Analysis Technique Data hiding using HPA DCO on SATA Hard Drive

Authors

  • Muhammad Reyfasha Ilhami School of Computing, Telkom University, Indonesia
  • Niken Dwi Cahyani School of Computing, Telkom University, Indonesia
  • Erwid Musthofa Jadied School of Computing, Telkom University, Indonesia

DOI:

10.33395/sinkron.v8i4.14042

Abstract

Data hiding techniques in the Host Protected Area (HPA) and Device Configuration Overlay (DCO) areas of SATA Hard Disk Drives have become a frequently used anti-forensic activity to hide data and evidence. The area is inaccessible to standard operating systems and software, making it capable of hiding data. This technique utilizes the ability of the SATA Hard Disk Drive to reconfigure the storage size so as to hide evidence. When anti-forensic data hiding Host Protected Area (HPA) and Device Configuration Overlay (DCO) activities occur, it is necessary to conduct a digital forensic investigation to find clues that are useful in solving crimes. Therefore, in this research, an assessment of data hiding techniques using Host Protected Area (HPA) and Device Configuration Overlay (DCO) on SATA Hard Disk Drives is carried out. The implementation of the HPA DCO data hiding technique on a SATA Hard Disk Drive by identifying the HPA DCO area on the SATA HDD and investigating the acquisition results on the SATA HDD is the subject of this research. It is expected that the results will provide a comprehensive overview of HPA DCO data hiding techniques on a SATA HDD as well as recommendations on how to identify and investigate SATA HDDs that have HPA DCO. This effort aims to evaluate the HPA DCO data hiding technique in various cases and provide insight into the potential use of this technique in hiding data or evidence.

GS Cited Analysis

Downloads

Download data is not yet available.

References

Abdullahi, Z. H. (2023). An Overview of Anti-forensic Techniques and their Impact on Digital Forensic Analysis. https://www.researchgate.net/publication/368365338

Anderson, B., & McGrew, D. (2017). Machine learning for encrypted malware traffic classification: Accounting for noisy labels and non-stationarity. Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Part F129685, 1723–1732. https://doi.org/10.1145/3097983.3098163

Bhat, W. A., AlZahrani, A., & Wani, M. A. (2021). Can computer forensic tools be trusted in digital investigations? Science and Justice, 61(2), 198–203. https://doi.org/10.1016/j.scijus.2020.10.002

Chand Bansal, J., Kusum, ·, Nagar, A. K., Giri, K. J., Ahmad, S., Rumaan, P., Khan, B., & Editors, M. (2021). Algorithms for Intelligent Systems Multimedia Security Algorithm Development, Analysis and Applications. http://www.springer.com/series/16171

Conlan, K., Baggili, I., & Breitinger, F. (2016). Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy. DFRWS 2016 USA - Proceedings of the 16th Annual USA Digital Forensics Research Conference, S66–S75. https://doi.org/10.1016/j.diin.2016.04.006

Douglas, M., Bailey, K., Leeney, M., & Curran, K. (2018). An overview of steganography techniques applied to the protection of biometric data. Multimedia Tools and Applications, 77(13), 17333–17373. https://doi.org/10.1007/s11042-017-5308-3

Garfinkel, S. L. (2007). Anti-forensics: Techniques, detection and countermeasures. https://www.researchgate.net/publication/228339244

Gruhn, M. (2017). Forensic limbo: Towards subverting hard disk firmware bootkits. Digital Investigation, 23, 138–150. https://doi.org/10.1016/j.diin.2017.10.003

Gupta, M. R., Hoeschele, M. D., & Rogers, M. K. (2006). Hidden Disk Areas: HPA and DCO. In International Journal of Digital Evidence Fall (Vol. 5, Issue 1). www.ijde.org

Harris, R. (2006). Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem. Digital Investigation, 3(SUPPL.), 44–49. https://doi.org/10.1016/j.diin.2006.06.005

IDAP’17 : International Artificial Intelligence and Data Processing Symposium : September 16-17. (2017). IEEE.

Ishtiaq, M. (2019). Book Review Creswell, J. W. (2014). Research Design: Qualitative, Quantitative and Mixed Methods Approaches (4th ed.). Thousand Oaks, CA: Sage. English Language Teaching, 12(5), 40. https://doi.org/10.5539/elt.v12n5p40

Kretowicz, J., Sienicka, M., Strzelec, M., & Ziemianowicz, M. (2016). Editor-in-Chief. www.eforensicsmag.com

Leng, J., & Li, T. (2018). Research on Computer System Information Hiding Anti-Forensic Technology.

Li, B., He, J., Huang, J., & Shi, Y. Q. (2011). A Survey on Image Steganography and Steganalysis. In Journal of Information Hiding and Multimedia Signal Processing c (Vol. 2, Issue 2).

Mukasey, M. B., & Hagy, D. W. (2008). Test Results for Digital Data Acquisition Tool: FTK Imager 2.5.3.14. www.ojp.usdoj.gov/nijwww.ojp.usdoj.gov

Sahu, A. K., & Sahu, M. (2020). Digital image steganography and steganalysis: A journey of the past three decades. In Open Computer Science (Vol. 10, Issue 1, pp. 296–342). Walter de Gruyter GmbH. https://doi.org/10.1515/comp-2020-0136

Verma, S., Kapoor, V., & Maheshwari, R. (2019). An Enhanced Cryptographic System for Fast and Efficient Data Transmission. Advances in Intelligent Systems and Computing, 870, 287–297. https://doi.org/10.1007/978-981-13-2673-8_31

Wani, M. A., Bhat, W. A., & Alzahrani, A. (2020). File system anti-forensics-types, techniques and tools.

Downloads


Crossmark Updates

How to Cite

Ilhami, M. R. ., Cahyani , N. D. ., & Jadied, E. M. . (2024). Analysis Technique Data hiding using HPA DCO on SATA Hard Drive. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 8(4), 2379-2388. https://doi.org/10.33395/sinkron.v8i4.14042