Skip to main content
Log in

Testing closed source software: computer forensic tool case study

  • Original Paper
  • Published:
Journal of Computer Virology and Hacking Techniques Aims and scope Submit manuscript

Abstract

Computer forensic techniques are important for the prevention, detection, and investigation of electronic crime. Computer forensic investigators need computer forensic tools to produce reliable results that meet legal requirements and are acceptable in the courts. Most of these tools are closed-source, making the software a black-box for testing purposes. This paper illustrates a different black box testing method for experimenting computer forensic tools based on functional scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Abran, A., Desharnais, J.-M., Olingy, S., St-Pierre, D., Synmons, C.: COSMIC FFP - Manuel de Mesures. Retrieved from http://estudijas.lu.lv/pluginfile.php/258973/mod_resource/content/1/COSMIC%20Method%20v3.0.1%20Measurement%20Manual.pdf (2009)

  2. Abran, A., Ormandieva, O., Talib, M.: Functional Size and Information Theory-Based Functional Complexity Measures: Exploratory study of related concepts using COSMIC-FFP measurement method as a case study. In: 14th International Workshop of Software Measurement (IWSM-MetriKon 2004) (pp. 457–471). Konigs Wusterhausen: Shaker-Verlag (2004)

  3. Abu Talib, M.: Towards early software reliability prediction for computer forensic tools (case study). SpringerPlus 5(1), 1–12 (2016)

    Article  Google Scholar 

  4. Abu Talib, M., Ormandjieva, O., Abran, A., Buglione, L., Khelfi, A.: Scenario-based Black Box Testing in COSMIC-FFP: a case study. Softw. Qual. Prof. 8(3), 22–33 (2006)

    Google Scholar 

  5. Abu Talib, M.: Exploratory Study on an Innovation Use of COSMIC-FFP for Early Quality Assessment. Ph.D. Thesis, Concordia University, Montreal, Canada (2007)

  6. Abu Talib, M., Mendes, E., Khelifi, A.: Towards reliable web applications: ISO 19761. In: IECON 2012 - 38th Annual Conference on IEEE Industrial Electronics Society (2012)

  7. Asthana, S., Tripathi, S., Singh, S.K.: A novel approach to generate test cases using class and sequence diagrams. In: International Conference on Contemporary Computing (pp. 155–167). Springer, Berlin (2010)

  8. Ayers, D.: A second generation computer forensic analysis system. J. Digit. Invest. 6, 34–42 (2009)

    Article  Google Scholar 

  9. Bai, X., Peng, L., Li, H.: An approach to generate the thin-threads from the UML diagrams. In: Proceedings of the 28th Annual International Computer Software and Applications Conference. 1, pp. 546–552. Washington: IEEE Computer Society (2004)

  10. Bai, X., Tsai, W., Paul, R., Feng, K., Yu, L.: Scenario-based modeling and its applications. In: Proceedings of the Seventh International Workshop on Object-Oriented Real-Time Dependable Systems, 2002. (WORDS 2002)., (pp. 253–260). San Diego (2002)

  11. Beckett, J., Slay, J.: Digital forensics: validation and verification in a dynamic work environment. In: Proceedings of the 40th Hawaii International Conference on System Sciences (2007)

  12. Beizer, B.: Software Testing Techniques, 2nd edn. Van Nostrand Reinhold, New York (1990)

    MATH  Google Scholar 

  13. Bertolino, A.: Knowledge Area Description of Software Testing Guide to the SWEBOK. Retrieved December 25, 2015, from http://www.swebok.org (2004)

  14. Briand, L., Labiche, Y.: A UML-based approach to system testing. Softw. Syst. Model. 1(1), 10–42 (2002)

    Article  MATH  Google Scholar 

  15. Carrier, B.: “Digital forensics tool testing images,” http://dftt.sourceforge.net/ (2015). Accessed 28 Dec 2015

  16. Chow, T.: Testing software design modeled by finite-state machines. IEEE Trans. Softw. Eng. SE–4(3), 178–187 (1978)

    Article  MATH  Google Scholar 

  17. En-Nouaary, A., Dssouli, R., Khendek, F.: Timed Wp-method: testing real-time systems. IEEE Trans. Softw. Eng. 28(11), 1023–1038 (2002)

