Overarching GOALS
From the outset, CSAFE and NIST set out to address the growing demand for forensics tools and methods specifically for digital evidence –– all built on strong probabilistic and statistics foundations.
Digital devices play a central role in modern society and criminal investigations requiring examination of digital devices and digital artifacts are common.
Examples of digital evidence based activities of forensic experts include detecting the use of steganographic algorithms by criminals to hide illicit text or images in otherwise innocent pictures or videos, recovering illicit data/software hidden on phones/tablets, and examining digital traces of user activity (e.g., messages/texts, login events) for signs of criminal activity.
Looking for
WEBINARS,
Short courses, presentations or publications
on Digital Evidence?
Additional Team Members
Roy Maxion
maxion@cs.cmu.edu
Hal S. Stern
sternh@uci.edu
Li Lin
llin@iastate.edu
Barbara Guttmann (NIST) barbara.guttman@nist.gov
focus Areas
The CSAFE team at ISU has developed and made public a reference dataset, StegoAppDB, comprised of more than 960,000 highly-provenanced image data created using our unique approach of modeling the steganography (stego) software applications (because their algorithms are not public). The data is used to develop and test algorithms and create new models of the camera pipeline. The next generation of algorithms for detecting hidden images will rely on deep learning algorithms with millions of free parameters (see, e.g., Boroumand et al., 2019). We are growing the database substantially through automation of the image data collection and stego creation process, such as using a drone to collect copious amounts of image data — in order to allow investigators to work with deep learning methods.
Steganography is a tool to send a secret message hidden in a common medium, like a digital image, so that the very existence of the payload escapes notice. The effort to hide and detect payload are inverse: a developer can easily create an app to hide payload, while steganalysis, or detection of hidden content, by a forensic image analyst requires expert knowledge and often extensive resources. Hundreds of thousands of stego apps have been downloaded for mobile devices, yet, until recently, steganalysis has appeared mainly in academic settings and not specifically for mobile apps.
In CSAFE 1.0, our project focused on the careful construction of the first forensic reference database for stego images created from mobile apps, producing StegoAppDB. StegoAppDB has more than 960,000 innocent and stego images, is fully provenanced and copyright-free, and publicly available online. However, StegoAppDB contains only indoor scenes, a limited number of distinct scenes, and a limited number of auto exposure images. For CSAFE 2.0, we propose to add image data selectively to enhance the attractiveness of StegoAppDB for wider use in the forensic imaging community, in the following manner:
- Add several million outdoor images so that the most successful machine learning techniques, deep learning neural networks, have access to ample data.
- Add images that have been photo-edited before embedding payload, which we suspect is a common occurrence. In fact, it is speculated that image editing operations may affect steganalysis error rates, but little to nothing is known about this, and certainly nothing for mobile stego images.
- Include stego apps beyond those currently in StegoAppDB and create an in-house detection tool for verification of our stego process, since no software package exists specifically to detect stego images created with mobile stego apps. We will use emulators and reverse engineering for the stego app analysis to retain accurate parameters for data provenance.
Our goal is to acquire outdoor scene data in a resource-efficient manner using a car, a bike, and/or a robot, with our in-house camera app Cameraw, taking many photos in an automated fashion, using simple and inexpensive mounts.
To establish support in and partnership with the practitioner community, we propose to conduct a brief survey at the beginning of the project. Its goal is to obtain information on the status quo of steganography in the digital evidence community and establish connections with labs to identify their needs as related to steganography. During meetings at SWGDE in 2019, the PI met Glenn Cavin, Lieutenant, Plano Police Department, Plano, Texas, who has provided a letter of support for his interest in this project. Additionally, note that the detection tool could be of potential interest to forensic practitioners.
The expanded database from combinations of these three image generation methods will allow users access to more realistically simulated evidence for mobile steganography and provide a source of data for tool development of mobile steganalysis. The in-house detection tool might provide insight for such a tool in the long-term.
The goal of this project is to develop new statistical methodologies to support digital forensics in analysis of user-generated event data — focusing on native or cloud-based logged event data from devices such as computers and mobile phones, typically of the form <accountID, timestamp, geolocation, metadata>. The types of forensic questions to be addressed will focus on identity-related questions, such as whether two sets of geolocation events were generated by the same individual or by two different individuals.
