Ben Livelsberger NIST Information Technology Laboratory, CFTT Program

Slides:



Advertisements
Similar presentations
The Messy World of Grey Literature in Cyber Security 8 th Grey Literature Conference 4-5 December 2006 New Orleans, Louisiana Patricia Erwin – I3P Senior.
Advertisements

A Strategy for Testing Hardware Write Block Devices James R Lyle National Institute of Standards and Technology.
Jim Lyle National Institute of Standards and Technology.
Deleted File Recovery Tool Testing Results Jim Lyle NIST 2/21/13AAFS -- Washington 1.
Civilian Agency Acquisition Council Ralph De Stefano Director Contract Policy Division Civilian Agency Acquisition Council.
Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation.
Department of Labor HSPD-12
Objective Understand web-based digital media production methods, software, and hardware. Course Weight : 10%
Cyber Education Project Accreditation Committee November 2014.
Forensic Tool Testing Results Jim Lyle National Institute of Standards and Technology.
Computer & Mobile Forensics Standards Barbara Guttman October 1, 2009.
Federated Testing: Well-Tested Tools, Shared Test Materials & Shared Test Reports; The Computer Forensics Tool Catalog Website: Connecting Forensic Examiners.
Who We Are… The Foundation is a 501(c)(3) non-profit research organization that owns and operates the Morrelly Homeland Security Center which is the first.
Guide to Computer Forensics and Investigations Fourth Edition
Open Statistics: Envisioning a Statistical Knowledge Network Ben Shneiderman Founding Director ( ), Human-Computer Interaction.
COS/PSA 413 Day 5. Agenda Questions? Assignment 2 Redo –Due September 3:35 PM Assignment 3 posted –Due September 3:35 PM Quiz 1 on September.
Graphic File Carving Tool Testing Jenise Reyes-Rodriguez National Institute of Standards and Technology AAFS - February 19 th, 2015.
Mobile Device Forensics Rick Ayers. Disclaimer  Certain commercial entities, equipment, or materials may be identified in this presentation in order.
Mobile Device Forensics - Tool Testing Richard Ayers.
Guide to Computer Forensics and Investigations, Second Edition
Computer Forensics Tool Catalog: Connecting Users With the Tools They Need AAFS –February 21, 2013 Ben Livelsberger NIST Information Technology Laboratory.
July 9, National Software Reference Library Douglas White Information Technology Laboratory July 2004.
Quirks Uncovered While Testing Forensic Tool Jim Lyle Information Technology Laboratory Agora March 28, 2008.
Fellowship Application Universe WPI Office of Sponsored Programs Elena Glatman Associate Director, Pre-award Services.
NIST CFTT: Testing Disk Imaging Tools James R. Lyle National Institute of Standards and Technology Gaithersburg Md.
®® Microsoft Windows 7 for Power Users Tutorial 8 Troubleshooting Windows 7.
Building service testbeds on FIRE D5.2.5 Virtual Cluster on Federated Cloud Demonstration Kit August 2012 Version 1.0 Copyright © 2012 CESGA. All rights.
Information Systems Security Computer System Life Cycle Security.
DC3 AFRL DFRWS Formalizing Forensic Test & Evaluation Activities Mr Mark Hirsh DoD Cyber Crime Institute August 2004.
ACL: Introduction & Tutorial
National Law Enforcement and Corrections Technology Center - West The Security Summit Law Enforcement – Finding, Evaluating & Employing Best-of-Breed Technologies.
7 Handling a Digital Crime Scene Dr. John P. Abraham Professor UTPA.
Objectives Overview Identify the general categories of programs and apps Describe how an operating system interacts with applications and hardware Differentiate.
Information Sharing Challenges, Trends and Opportunities
CC&E Best Data Management Practices, April 19, 2015 Please take the Workshop Survey 1.
Fraud Examination Evidence III: Forensic Science and Computer Forensics McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies,
SEARCH Membership Group Systems & Technology PAC Global Justice XML Data Model (GJXDM) Update January 29, 2005.
Disclaimer Certain trade names and company products are mentioned in the text or identified. In no case does such identification imply recommendation or.
Business and Systems Aligned. Business Empowered. TM Federal Identity Management Handbook May 5, 2005.
Data Management Practices for Early Career Scientists: Closing Robert Cook Environmental Sciences Division Oak Ridge National Laboratory Oak Ridge, TN.
Government at Work: The Bureaucracy Chapter 15. THE EXECUTIVE OFFICE OF THE PRESIDENT Section 2.
Developing Policy and Procedure Management System إعداد برنامج سياسات وإجراءات العمل 8 Safar February 2007 HERA GENERAL HOSPITAL.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
DEPARTMENT OF HOMELAND SECURITY SCIENCE AND TECHOLOGY Evolution of Systems Engineering Dr. Phil DePoy Former Director Wayne E. Meyer Institute of Systems.
Day 1 - Panel Discussion DFRWS 2004 Linthicum, MD.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Security Checklists for IT Products. Agenda Overview of Checklist Program Discussion of Operational Procedures Current Status Next Steps.
Computer Literacy for IC 3 Unit 1: Computing Fundamentals © 2010 Pearson Education, Inc. | Publishing as Prentice Hall.1 Chapter 4: Identifying Software.
CACE Standing Curriculum Meeting CACE Standing Curriculum Meeting.
Timothy Putprush Baltimore, MD September 30, 2009 Federal Emergency Management Agency (FEMA) Integrated Public Alert and Warning System Presentation to.
DOE Data Management Plan Requirements
Technologies for Critical Incident Preparedness Conference 2007 The Inter Agency Board (IAB)’s Standardized Equipment List (SEL) Robert J. Ingram Chair-IAB.
Data Management Practices for Early Career Scientists: Closing Robert Cook Environmental Sciences Division Oak Ridge National Laboratory Oak Ridge, TN.
Understanding Web-Based Digital Media Production Methods, Software, and Hardware Objective
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
HAMILTON VENUS Security Settings. Security Settings are set in the System Configuration Editor.
Chapter 8 Forensic Duplication Spring Incident Response & Computer Forensics.
Jan Garvin, MCSFS Executive Director Law Enforcement & Emergency Services Video Association.
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
Cell Phone Forensics Investigator - ICFECI
CyVerse Workshop Discovery Environment Overview. Welcome to the Discovery Environment A Simple Interface to Hundreds of Bioinformatics Apps, Powerful.
The Common Criteria for Information Technology Security Evaluation
Security Checklists for IT Products
PhD Oral Exam Presentation
CyVerse Discovery Environment
Chapter Three The Contemporary Law Enforcement Industry
Career JEOPARDY! Cluster: Information Technology
Lesson # 1 A Practical Guide to Computer Forensics Investigations
Objective Understand web-based digital media production methods, software, and hardware. Course Weight : 10%
Digital Forensics Dr. Bhavani Thuraisingham
Presentation transcript:

Ben Livelsberger NIST Information Technology Laboratory, CFTT Program Federated Testing: Shared Test Materials from the CFTT Program at NIST for Digital Forensics Tool Validation and Shared Test Reports DFRWS – August 11, 2015 Ben Livelsberger NIST Information Technology Laboratory, CFTT Program

Computer Forensics Tool Testing Program Overview The Computer Forensics Tool Testing Program provides a measure of assurance that the tools used in the investigations of computer-related crimes produce valid results. CFTT develops test methodologies and tests selected tools. Directed by a steering committee composed of representatives of the law enforcement community. CFTT is a joint project of: DHS, NIST/SPO, FBI, DoD, Secret Service, NIJ and other agencies.

What is Federated Testing? Federated Testing is an expansion of CFTT to provide the digital forensics community with: test materials for validating digital forensics tools and to support shared test reports. I introduce FT as shared test materials + shared test reports and then later tell the audience that the shared test materials are a dvd. Paul thought it might make FT more concrete to tell them that it’s a DVD up front (could even hold up a DVD as a prop– see, this is FT).

Tool Validation – Why? Why do Labs Perform Tool Validation? Demonstrates reliability of results Identifies tool limitations May support admissibility of results May be required for lab accreditation -to satisfy Daubert guidelines

State of Tool Testing Test Reports Tool testing is expensive CFTT, published through DHS S&T Department of Defense Cyber Crime Center, U.S. Law Enforcement Other agencies and labs, in-house Tool testing is expensive Duplicated work

Barriers to sharing test results Idea: share test results Barriers: Labs test differently Dissimilar report formats

Federated Testing Proposes Shared test materials from CFTT: Use a common test methodology Common test data sets with known ground truth Use a common test report format Sharing Test Reports Via public websites, e.g., DHS S&T Informally between labs Kept private

Target Areas CFTT has methodologies for: Implementing: Disk Imaging Hardware Write Block Mobile Devices Forensic Media Preparation Deleted File Recovery File Carving Implementing: From Paul on 1/13/15: setting expectations: all the pieces are there now. Pre-release in March with release 1 coming after we’ve had a chance finish gathering feedback from our Beta testers.

What do the test materials look like? Download live Linux® CD .iso file Components: User Interface Select tool features to test Instructions for creating test data and for running test cases Generate test report Command line test support tool Setup test cases and analyze the results

User Interface - Home

Disk Imaging Home

Selecting Tool Features

Tests To Run

Test Case Instructions

Command Line Tool

Sample Test Report

Framework for Sharing Test Reports Lab/individual tests tool using Federated Testing materials Tester submits test report and logs to CFTT CFTT reviews test report and logs Vendor comment period Post test report to website (alternately post contact information)

Anticipated Benefits More tools validated Shared test reports Cost savings Allows vendors to improve their tools Helps users to make informed choices on what tools/tool versions they use Allows labs to mitigate known errors Faster testing

Federated Testing for Disk Imaging Release Plan Receiving feedback from beta testers Improve materials based on beta testing Record companion video tutorials Prerelease version available at www.cftt.nist.gov/federated- testing.html Release version 1.0

Project Sponsors Department of Homeland Security, Science and Technology Directorate (Major funding) NIST Special Programs Office / Forensics

Contacts Ben Livelsberger www.cftt.nist.gov/federated_testing.cfm benjamin.livelsberger@nist.gov www.cftt.nist.gov/federated_testing.cfm cftt@nist.gov Sue Ballou, Special Program Office at NIST susan.ballou@nist.gov

Questions?