Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim
Lawal, Damola, Gresty, David, Gan, Diane ORCID: https://orcid.org/0000-0002-0920-7572 and Hewitt, Louise (2022) Facilitating a cyber-enabled fraud using the O.MG cable to incriminate the victim. International Journal of Computer and Systems Engineering (International Scholarly and Scientific Research & Innovation), 16 (9). pp. 367-372. ISSN 2313-3759 (Print), 2769-3457 (Online)
Preview |
PDF (Publisher VoR)
43047_LAWAL_Facilitating_a_cyber_enabled_fraud_using_the_omg_cable_to_incriminate_the_victim.pdf - Published Version Available under License Creative Commons Attribution. Download (245kB) | Preview |
Abstract
This paper investigates the feasibility of using a programmable USB such as the O.MG Cable to perform a file tampering attack. Here, the O.MG Cable, an apparently harmless mobile device charger is used in an unauthorised way, to alter the content of a file (an accounts record-January_Contributions.xlsx). The aim is to determine if a forensics analyst can reliably determine who has altered the target file; the O.MG Cable or the user of the machine. This work highlights some of the traces of the O.MG Cable left behind on the target computer itself such as the Product ID (PID) and Vendor ID (ID). Also discussed is the O.MG Cable’s behaviour during the experiments. We determine if a forensics analyst could identify if any evidence has been left behind by the programmable device on the target file once it has been removed from the computer to establish if the analyst would be able to link the traces left by the O.MG Cable to the file tampering. It was discovered that the forensic analyst might mistake the actions of the O.MG Cable for the computer users. Experiments carried out in this work could further the discussion as to whether an innocent user could be punished for the unauthorised changes made by a programmable device.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | O.MG Cable; programmable USB; file tampering attack; digital evidence credibility; miscarriage of justice; cyber fraud |
Subjects: | K Law > K Law (General) Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software |
Faculty / School / Research Centre / Research Group: | Faculty of Engineering & Science Faculty of Engineering & Science > Internet of Things and Security Research Centre (ISEC) Faculty of Engineering & Science > School of Computing & Mathematical Sciences (CMS) Faculty of Liberal Arts & Sciences Faculty of Liberal Arts & Sciences > School of Law & Criminology (LAC) |
Last Modified: | 26 Jun 2023 10:43 |
URI: | http://gala.gre.ac.uk/id/eprint/43047 |
Actions (login required)
View Item |
Downloads
Downloads per month over past year