Analisis Forensik Digital Memori Volatile untuk Mendapatkan Kunci Enkripsi Aplikasi Dm-Crypt

Saved in:
Bibliographic Details
Title: Analisis Forensik Digital Memori Volatile untuk Mendapatkan Kunci Enkripsi Aplikasi Dm-Crypt
Authors: Firdaus, Vipkas Al Hadid, Suprianto, Dodit, Agustina, Rini
Source: Jurnal Sistem Komputer dan Informatika (JSON); Vol 2, No 3 (2021): Mei 2021; 283-288 ; 2685-998X ; 10.30865/json.v2i3
Publisher Information: Universitas Budi Darma
Publication Year: 2021
Subject Terms: Computer Forensic, Disk Encryption, Digital Forensic, Dm-Crypt, Live Forensic Acquisition
Description: Disk encryption technology is something very useful in securing data. On the other hand, disk encryption can be used by criminals to hide the digital evidence. The information in the disk will be very useful for the investigation, but if the disk on the computer evidence encrypted then it will hamper the investigation process. The conditions will certainly be a challenge for investigator cybercrime to be able to find the disk encryption key, especially if the perpetrator did not cooperate in the investigation process. The analysis of the image memory to get the encryption key will be helpful in the investigation. In the overall memory activity on the computer evidence will be recorded, using a live image memory dump on the computer evidence, the decryption keys can be recovered. This paper will discuss about forensic analysis to getting the disk encryption key on the dm-crypt is used to encrypt the disk on Linux operating system and prove that through forensic image memory on a live memory dump, key dm-crypt disk encryption can be found with a success percentage of 80%. On this paper the research will be focused on the Linux operating system with dm-crypt function to full disk encryption.
Document Type: article in journal/newspaper
File Description: application/pdf
Language: English
Relation: https://ejurnal.stmik-budidarma.ac.id/JSON/article/view/2998/2070
DOI: 10.30865/json.v2i3.2998
Availability: https://ejurnal.stmik-budidarma.ac.id/JSON/article/view/2998
https://doi.org/10.30865/json.v2i3.2998
Rights: Copyright (c) 2021 Vipkas Al Hadid Firdaus, Dodit Suprianto, Rini Agustina ; http://creativecommons.org/licenses/by/4.0
Accession Number: edsbas.B4AD4843
Database: BASE
FullText Text:
  Availability: 0
CustomLinks:
  – Url: https://ejurnal.stmik-budidarma.ac.id/JSON/article/view/2998#
    Name: EDS - BASE (s4221598)
    Category: fullText
    Text: View record from BASE
  – Url: https://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=EBSCO&SrcAuth=EBSCO&DestApp=WOS&ServiceName=TransferToWoS&DestLinkType=GeneralSearchSummary&Func=Links&author=Firdaus%20VAH
    Name: ISI
    Category: fullText
    Text: Nájsť tento článok vo Web of Science
    Icon: https://imagesrvr.epnet.com/ls/20docs.gif
    MouseOverText: Nájsť tento článok vo Web of Science
Header DbId: edsbas
DbLabel: BASE
An: edsbas.B4AD4843
RelevancyScore: 919
AccessLevel: 3
PubType: Academic Journal
PubTypeId: academicJournal
PreciseRelevancyScore: 918.9462890625
IllustrationInfo
Items – Name: Title
  Label: Title
  Group: Ti
  Data: Analisis Forensik Digital Memori Volatile untuk Mendapatkan Kunci Enkripsi Aplikasi Dm-Crypt
– Name: Author
  Label: Authors
  Group: Au
  Data: <searchLink fieldCode="AR" term="%22Firdaus%2C+Vipkas+Al+Hadid%22">Firdaus, Vipkas Al Hadid</searchLink><br /><searchLink fieldCode="AR" term="%22Suprianto%2C+Dodit%22">Suprianto, Dodit</searchLink><br /><searchLink fieldCode="AR" term="%22Agustina%2C+Rini%22">Agustina, Rini</searchLink>
– Name: TitleSource
  Label: Source
  Group: Src
  Data: Jurnal Sistem Komputer dan Informatika (JSON); Vol 2, No 3 (2021): Mei 2021; 283-288 ; 2685-998X ; 10.30865/json.v2i3
– Name: Publisher
  Label: Publisher Information
  Group: PubInfo
  Data: Universitas Budi Darma
– Name: DatePubCY
  Label: Publication Year
  Group: Date
  Data: 2021
– Name: Subject
  Label: Subject Terms
  Group: Su
