Overview | Challenge Details | Results
There were five submissions to the DFRWS 2009 Forensics Challenge. This challenge was designed to be accessible to a wide audience, combined accessible forensic analysis tasks with some harder problems. We were pleased that the submissions this year came from not just researchers and developers, but also practitioners in the community.
Some aspects of the challenge could not be completed using existing tools and new techniques had to be developed. However, many of the questions could be answered without developing new approaches.
We thank all contestants for their efforts and their willingness to share their results and techniques with the community.
The winning submission for the DFRWS2009 Forensic Challenge was from Wouter van Dongen and Alain van Hoof at University of Amsterdam System & Network Engineering (PDF Report).
This submission provided a thorough analysis of the file system and network traffic, with some information extracted from the physical memory dump. The careful correlation of information from multiple data sources was a major strength of this submission. The results were presented in a very clear manner, and there is a particularly impressive timeline diagram.
Byungkil Lee, Hongsuk Yang, and Hyeon Yu provided concise analysis of available evidence to address the questions posed in this challenge, providing a rough timeline of events (PDF Report).
Knut Kröger and Sven Wegner at University of Applied Sciences Brandenburg used a variety of tools to extract information from the available evidence and address the questions posed in this challenge (PDF Report).
Jewan Bang, JungHeum Park, Kwonyoup Kim, and Sangjin Lee at Korea University Center for Information Security Technologies focused on the questions posed in this challenge, giving a concise overview of information obtained from the evidence (PDF Report).
Erik Hjelmvik concentrated on analysis of network traffic, presenting details relevant to the investigation (PDF Report).
Submissions were evaluated based on the completeness and accuracy of the findings, and on effort developing new techniques and tools. The highest scores were awarded to the submissions that produced the most complete and accurate results, and that contributed significant new tools and techniques.
None of the submissions focused on the analysis of memory in this challenge. The creators of this challenge at the University of New Orleans developed a memory analysis tool to extract details from memory dumps from PS3 running Ubuntu as shown here.
The following details about the challenge creation process are provided for future reference.
After meeting on the PS3 HOME network, nssal offers jhuisi an annual subscription to a live Mardi Gras picture and video library in exchange for a recipe collection based primarily on snake oil and other natural ingredients.
J and N then decide to chat outside HOME on the PS3, exchange login credentials and samples, and arrange to reboot their PS3s into Linux.
©2001-2016 DFRWS | dfrws [at] dfrws [dot] org
DFRWS is a US 501(c)(3) non-profit organization.