The rapid increase in the use of digital devices in the past decade has resulted in significant new challenges for digital forensics. In this context, the goal of this project is to develop new statistical methodologies to support digital forensics in analysis of user-generated event data. The project will focus on native or cloud-based logged event data from devices such as computers and mobile phones, typically of the form <accountID, timestamp, geolocation, metadata>. The types of forensic questions to be addressed will focus on identity-related questions, such as whether two sets of geolocation events were generated by the same individual or by two different individuals. Traditional approaches in statistical forensics, such as likelihood ratios and score-based likelihood ratios, will be extended to handle user-generated event data, particularly data with spatial and spatio-temporal information, building on our prior work in Phase 1 of CSAFE. The extensions will require development of robust and accurate new probabilistic models and fast new algorithms for large data sets. The project will use a variety of different real-world user event datasets as testbeds for development and evaluation. Deliverables from the project will include research papers, tutorial webinars, public testbed datasets and open-source software.
With the EviHunter tools, we are constructing a prototype Android App Evidence Database. In Phase II of the project we plan to extend EviHunter to be able to analyze complex features of Android apps caused by addressing current challenges. With the EviHunter technologies and AED, we expect that forensic investigators will improve their case work in terms of better efficiency, precision and completeness.
The plethora of mobile apps has introduced significant challenges to digital forensics practitioners, due to the large number and diversity of apps, for example over 2.6 million apps on Google Play plus many other apps available from 53 other app stores across the world. The average smartphone user has more than 80 apps on their phone and uses close to 40 of them each month. One chilling fact is that the lack of expert-knowledge about these large number and various types of apps has led to the practitioners’ challenges, including the inability of keeping up with the quick updates of apps on the app markets, discover critical and relevant evidence, or common problems of large casework backlogs in crime labs.
We propose this project that ultimately aims to develop EviHunter, a new path-, context-, flow-sensitive Android application program analysis tool set, to report the list of forensic relevant evidential data generated from the Android apps on a mobile device, by parsing the mobile application installation package using both static and dynamic approaches. During the first five years of the CSAFE project, we developed automated Android app program analysis tools to discover most (if not all) evidential data generated by the apps from a suspect’s mobile device or a remote cloud server. We have developed an award-winning EviHunter toolset (published at ACM CCS 2018 and IEEE SADFE 2018), and with the EviHunter tools, we are constructing a prototype Android App Evidence Database. In the next three years of the project (CSAFE Phase II), we plan to extend EviHunter to be able to analyze complex features of Android apps caused by addressing the following challenges: (1) software obfuscation, (2) limited capability of Soot in generating call graphs, (3) packing/unpacking of apps, (4) native code/3rd-libraries, (5) adapting dynamic Monkey-based tool into better supporting for dynamic EviHunter, and (6) building a better and more complete list of source/sink methods. Also, we will review the design of the prototyped EviHunter tools to optimize the code implementation to reduce the memory space usage and improve the computation complexity. With the deeper knowledge of evidence types and their frequency of usage, we plan to apply statistical methods to focus on more critical program paths inside the apps to speed up the app analysis process.
We also plan to continue to collect and construct (likely the largest) Android App Evidence Database. We will work with Iowa State University Legal Counsel to examine the potential legal issues and make the database accessible to the practitioners.
With the EviHunter technologies and AED, we expect that forensic investigators will improve their case work in terms of better efficiency, precision and completeness, compared against the current mobile device forensic practice that performs (to some extent) a manual process via Cellebrite and other mobile forensic tools. In an ideal case, we hope to reduce the case time (on a mobile device) from one or two days to 10-15 minutes, which will significantly make the practitioners’ life easier.
This project addresses two scenarios. In the specific source scenario, an investigator has two pieces of evidence: a questioned image Q from an unknown camera and a person of interest’s (POI’s) phone. The investigator wants to determine whether Q was captured by a camera on the POI’s phone. In the common source scenario, an investigator has two questioned images Q1 and Q2 from unknown cameras and the investigator wants to determine whether Q1 and Q2 were taken by the same camera. We plan to develop and test an objective, reproducible score-based likelihood ratio (SLR) approach to quantify the similarity between a questioned image Q and a camera fingerprint K from the POI’s phone (specific source scenario) or between two questioned images Q1 and Q2 (common source scenario) on a large, authenticated image dataset that includes multi-camera phones. This approach will enable the investigator to both determine whether image Q originated from a camera on the POI’s phone and to quantify the strength of the evidence.
