Smart Phone Tool Test Assertions and Test Plan public-comment-draft v1
34 pages
English

Smart Phone Tool Test Assertions and Test Plan public-comment-draft v1

-

Le téléchargement nécessite un accès à la bibliothèque YouScribe
Tout savoir sur nos offres
34 pages
English
Le téléchargement nécessite un accès à la bibliothèque YouScribe
Tout savoir sur nos offres

Description

1 August 15, 2009 2 Smart Phone Tool Test Assertions and Test Plan 3 4 5 6 7 Draft 1 for public comment of Version 1.0 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 33 ii 33 Abstract 34 As mobile devices proliferate, incorporating a host of integrated features and capabilities, their use 35 can be seen everywhere in our world today. Mobile communication devices contain a wealth of 36 information. In the investigative community their use is not restricted to data recovery alone as in 37 criminal cases, but also civil disputes and proceedings, and their aggregate use in research and 38 incident recreation continues to increase. Due to the exploding rate of growth in the 39 production of new mobile devices appearing on the market each year is reason alone to pay 40 attention to test measurement means and methods. The methods a tool uses to capture, process, and 41 report data must incorporate a broad range of capabilities to meet the demand as a robust data 42 acquisition tool. In general, a forensic examination conducted on a mobile device is only a small 43 subset of the larger field of digital forensics. Consequentially, tools possessing an exhaustive array 44 of capabilities to acquire data from these portable mobile devices are relatively few in number. 45 46 This paper defines assertions and test cases for mobile device applications capable of ...

Informations

Publié par
Nombre de lectures 33
Langue English

Extrait


1 August 15, 2009
2 Smart Phone Tool Test Assertions and Test Plan
3
4
5
6
7 Draft 1 for public comment of Version 1.0
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33


33
ii

33 Abstract
34 As mobile devices proliferate, incorporating a host of integrated features and capabilities, their use
35 can be seen everywhere in our world today. Mobile communication devices contain a wealth of
36 information. In the investigative community their use is not restricted to data recovery alone as in
37 criminal cases, but also civil disputes and proceedings, and their aggregate use in research and
38 incident recreation continues to increase. Due to the exploding rate of growth in the
39 production of new mobile devices appearing on the market each year is reason alone to pay
40 attention to test measurement means and methods. The methods a tool uses to capture, process, and
41 report data must incorporate a broad range of capabilities to meet the demand as a robust data
42 acquisition tool. In general, a forensic examination conducted on a mobile device is only a small
43 subset of the larger field of digital forensics. Consequentially, tools possessing an exhaustive array
44 of capabilities to acquire data from these portable mobile devices are relatively few in number.
45
46 This paper defines assertions and test cases for mobile device applications capable of acquiring data
47 from mobile devices operating over a Global System for Mobile communication (GSM) and Code
48 Division Multiple Access (CDMA) networks, used to determine whether a specific tool meets the
•49 requirements producing measurable results. The assertions and test cases are derived from the
50 defined in the document entitled: Smart Phone Tool Specification. Test cases describe
51 the combination of test parameters required to test each assertion. Test assertions are described as
52 general statements of conditions that can be checked after a test is executed. Each assertion appears
53 in one or more test cases consisting of a test protocol and the expected test results. The test protocol
54 specifies detailed procedures for setting up the test, executing the test, and measuring the test
55 results.
56
57 Your comments and feedback are welcome; revisions of this document are available for download
58 at: http://www.cftt.nist.gov.
59

• NIST does not endorse nor recommend products or trade names identified in this paper. All products used in this paper
are mentioned for use in research and testing by NIST.
iii

59
iv

59 TABLE OF CONTENTS
60
61 1.
 Introduction ...................................................................................................................................1

62 2.
 Purpose..........1

63 3.
 Scope.............2

64 4.
 Test Assertions..............................2

65 5.
 Assertion Measurement...............................................................................................................11

66 5.1
 Connectivity..........................11

67 5.2
 Data Acquisition and Interpretation......................11

68 5.3
 Location Related Data...........15

69 5.4
 Tool Acquisition Variations ..................................................................................................15

70 5.5 
 Device Data Not Modified...16

71 5.6
 Generated Reports / Preview-Pane........................16

72 5.7
 Case File/Data Protection......17

73 5.8
 SIM PIN/PUK Authentication ..............................................................................................17

