Skip to content

Latest commit

 

History

History
41 lines (27 loc) · 3 KB

challenge-details.md

File metadata and controls

41 lines (27 loc) · 3 KB

DFRWS 2017 Challenge Details

SCENARIO

A woman (Betty) has been murdered. The murder was called in by Betty’s husband (Simon), who claims to have been at home at the time. Additional case details can be found here. Your job is to analyze these artifacts for forensically interesting information.

Time Zone: UTC+9

This Challenge aspires to motivate new approaches to forensic analysis and has four levels of participation:

  1. Evaluating and Expressing Conclusions: Assigning the probability of the results given two competing propositions (e.g. The husband killed the wife, some unknown person did).
  2. Device Level Analysis: Developing methods and tools to forensically process digital traces generated by IoT devices, including on mobile devices.
  3. Network and Cloud Level Analysis: Developing methods and tools to forensically process digital traces generated by IoT devices on networks and cloud systems.
  4. Correlation and Analysis: Developing methods and supporting tools that combine information from various data sources and automatically compute, visualize, or otherwise expose patterns of potential interest.

CHALLENGE DATA

Responders acquired the following data:

Device SHA1
Smart TV Rasberry Pi 9ac0de76eca7958bfed1bd5909bbf766409af180
Samsung Note 2 (Betty) cd494cf3097d8482100ce26dc8e35f0d87b67198
Samsung Note 2 (Simon) fc28e415ee740531df86a2b227c4f514e9ed40ba
Google OnHub Diagnostic report 20eb4825eaf6c303beadd090868110fb2de37066
Amazon Echo Cloud Data d1d126f47b565926dcc80fe6a4e7094f0281cb47
MDS (Acme, Inc.) Smarthome Network Dump 6ab6c522b070cde292a18645a19929998e009293

RULES

  • Contestants may enter individually, or as a team, with no restrictions.
  • Source code must be openly available under a free software license, such as those listed at http://www.gnu.org/licenses/license-list.html. The author(s) retain rights to the source code.
  • Tools may incorporate third-party free software, as long as it is compatible with your license and is included with your submission. However, submissions will be judged on the contribution your own work brings to the challenge.
  • Submissions must include clear instructions for building tool(s) from source code along with all relevant dependencies.
  • DFRWS will publish the results of the Challenge, both in detailed and summary form, along with the methodology used and the source of the specific version of each tool.

ACKNOWLEDGEMENTS

The DFRWS would like to thank the Digital Forensic Investigation Research Laboratory at Hallym University for the implementation of this Forensic Challenge. In particular, Joshua James implemented the challenge scenario in coordination with the DFRWS.