A review of "Bringing Order to Approximate Matching: Classification and Attacks on Similarity Digest Algorithms"

  • Fuzzy hashing or similarity hashing (a.k.a. bytewise approximate matching) converts digital artifacts into an inter- mediate representation to allow for efficient (fast) identification of similar objects, e.g., for deny-listing. Over the past decade, new algorithms have been developed and released to the digital forensics community. When releasing algorithms (e.g., as part of a scientific article), they are frequently compared with other algorithms to outline the benefits and sometimes also the weaknesses of the proposed approach. However, given the wide variety of algorithms and approaches, it is impossible to provide direct comparisons with all existing algorithms. In this paper, we present the first classification of approximate matching algo- rithms which allows for an easier description and comparisons. Therefore, we first reviewed existing literature to understand the techniques various algorithms use and to familiarize ourselves with the common terminology. Our findings allowed us toFuzzy hashing or similarity hashing (a.k.a. bytewise approximate matching) converts digital artifacts into an inter- mediate representation to allow for efficient (fast) identification of similar objects, e.g., for deny-listing. Over the past decade, new algorithms have been developed and released to the digital forensics community. When releasing algorithms (e.g., as part of a scientific article), they are frequently compared with other algorithms to outline the benefits and sometimes also the weaknesses of the proposed approach. However, given the wide variety of algorithms and approaches, it is impossible to provide direct comparisons with all existing algorithms. In this paper, we present the first classification of approximate matching algo- rithms which allows for an easier description and comparisons. Therefore, we first reviewed existing literature to understand the techniques various algorithms use and to familiarize ourselves with the common terminology. Our findings allowed us to develop a categorization relying heavily on the terminology proposed by NIST SP 800-168. In addition to the categorization, this paper presents an abstract set of attacks against algorithms and why they are feasible. Lastly, we detail the characteristics needed to build robust algorithms to prevent attacks. We believe that this paper helps newcomers, practitioners, and experts alike to better compare algorithms, understand their potential, as well as characteristics and implications they may have on forensic investigations.show moreshow less

Download full text files

Export metadata

Statistics

Number of document requests

Additional Services

Share in Twitter Search Google Scholar
Metadaten
Author:Miguel Martín-Pérez, Ricardo J. Rodríguez, Frank BreitingerORCiDGND
URN:urn:nbn:de:bvb:384-opus4-1175627
Frontdoor URLhttps://opus.bibliothek.uni-augsburg.de/opus4/117562
ISBN:9788490444634OPAC
ISSN:2697-049XOPAC
Parent Title (Spanish):Investigación en ciberseguridad: actas de las VI Jornadas Nacionales (JNIC2021 LIVE), online 9-10 de junio de 2021, Universidad de Castilla-La Mancha
Publisher:Ediciones de la Universidad de Castilla-La Mancha
Place of publication:Cuenca
Editor:Manuel A. Serrano, Eduardo Fernández-Medina, Cristina Alcaraz, Noemí de Castro, Guillermo Calvo
Type:Conference Proceeding
Language:English
Year of first Publication:2021
Publishing Institution:Universität Augsburg
Release Date:2024/12/16
First Page:131
Last Page:132
Series:Colección Jornadas y Congresos ; 34
DOI:https://doi.org/10.18239/jornadas_2021.34.29
Institutes:Fakultät für Angewandte Informatik
Fakultät für Angewandte Informatik / Institut für Informatik
Fakultät für Angewandte Informatik / Institut für Informatik / Lehrstuhl für Cybersicherheit
Dewey Decimal Classification:0 Informatik, Informationswissenschaft, allgemeine Werke / 00 Informatik, Wissen, Systeme / 004 Datenverarbeitung; Informatik
Licence (German):CC-BY 4.0: Creative Commons: Namensnennung