Maximilian Eichhorn (Friedrich-Alexander-Universitat Erlangen-Nurnberg), Andreas Hammer (Friedrich-Alexander-Universitat Erlangen-Nurnberg), Gaston Pugliese (Friedrich-Alexander-Universitat Erlangen-Nurnberg), Felix Freiling (Friedrich-Alexander-Universitat Erlangen-Nurnberg)

Evidence from digital devices in general, and Internet of Things (IoT) and embedded devices in particular, plays an increasing role in modern investigations. Yet their diversity in hardware and software encumbers their analysis and analysis results appear fragmented and hard to assess. Investigators, therefore, face the challenge of finding and interpreting relevant digital evidence stored on these devices. In order to standardize the forensic analysis of digital devices and structure research results, we present the User–Device Interaction Model (UDIM), a device-centric formal model that is based on the types of interaction between a device, users, and other devices across interaction types and locations. By integrating the analysis results of 42 IoT devices from the literature, we show how UDIM supports standardized analysis, and helps law enforcement agencies prioritize resources during seizures. Furthermore, the model can be used to assess the coverage of forensic examinations, to ensure thoroughness and completeness of investigations.

View More Papers

WIP: Security Vulnerabilities and Attack Scenarios in Smart Home...

Haoqiang Wang (Chinese Academy of Sciences, University of Chinese Academy of Sciences, Indiana University Bloomington), Yichen Liu (Indiana University Bloomington), Yiwei Fang, Ze Jin, Qixu Liu (Chinese Academy of Sciences, University of Chinese Academy of Sciences, Indiana University Bloomington), Luyi Xing (Indiana University Bloomington)

Read More

MIMIR: Masked Image Modeling for Mutual Information-based Adversarial Robustness

Xiaoyun xu (Radboud University), Shujian Yu (Vrije Universiteit Amsterdam), Zhuoran Liu (Radboud University), Stjepan Picek (Radboud University)

Read More

Crack in the Armor: Underlying Infrastructure Threats to RPKI...

Yunhao Liu (Tsinghua University & Zhongguancun Laboratory), Jessie Hui Wang (Tsinghua University & Zhongguancun Laboratory), Yuedong Xu (Fudan University), Zongpeng Li (Tsinghua University), Yangyang Wang (Tsinghua University & Zhongguancun Laboratory), Jilong Wang (Tsinghua University & Zhongguancun Laboratory)

Read More