Analysis Technique Data hiding using HPA DCO on SATA Hard Drive
DOI:
10.33395/sinkron.v8i4.14042Abstract
Data hiding techniques in the Host Protected Area (HPA) and Device Configuration Overlay (DCO) areas of SATA Hard Disk Drives have become a frequently used anti-forensic activity to hide data and evidence. The area is inaccessible to standard operating systems and software, making it capable of hiding data. This technique utilizes the ability of the SATA Hard Disk Drive to reconfigure the storage size so as to hide evidence. When anti-forensic data hiding Host Protected Area (HPA) and Device Configuration Overlay (DCO) activities occur, it is necessary to conduct a digital forensic investigation to find clues that are useful in solving crimes. Therefore, in this research, an assessment of data hiding techniques using Host Protected Area (HPA) and Device Configuration Overlay (DCO) on SATA Hard Disk Drives is carried out. The implementation of the HPA DCO data hiding technique on a SATA Hard Disk Drive by identifying the HPA DCO area on the SATA HDD and investigating the acquisition results on the SATA HDD is the subject of this research. It is expected that the results will provide a comprehensive overview of HPA DCO data hiding techniques on a SATA HDD as well as recommendations on how to identify and investigate SATA HDDs that have HPA DCO. This effort aims to evaluate the HPA DCO data hiding technique in various cases and provide insight into the potential use of this technique in hiding data or evidence.
Downloads
References
Abdullahi, Z. H. (2023). An Overview of Anti-forensic Techniques and their Impact on Digital Forensic Analysis. https://www.researchgate.net/publication/368365338
Anderson, B., & McGrew, D. (2017). Machine learning for encrypted malware traffic classification: Accounting for noisy labels and non-stationarity. Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Part F129685, 1723–1732. https://doi.org/10.1145/3097983.3098163
Bhat, W. A., AlZahrani, A., & Wani, M. A. (2021). Can computer forensic tools be trusted in digital investigations? Science and Justice, 61(2), 198–203. https://doi.org/10.1016/j.scijus.2020.10.002
Chand Bansal, J., Kusum, ·, Nagar, A. K., Giri, K. J., Ahmad, S., Rumaan, P., Khan, B., & Editors, M. (2021). Algorithms for Intelligent Systems Multimedia Security Algorithm Development, Analysis and Applications. http://www.springer.com/series/16171
Conlan, K., Baggili, I., & Breitinger, F. (2016). Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy. DFRWS 2016 USA - Proceedings of the 16th Annual USA Digital Forensics Research Conference, S66–S75. https://doi.org/10.1016/j.diin.2016.04.006
Douglas, M., Bailey, K., Leeney, M., & Curran, K. (2018). An overview of steganography techniques applied to the protection of biometric data. Multimedia Tools and Applications, 77(13), 17333–17373. https://doi.org/10.1007/s11042-017-5308-3
Garfinkel, S. L. (2007). Anti-forensics: Techniques, detection and countermeasures. https://www.researchgate.net/publication/228339244
Gruhn, M. (2017). Forensic limbo: Towards subverting hard disk firmware bootkits. Digital Investigation, 23, 138–150. https://doi.org/10.1016/j.diin.2017.10.003
Gupta, M. R., Hoeschele, M. D., & Rogers, M. K. (2006). Hidden Disk Areas: HPA and DCO. In International Journal of Digital Evidence Fall (Vol. 5, Issue 1). www.ijde.org
Harris, R. (2006). Arriving at an anti-forensics consensus: Examining how to define and control the anti-forensics problem. Digital Investigation, 3(SUPPL.), 44–49. https://doi.org/10.1016/j.diin.2006.06.005
IDAP’17 : International Artificial Intelligence and Data Processing Symposium : September 16-17. (2017). IEEE.
Ishtiaq, M. (2019). Book Review Creswell, J. W. (2014). Research Design: Qualitative, Quantitative and Mixed Methods Approaches (4th ed.). Thousand Oaks, CA: Sage. English Language Teaching, 12(5), 40. https://doi.org/10.5539/elt.v12n5p40
Kretowicz, J., Sienicka, M., Strzelec, M., & Ziemianowicz, M. (2016). Editor-in-Chief. www.eforensicsmag.com
Leng, J., & Li, T. (2018). Research on Computer System Information Hiding Anti-Forensic Technology.
Li, B., He, J., Huang, J., & Shi, Y. Q. (2011). A Survey on Image Steganography and Steganalysis. In Journal of Information Hiding and Multimedia Signal Processing c (Vol. 2, Issue 2).
Mukasey, M. B., & Hagy, D. W. (2008). Test Results for Digital Data Acquisition Tool: FTK Imager 2.5.3.14. www.ojp.usdoj.gov/nijwww.ojp.usdoj.gov
Sahu, A. K., & Sahu, M. (2020). Digital image steganography and steganalysis: A journey of the past three decades. In Open Computer Science (Vol. 10, Issue 1, pp. 296–342). Walter de Gruyter GmbH. https://doi.org/10.1515/comp-2020-0136
Verma, S., Kapoor, V., & Maheshwari, R. (2019). An Enhanced Cryptographic System for Fast and Efficient Data Transmission. Advances in Intelligent Systems and Computing, 870, 287–297. https://doi.org/10.1007/978-981-13-2673-8_31
Wani, M. A., Bhat, W. A., & Alzahrani, A. (2020). File system anti-forensics-types, techniques and tools.
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2024 Muhammad Reyfasha Ilhami, Niken Dwi Cahyani , Erwid Musthofa Jadied
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.