Award Abstract # 1442069
EAGER: Privacy-Preserving Approaches to Proactive Forensics

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: UNIVERSITY OF MASSACHUSETTS
Initial Amendment Date: May 2, 2014
Latest Amendment Date: May 2, 2014
Award Number: 1442069
Award Instrument: Standard Grant
Program Manager: Deborah Shands
CNS
 Division Of Computer and Network Systems
CSE
 Direct For Computer & Info Scie & Enginr
Start Date: June 1, 2014
End Date: May 31, 2016 (Estimated)
Total Intended Award Amount: $99,894.00
Total Awarded Amount to Date: $99,894.00
Funds Obligated to Date: FY 2014 = $99,894.00
History of Investigator:
  • Brian Levine (Principal Investigator)
    brian@cs.umass.edu
Recipient Sponsored Research Office: University of Massachusetts Amherst
101 COMMONWEALTH AVE
AMHERST
MA  US  01003-9252
(413)545-0698
Sponsor Congressional District: 02
Primary Place of Performance: University of Massashusetts
70 Butterfield Terr
AMherst
MA  US  01003-9242
Primary Place of Performance
Congressional District:
02
Unique Entity Identifier (UEI): VGJHK59NMPK9
Parent UEI: VGJHK59NMPK9
NSF Program(s): Secure &Trustworthy Cyberspace
Primary Program Source: 01001415DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 7434, 7916
Program Element Code(s): 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Insider attacks are a critical issue for companies and governments in scenarios involving trade secrets, sensitive information, intellectual property, personally identifiable information, classified documents, and more. Too many existing approaches for responding to these attacks rely on mechanisms that assume the recovery of locally stored, unencrypted data. These techniques fail on the growing number of devices that employ file system encryption and cloud storage. This project advances novel methods of offering to an attacker's system covert evidence of their attack that may remain after primary data and documents are encrypted or securely wiped. The data has precise meaning to investigators that is demonstrable in court and to other third parties. The data is obfuscated from interpretation by third parties without investigator assistance, and thus is privacy preserving. The long-range outcome of this project will be the enabling of research including:  generalized methods of attack response when the computers involved are outside or partially outside the administrator's control, automated methods of discovering channels for offering evidence, and defenses against these techniques. Our research is an important stepping stone towards the broader topic of privacy-preserving, proactive investigation of attacks committed using networked computer systems.

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

 

Many existing approaches to digital forensics rely on the recover of locally stored, unencrypted data that has been passively left behind. Built for a passing golden age of forensics, these "Locardian" techniques unfortunately fail on the growing number of devices that employ file system encryption and cloud storage.  Advanced techniques are increasingly required of forensic investigators if they are to address these trends. A class of newer techniques for forensic investigation attempt to proactively acquire or store evidence ahead of or during an incident, to ensure it is available despite encryption, deletion, or obfuscation by the perpetrator. Previous approaches to this problem include tagging and beacons. These methods are able to create evidence despite a user obscured by an anonymous connection or using a machine outside the control of an administrator.   We developed a software tool that embeds in a document (as a helper macro) and proactively and covertly leaves evidence behind on a system when the document is opened or altered. We assumed a model where the investigator does not have access to the target's machine, but can gain authorization later. The tool is the result of a manual search for opportunities for proactive creation of evidence. In future work, we will seek to develop methods for the automated discovery of opportunities to proactively create evidence.


Last Modified: 10/07/2016
Modified by: Brian N Levine

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page