    Article  Google Scholar 

  18. Flandrin, F., Buchanan, W., Macfarlane, R., Ramsay, B., Smales, A.: Evaluating Digital Forensic Tools (DFTs), School of Computing, Edinburgh Napier University, Edinburgh (2012)

  19. Fraikin, F., Leonhardt, T.: SeDiTeC-testing based on sequence diagrams. In: Automated Software Engineering, 2002. Proceedings. ASE 2002. 17th IEEE International Conference on (pp. 261–266) (2002)

  20. Forensic Toolkit Imager User Guide. Retrieved December 25, 2015, from Access Data: http://accessdata.com/product-download/digital-forensics/ftk-imager-version-3.2.0 (2012)

  21. Garfinkel, S.: Digital forensics research: the next 10 years. Digit. Invest. 7, S64–S73 (2010)

    Article  Google Scholar 

  22. General Testing Methodology. Retrieved December 25, 2015, from NIST CFTT: http://www.cftt.nist.gov/TestMethodology7.doc (2007)

  23. Guo, Y., Beckett, J., Slay, J.: Validation and verification of computer forensic software tools-Searching Function. In: Digital Forensic Research Workshop. Published by Elsevier Ltd (2009)

  24. Kanellis, P., et al.: Digital Crime And Forensic Science in Cyberspace. ISBN-13: 978-1591408727 ISBN-10: 1591408725 (2006)

  25. ISO/IEC 17025:2005. Retrieved December 25, 2015, from International Organization for Standardization: http://www.iso.org/iso/catalogue_detail.htm?csnumber=39883 (2005)

  26. ISO/IEC 19761. Retrieved December 25, 2015, from International Organization for Standardization: http://www.iso.org/iso/catalogue_detail.htm?csnumber=33899 (2003)

  27. Lyle, J.R., White, D.R., Ayers, R.P.: “Digital forensics at the national institute of standards and technology,” National Institute of Standards and Technology, Interagency Report (NISTIR), http://www.cftt.nist.gov/NISTIR_7490.pdf (2008)

  28. Meyers, M., Rogers, M.: Computer forensics: the need for standardization and certification. Int. J. Digit. Evid. 3(2), 1 (2004)

    Google Scholar 

  29. Marchetti, E., Schilders, L., Winfield, S.: Scenario-Based testing applied in two real contexts: Healthcare and Employability. In: IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), 2011 (pp. 89–98) (2011)

  30. National Academy of Sciences, Strengthening Forensic Science in the United States: A Path Forward. http://www.nap.edu/catalog/12589.html (2009)

  31. NIST.: “General test methodology for computer forensic tools,” National Institute of Standards and Technology, Tech. Rep. Version 1.9. Retrieved December 25, 2015, from www.cftt.nist.gov/Test%20Methodology%207.doc (2001)

  32. NIST.: “Digital data acquisition tool test assertions and test plan,” National Institute of Standards and Technology, Draft 1. Retrieved December 25, 2015, from http://www.cftt.nist.gov/DA-ATP-pc-01.pdf (2005)

  33. NIST.: “Computer forensics tool testing program: Project overview,” Retrieved December 25, 2015, from http://www.cftt.nist.gov/ (2015)

  34. Pan, L., Batten, L.: A lower bound on effective performance testing for digital forensic tools. In: Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (pp. 117–130). Washington: IEEE Computer Society (2007)

  35. Panthi, V., Mohapatra, D.P.: Automatic test case generation using sequence diagram. In: Proceedings of International Conference on Advances in Computing (pp. 277–284). Springer India (2013)

  36. Sarma, M., Kundu, D., Mall, R.: “Automatic test case generation from UML sequence diagram.” In: International Conference on Advanced Computing and Communications, 2007. ADCOM 2007. IEEE, (2007)

  37. Zheng, M., Alagar, V., Ormandjieva, O.: Automated generation of test suites from formal specifications of real-time reactive systems. J. Syst. Softw. 81(2), 286–304 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manar Abu Talib.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Talib, M.A. Testing closed source software: computer forensic tool case study. J Comput Virol Hack Tech 14, 167–179 (2018). https://doi.org/10.1007/s11416-017-0302-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11416-017-0302-x

Keywords

Navigation