Currently available authenticated image datasets from mobile phones are limited in the number of models and don’t contain adequate numbers of images for analysis from each available camera on the device. We plan to augment available datasets with authenticated images from a wide variety of phone brands and models, that include multiple phones of each model, and multiple images from each camera on each phone.
Our preliminary results addressing the specific source scenario on a small set of phones shows that if questioned image Q and camera fingerprint K are from cameras of the same model, calculating SLRs with a reference set of close non-matching phones (phones of the same model as the POI’s phone) produces the lowest rate of false inclusions. However, if Q and K are from different models a reference set of close non-matching phones can lead to a higher false inclusion rate than a reference set that uses a variety of models and brands. Thus, knowing the phone model that captured Q is important knowledge for the investigator. If this result persists on the larger dataset, we will develop a method to estimate the likelihood that Q originated from a specific brand and model of phone.
Knowledge transfer
Page 3 of 4
CSAFE 2020 All Hands Meeting
Type: Webinar Research Area(s): Bloodstain,Digital,Firearms and Toolmarks,Footwear,Forensic Statistics,Handwriting,Implementation and Practice,Latent Print,Training and Education
The 2020 All Hands Meeting was held May 12 and 13, 2020 and served as the closing to the last 5 years of CSAFE research and focused on kicking off new initiatives for the next phase of the center, CSAFE…
Android App Forensic Evidence Database (AndroidAED)
Type: Presentation Slides Research Area(s): Digital
Published: 2020 | By: Chen Shi
After attending this presentation, attendees will better understand how AndroidAED will be beneficial for academic researchers whose studies relate to mobile applications that grant them the ability to search through many of the available applications across various third-party app stores.
A Wild Manhunt for Stego Images Created by Mobile Apps
Type: Presentation Slides Research Area(s): Digital
Published: 2020 | By: Li Lin
As mobile Internet and telecommunication technology develops at high speed, the digital image forensics academic community is facing a growing challenge. • Mobile applications (Apps) allow a user to easily edit/process an image for a variety of purposes. • Thanks…
Quantifying the association between discrete event time series with applications to digital forensics
Type: Publication Research Area(s): Digital
Published: 2020 | By: Christopher Galbraith
We consider the problem of quantifying the degree of association between pairs of discrete event time series, with potential applications in forensic and cybersecurity settings. We focus in particular on the case where two associated event series exhibit temporal clustering…
Score-based Likelihood Ratios for Camera Device Identification
Type: Presentation Slides Research Area(s): Digital
Published: 2020 | By: Stephanie Reinders
Many areas of forensics are moving away from the notion of classifying evidence simply as a match or non-match. Instead, some use score-based likelihood ratios (SLR) to quantify the similarity between two pieces of evidence, such as a fingerprint obtained…
Algorithm mismatch in spatial steganalysis
Type: Presentation Slides Research Area(s): Digital
Published: 2019 | By: Stephanie Reinders
The number and availability of stegonographic embedding algorithms continues to grow. Many traditional blind steganalysis frameworks require training examples from every embedding algorithm, but collecting, storing and processing representative examples of each algorithm can quickly become untenable. Our motivation for…
Score-based likelihood ratios in device identification
Type: Publication Research Area(s): Digital
Published: 2020 | By: Stephanie Reinders
Many areas of forensics are moving away from the notion of classifying evidence simply as a match or non-match. Instead, some use score-based likelihood ratios (SLR) to quantify the similarity between two pieces of evidence, such as a fingerprint obtained…
An Overview of CSAFE’s Publically Available Datasets
Type: Webinar Research Area(s): Digital,Footwear
Forensic scientists and researchers can now directly implement CSAFE data into their laboratory work. CSAFE forensic databases are publically available and can be utilized to test current analysis techniques, design new methods, and increase confidence in forensic evidence conclusions. This…
StegoAppDB: A steganography apps forensics image database
Type: Publication Research Area(s): Digital
Published: 2019 | By: Jennifer Newman/J. Newman presented
