%0 Conference Proceedings %T Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus %+ Carnegie Mellon University [Pittsburgh] (CMU) %+ Naval Postgraduate School (NPS) %+ United States Military Academy [West Point] (USMA) %A Zarate, Carolina %A Garfinkel, Simson %A Heffernan, Aubin %A Horras, Scott %A Gorak, Kyle %Z Part 2: Forensic Techniques %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 10th IFIP International Conference on Digital Forensics (DF) %C Vienna, Austria %Y Gilbert Peterson %Y Sujeet Shenoi %I Springer %3 Advances in Digital Forensics X %V AICT-433 %P 117-132 %8 2014-01-08 %D 2014 %R 10.1007/978-3-662-44952-3_9 %K XOR %K obfuscation %K steganography %K bulk_extractor %Z Computer Science [cs]Conference papers %X The only digital forensic tools known to provide an automated approach for evaluating XOR obfuscated data are DCCI_Carver and DC3_Carver, two general-purpose carving tools developed by the Defense Cyber Crime Center (DC3). In order to determine the use of XOR as an obfuscation technique and the need to adapt additional tools, we analyzed 2,411 drive images from devices acquired from countries around the world. Using a modified version of the open source tool bulk_extractor, evidence of XOR obfuscation was found on 698 drive images, with a maximum of 21,031 XOR-obfuscated features on a single drive. XOR usage in the corpus was observed in files with timestamps between the years 1995 and 2009, with the majority of the usage found in unallocated space. XOR obfuscation was used in the corpus to circumvent malware detection and reverse engineering, to hide information that was apparently being exfiltrated, and by malware detection tools for their quarantine directories and to distribute malware signatures. The results indicate that XOR obfuscation is important to consider when performing malware investigations. However, since the corpus does not contain data sets that are known to have been used by malicious entities, it is difficult to draw conclusions regarding the importance of extracting and examining XOR obfuscated files in criminal, counterintelligence and counterterrorism cases without further research. %G English %Z TC 11 %Z WG 11.9 %2 https://inria.hal.science/hal-01393766/document %2 https://inria.hal.science/hal-01393766/file/978-3-662-44952-3_9_Chapter.pdf %L hal-01393766 %U https://inria.hal.science/hal-01393766 %~ IFIP-LNCS %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-DF %~ IFIP-WG11-9 %~ IFIP-AICT-433