  Data: <searchLink fieldCode="DE" term="%22Computer+Forensic%22">Computer Forensic</searchLink><br /><searchLink fieldCode="DE" term="%22Disk+Encryption%22">Disk Encryption</searchLink><br /><searchLink fieldCode="DE" term="%22Digital+Forensic%22">Digital Forensic</searchLink><br /><searchLink fieldCode="DE" term="%22Dm-Crypt%22">Dm-Crypt</searchLink><br /><searchLink fieldCode="DE" term="%22Live+Forensic+Acquisition%22">Live Forensic Acquisition</searchLink>
– Name: Abstract
  Label: Description
  Group: Ab
  Data: Disk encryption technology is something very useful in securing data. On the other hand, disk encryption can be used by criminals to hide the digital evidence. The information in the disk will be very useful for the investigation, but if the disk on the computer evidence encrypted then it will hamper the investigation process. The conditions will certainly be a challenge for investigator cybercrime to be able to find the disk encryption key, especially if the perpetrator did not cooperate in the investigation process. The analysis of the image memory to get the encryption key will be helpful in the investigation. In the overall memory activity on the computer evidence will be recorded, using a live image memory dump on the computer evidence, the decryption keys can be recovered. This paper will discuss about forensic analysis to getting the disk encryption key on the dm-crypt is used to encrypt the disk on Linux operating system and prove that through forensic image memory on a live memory dump, key dm-crypt disk encryption can be found with a success percentage of 80%. On this paper the research will be focused on the Linux operating system with dm-crypt function to full disk encryption.
– Name: TypeDocument
  Label: Document Type
  Group: TypDoc
  Data: article in journal/newspaper
– Name: Format
  Label: File Description
  Group: SrcInfo
  Data: application/pdf
– Name: Language
  Label: Language
  Group: Lang
  Data: English
– Name: NoteTitleSource
  Label: Relation
  Group: SrcInfo
  Data: https://ejurnal.stmik-budidarma.ac.id/JSON/article/view/2998/2070
– Name: DOI
  Label: DOI
  Group: ID
  Data: 10.30865/json.v2i3.2998
– Name: URL
  Label: Availability
  Group: URL
  Data: https://ejurnal.stmik-budidarma.ac.id/JSON/article/view/2998<br />https://doi.org/10.30865/json.v2i3.2998
– Name: Copyright
  Label: Rights
  Group: Cpyrght
  Data: Copyright (c) 2021 Vipkas Al Hadid Firdaus, Dodit Suprianto, Rini Agustina ; http://creativecommons.org/licenses/by/4.0
– Name: AN
  Label: Accession Number
  Group: ID
  Data: edsbas.B4AD4843
PLink https://erproxy.cvtisr.sk/sfx/access?url=https://search.ebscohost.com/login.aspx?direct=true&site=eds-live&db=edsbas&AN=edsbas.B4AD4843
RecordInfo BibRecord:
  BibEntity:
    Identifiers:
      – Type: doi
        Value: 10.30865/json.v2i3.2998
    Languages:
      – Text: English
    Subjects:
      – SubjectFull: Computer Forensic
        Type: general
      – SubjectFull: Disk Encryption
        Type: general
      – SubjectFull: Digital Forensic
        Type: general
      – SubjectFull: Dm-Crypt
        Type: general
      – SubjectFull: Live Forensic Acquisition
        Type: general
    Titles:
      – TitleFull: Analisis Forensik Digital Memori Volatile untuk Mendapatkan Kunci Enkripsi Aplikasi Dm-Crypt
        Type: main
  BibRelationships:
    HasContributorRelationships:
      – PersonEntity:
          Name:
            NameFull: Firdaus, Vipkas Al Hadid
      – PersonEntity:
          Name:
            NameFull: Suprianto, Dodit
      – PersonEntity:
          Name:
            NameFull: Agustina, Rini
    IsPartOfRelationships:
      – BibEntity:
          Dates:
            – D: 01
              M: 01
              Type: published
              Y: 2021
          Identifiers:
            – Type: issn-locals
              Value: edsbas
            – Type: issn-locals
              Value: edsbas.oa
          Titles:
            – TitleFull: Jurnal Sistem Komputer dan Informatika (JSON); Vol 2, No 3 (2021): Mei 2021; 283-288 ; 2685-998X ; 10.30865/json.v2i3
              Type: main
ResultId 1