In this paper, we present a new reference dataset simulating digital evidence for image (photographic) steganography. Steganography detection is a digital image forensic topic that is relatively unknown in practical forensics, although stego app use in the wild is on…
Spatial DNA: Measuring similarity of geolocation datasets with applications to forensics
Type: Presentation Slides Research Area(s): Digital
Published: 2019 | By: Christopher Galbraith
Datasets consisting of geolocated events provide rich spatial characterizations of human behavior. Individuals tend to be self-consistent over time while generating such events, visiting the same locations such as home, the office, or the gym. In this paper we develop…
Adversarial Matching of Dark Net Market Vendor Accounts
Type: Presentation Slides Research Area(s): Digital
Published: 2019 | By: Xiao Hui Tai
Many datasets feature seemingly disparate entries that actually refer to the same entity. Reconciling these entries, or "matching," is challenging, especially in situations where there are errors in the data. In certain contexts, the situation is even more complicated: an…
Identifying Digital Evidence from Android Devices via Static and Dynamic Analysis
Type: Webinar Research Area(s): Digital
This CSAFE Center Wide webinar was presented on June 25, 2019 by Dr. Yong Guan, CSAFE researcher at Iowa State University. Presentation Description: The over 50 app stores across the world provides mobile phone users with access to 8 million…
Android™ App Forensic Evidence Database
Type: Presentation Slides Research Area(s): Digital
Published: 2019 | By: Chao-Chun C. Cheng
After attending this presentation, attendees will understand how to use this new Android™ Center for Statistics and Applications in Forensic Evidence-App Evidence Database (CSAFE-AED) in their casework investigation. This presentation will introduce the basics, challenges, and limitations of the current…
StegoAppDB and the Prevalenca of Mobile Steganography
Type: Presentation Slides Research Area(s): Digital
Published: 2019 | By: Jennifer Newman
After attending this presentation, attendees will be aware of the first mobile stego app database for image forensics and the current lack of software to detect the prevalence of stego use on mobile devices.
StegoAppDB: A steganography apps forensics image database
Type: Presentation Slides Research Area(s): Digital
Published: 2019 | By: Jennifer Newman
In this paper, we present a new reference dataset simulating digital evidence for image (photographic) steganography. Steganography detection is a digital image forensic topic that is relatively unknown in practical forensics, although stego app use in the wild is on…
Tackling Android Stego Apps in the Wild
Type: Publication Research Area(s): Digital
Published: 2018 | By: Wenhao Chen
Digital image forensics is a young but maturing field, encompassing key areas such as camera identification, detection of forged images, and steganalysis. However, large gaps exist between academic results and applications used by practicing forensic analysts. To move academic discoveries…
The impact of exposure settings in the digital image forensics
Type: Publication Research Area(s): Digital
Published: 2018 | By: Li Lin
The digital image forensics academic community is facing a growing challenge. The volume of images presented to digital image forensic practitioners increases every day, and with it, more variety of possible outcomes in image analysis. When an academic forensic tool…
Forensic Analysis of Android Steganography Apps
Type: Publication Research Area(s): Digital
Published: 2018 | By: Wenhao Chen
The processing power of smartphones supports steganographic algorithms that were considered to be too computationally intensive for handheld devices. Several steganography apps are now available on mobile phones to support covert communications using digital photographs. This chapter focuses on two…
StegoDB: a smartphone camera image database for benchmarking image forensics
Type: Presentation Slides Research Area(s): Digital
Published: 2018 | By: Jennifer Newman
This presentation introduces StegoDB: a smartphone camera image database for benchmarking image forensics
Dynamic Taint Analysis Tool for Android App Forensics
Type: Presentation Slides Research Area(s): Digital
Published: 2019 | By: Zhen Xu
The plethora of mobile apps introduce critical challenges to digital forensics practitioners, due to the diversity and the large number (millions) of mobile apps available to download from Google play, Apple store, as well as hundreds of other online app…
Page 3 of 4
COMMUNITY CALL-TO-ACTION
Want to collaborate with CSAFE on a project. Contact us to share your idea.