74 5.9
 Physical Acquisition..............................................................................................................17

75 5.10
 Non-ASCII Character Presentation.....................18

76 5.11
 Stand-alone Acquisition......18

77 5.12
 Hashing................................................................................................................................18

78 5.13
 GPS Reporting.....................19

79 6.
 Abstract Test Cases20

80 6.1
 Test Cases for Core Features.20

81 6.2
 Test Cases for Optional Features ..........................................................................................21

82
83
v

83
vi

83 1. Introduction
84 The need to ensure the reliability of mobile device forensic tools intensifies as the embedded
85 intelligence and ever-increasing storage capabilities of mobile devices expand. The goal of the
86 Computer Forensic Tool Testing (CFTT) project at the National Institute of Standards and
87 Technology (NIST) is to establish a methodology for testing computer forensic software tools. This
88 is accomplished by the development of both specific and common rules that govern tool
89 specifications. We adhere to a disciplined testing procedure, established test criteria, test sets, and
90 test hardware requirements, that result in providing necessary feedback information to toolmakers
91 so they can improve their tool’s effectiveness; end users benefit in that they gain vital information
92 making them more informed about choices for acquiring and using computer forensic tools, and
93 lastly, we impart knowledge to interested parties by increasing their understanding of a specific
94 tool’s capability. Our approach for testing computer forensic tools is based on established well-
95 recognized international methodologies for conformance testing and quality testing. For more
96 information on mobile device forensic methodology please visit us at: http://www.cftt.nist.gov/.
97
98 The Computer Forensic Tool Testing (CFTT) program is a joint project of the National Institute of
99 Justice (NIJ), the research and development organization of the U.S. Department of Justice, and the
100 National Institute of Standards and Technology’s (NIST’s) Office of Law Enforcement Standards
101 (OLES) and Information Technology Laboratory (ITL). CFTT is supported by other organizations,
102 including the Federal Bureau of Investigation, the U.S. Department of Defense Cyber Crime Center,
103 U.S. Internal Revenue Service Criminal Investigation Division Electronic Crimes Program, U.S.
104 Department of Homeland Security’s Bureau of Immigration and Customs Enforcement, U.S.
105 Customs and Border Protection, and the U.S. Secret Service. The objective of the CFTT program is
106 to provide measurable assurance to practitioners, researchers, and other applicable users that the
107 tools used in computer forensics investigations provide accurate results. Accomplishing this
108 requires the development of specifications and test methods for computer forensics tools and
109 subsequent testing of specific tools against those specifications.
110
111 The central requirement for a sound forensic examination of digital evidence is that the original
112 evidence must not be modified (i.e., the examination or capture of digital data from a mobile device
113 and associated media must be performed without altering the device or media content). In the event
114 that data acquisition is not possible using current technology to access information without
115 configuration changes to the device (e.g., loading a driver), the procedure must be documented.
116
117 2. Purpose
118 This document defines test assertions and test cases derived from requirements for mobile device
119 forensic tools capable of acquiring the internal memory from GSM smart phones and Subscriber
120 Identity Modules (SIM), and the internal memory of CDMA smart phones. The test assertions are
121 described as general statements of conditions that can be checked after a test is executed. Each
122 assertion generates one or more test cases consisting of a test protocol and the expected test results.
123 The test protocol specifies detailed procedures for setting up the test, executing the test, and
124 measuring the test results.


125 3. Scope
126 The scope of this specification is limited to software tools capable of acquiring the internal memory
127 of smart phones (both GSM and CDMA) and SIMs. While smart phones often have companion PC-
128 based software that provides users the ability to synchronize data between the device and a personal
129 computer this test assertion and test plan does not address device data synchronized with PCs. The
130 assertions and test cases are specific to data stored in the internal memory of the smart phone or
131 SIMs. The test cases are general and capable of being adapted to other types of mobile device
132 forensic software.
133
134 4. Test Assertions
135 The primary goal of the test assertions, presented below in Table 1, is to determine a tool’s ability to
136 accurately acquire specific data objects populated onto the device or SIM. An accurate acquisition
137 copies data objects from the powered device (i.e., active) such that the bytes of the acquired data
138 object are identical to the bytes of the data object on the device. The ID column ide

  • Univers Univers
  • Ebooks Ebooks
  • Livres audio Livres audio
  • Presse Presse
  • Podcasts Podcasts
  • BD BD
  • Documents Documents