Proceedings of the 40th International Conference on Software Engineering: New Ideas and Emerging Results 2018
DOI: 10.1145/3183399.3183426
|View full text |Cite
|
Sign up to set email alerts
|

Towards forensic-ready software systems

Abstract: As software becomes more ubiquitous, and the risk of cyber-crimes increases, ensuring that software systems are forensic-ready (i.e., capable of supporting potential digital investigations) is critical. However, little or no attention has been given to how well-suited existing software engineering methodologies and practices are for the systematic development of such systems. In this paper, we consider the meaning of forensic readiness of software, define forensic readiness requirements, and highlight some of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 26 publications
(24 citation statements)
references
References 21 publications
0
24
0
Order By: Relevance
“…However, this approach suggests collecting digital evidence from existing logs that are found in operating systems, networks, and intrusion detection systems, without considering logs generated by software systems. Pasquale et al [26] tailor the concept of forensic readiness to software engineering as a property that encapsulates the capabilities of the software to conduct digital forensic processes that maximize digital evidence [27] and produces evidence that satisfies the legal scrutiny in a court of law [28]. Alrajeh et al [19] define a framework for evidence preservation requirements of forensic-ready systems.…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…However, this approach suggests collecting digital evidence from existing logs that are found in operating systems, networks, and intrusion detection systems, without considering logs generated by software systems. Pasquale et al [26] tailor the concept of forensic readiness to software engineering as a property that encapsulates the capabilities of the software to conduct digital forensic processes that maximize digital evidence [27] and produces evidence that satisfies the legal scrutiny in a court of law [28]. Alrajeh et al [19] define a framework for evidence preservation requirements of forensic-ready systems.…”
Section: Background and Related Workmentioning
confidence: 99%
“…This framework ensures that only the minimum amount of data that is relevant to detect a security incident is collected. This work [19], [26] represents a first step towards implementing forensic-ready software systems. However, more effort is necessary to guide the implementation of logging statements inside software systems, to support the detection and investigation of software misuses.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The usage of data provenance can apply to security settings and provide evidence in digital forensic investigation. More examples for providing reference and evidence traces for auditing and forensic usage are summarized in Wang and Daniels [158], Pasquale et al [128] and Zhu et al [166] which also show that the traceability, dependability and reproducibility characteristics of data provenance can greatly support forensic usage by providing a chain of evidence and accountable tracing functionality. In Zhou et al [165] and Lee et al [93], the authors also summarized some uses of data provenance for tracing what has happened and who is accountable for certain actions in a network and distributed environment.…”
Section: Security Application Of Provenancementioning
confidence: 99%
“…Therefore, developers should implement logging functionalities in software systems that ensure that only key information [10] relevant to security incidents is collected. Logs generated by a software system can provide digital evidence [11] that can explain how an incident occurred [12] and can endure legal scrutiny in a court of law [13,14]. A system able to produce such evidence is so-called forensic-ready [15].…”
Section: Introductionmentioning
confidence: 99%