Cyber Forensic and Reverse Engineering Techniques for Digital Signature Integrity Verification
Abstract
The integrity and authenticity of digital signatures are fundamental in securing digital transactions and communications. As a cryptographic mechanism, digital signatures ensure identity verification, data integrity, and non-repudiation. However, the increasing sophistication of tampering techniques, including signature spoofing, certificate forgery, and man-in-the-middle attacks, necessitates advanced forensic methodologies for detection and mitigation. This study presents an integrated approach utilizing cyber forensic analysis and reverse engineering techniques to enhance the verification of digital signature integrity. A multi-layered verification framework is proposed, incorporating forensic audit trails, cryptographic anomaly detection, and reverse engineering-based signature validation. By examining digital artifacts, hashing inconsistencies, and cryptographic vulnerabilities, the methodology strengthens the detection of unauthorized modifications. Experimental evaluations demonstrate the framework’s effectiveness in identifying forged and altered digital signatures across diverse cybersecurity scenarios. Findings emphasize the critical role of forensic methodologies in strengthening cyber defense mechanisms, particularly in sectors requiring high-assurance security, such as e-government, financial institutions, and blockchain-based smart contracts. The results highlight the necessity for continuous advancements in forensic tools and reverse engineering techniques to counter evolving cyber threats. The growing reliance on secure digital communications underscores the need for enhanced forensic-based verification frameworks. This research contributes to cybersecurity by providing a robust forensic approach for ensuring the reliability and authenticity of digital signatures in modern cyber ecosystems.
Keywords
Full Text:
PDFReferences
Shi, C., Chen, L., Wang, C., Zhou, X., & Qin, Z. (2023). Review of image forensic techniques based on deep learning. Mathematics, 11(14), 3134. https://doi.org/10.3390/math11143134
Zhang, Y., & Wang, S. (2021). A survey of digital signature schemes for communication networks. IEEE Communications Surveys & Tutorials, 23(1), 1-19. https://doi.org/10.1109/COMST.2020.3039820
Li, J., Huang, Y., & Guo, Y. (2020). A survey on digital forensics in Internet of Things. IEEE Internet of Things Journal, 7(1), 1-15. https://doi.org/10.1109/JIOT.2019.2949789
Wang, W., & Farid, H. (2020). Exposing digital forgeries in video by detecting duplication. Proceedings of the National Academy of Sciences, 117(30), 17664-17670. https://doi.org/10.1073/pnas.2016118117
Khan, S., Rahman, S. M. M., & Madani, S. A. (2020). Digital image forgery detection using deep learning techniques: A survey. IEEE Access, 8, 156965-156987. https://doi.org/10.1109/ACCESS.2020.3019460
Zhou, P., Han, X., Morariu, V. I., & Davis, L. S. (2020). Learning rich features for image manipulation detection. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 1053-1061. https://doi.org/10.1109/CVPR42600.2020.00112
Verdoliva, L. (2020). Media forensics and deepfakes: An overview. IEEE Journal of Selected Topics in Signal Processing, 14(5), 910-932. https://doi.org/10.1109/JSTSP.2020.3002101
Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., & Ortega-Garcia, J. (2020). Deepfakes and beyond: A survey of face manipulation and fake detection. Information Fusion, 64, 131-148. https://doi.org/10.1016/j.inffus.2020.06.014
Barni, M., & Tondi, B. (2020). Adversarial multimedia forensics: Overview and challenges ahead. Proceedings of the IEEE, 108(1), 378-396. https://doi.org/10.1109/JPROC.2019.2937274
Cozzolino, D., & Verdoliva, L. (2020). Noiseprint: A CNN-based camera model fingerprint. IEEE Transactions on Information Forensics and Security, 15, 144-159. https://doi.org/10.1109/TIFS.2019.2916364
Bondi, L., Baroffio, G., Güera, D., Bestagini, P., Delp, E. J., & Tubaro, S. (2020). Tampering detection and localization through clustering of camera-based CNN features. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 1855-1864. https://doi.org/10.1109/CVPRW.2020.00234
Yang, X., Li, Y., & Lyu, S. (2020). Exposing deep fakes using inconsistent head poses. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 8261-8265. https://doi.org/10.1109/ICASSP40776.2020.9053567
Marra, F., Gragnaniello, D., Cozzolino, D., & Verdoliva, L. (2020). Detection of GAN-generated fake images over social networks. Proceedings of the IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), 384-389. https://doi.org/10.1109/MIPR49039.2020.00080
Wang, S. Y., Wang, O., Zhang, R., Owens, A., & Efros, A. A. (2020). CNN-generated images are surprisingly easy to spot... for now. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 8695-8704. https://doi.org/10.1109/CVPR42600.2020.00872
Gragnaniello, D., Cozzolino, D., Poggi, G., & Verdoliva, L. (2020). Are GAN generated images easy to detect? A critical analysis of the state-of-the-art. IEEE International Conference on Multimedia and Expo (ICME), 1-6. https://doi.org/10.1109/ICME46284.2020.9102814
DOI: http://dx.doi.org/10.52155/ijpsat.v49.1.6976
Refbacks
- There are currently no refbacks.
Copyright (c) 2025 Lisdi Inu Kencana

This work is licensed under a Creative Commons Attribution 4.0 International License.


















