesystems [58]- [60], [70], [71], [71], [73] Variety of format and content type. Not standard logging features and settings [61], [65]- [70], [73], [75] No validation/verification in real-life scenarios and large datasets [72], [74] Subjectivity of the evaluation of content retrieval algorithms [72], [74] Advanced knowledge and training of analysts and investigators [69], [72] Lack of guidance for investigators regarding selective search and seize.…”
Section: Challenge/limitation Referencesmentioning
confidence: 99%
See 1 more Smart Citation
“…O método para tornar a busca de similaridade mais eficiente varia para cada estratégia, podendo ser a utilização de tabelas hash ou deárvores de filtros de Bloom [Moia and Henriques 2017]. Apesar das vantagens trazidas por estas estratégias, elas apresentam problemas em relaçãoà alta quantidade de falsos positivos, istoé, os pares de arquivos que as estratégias afirmam serem similares não se provam similares quando se examina o conteúdo do dado, gerado pelo usuário.…”
Section: Trabalhos Relacionadosunclassified