Cyber Forensics on Internet of Things: Slicing and Dicing Raspberry Pi
Shuyuan Ho and
Mike Burmester
Additional contact information
Shuyuan Ho: Florida State University, United States
Mike Burmester: Florida State University, United States
International Journal of Cyber Forensics and Advanced Threat Investigations, 2021, vol. 2, issue 1, 29-49
Abstract:
Any device can now connect to the Internet, and Raspberry Pi is one of the more popular applications, enabling single-board computers to make robotics, devices, and appliances part of the Internet of Things (IoT). The low cost and customizability of Raspberry Pi makes it easily adopted and widespread. Unfortunately, the unprotected Raspberry Pi device—when connected to the Internet—also paves the way for cyber-attacks. Our ability to investigate, collect, and validate digital forensic evidence with confidence using Raspberry Pi has become important. This article discusses and presents techniques and methodologies for the investigation of timestamp variations between different Raspberry Pi ext4 filesystems (Raspbian vs. UbuntuMATE), comparing forensic evidence with that of other ext4 filesystems (i.e., Ubuntu), based on interactions within a private cloud, as well as a public cloud. Sixteen observational principles of file operations were documented to assist in our understanding of Raspberry Pi’s behavior in the cloud environments. This study contributes to IoT forensics for law enforcement in cybercrime investigations.
Keywords: Timestamp Analysis; Cyber Forensic Techniques; File Systems; Internet of Things; Raspberry Pi; Human-Computer Interaction; Sociotechnical Cybersecurity (search for similar items in EconPapers)
Date: 2021
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://conceptechint.net/index.php/CFATI/article/view/22/9 (application/pdf)
https://conceptechint.net/index.php/CFATI/article/view/22 (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aox:rcfati:v:2:y:2021:i:1:p:29-49
DOI: 10.46386/ijcfati.v2i1.22
Access Statistics for this article
International Journal of Cyber Forensics and Advanced Threat Investigations is currently edited by Professor John William Walker
More articles in International Journal of Cyber Forensics and Advanced Threat Investigations from Concept Tech Publishing
Bibliographic data for series maintained by Mira Leonko ().