Cyber Forensic and Reverse Engineering Techniques for Digital Signature Integrity Verification

Lisdi Inu Kencana, H.A Danang Rimbawa, Bisyron Wahyudi

Abstract


The integrity and authenticity of digital signatures are fundamental in securing digital transactions and communications. As a cryptographic mechanism, digital signatures ensure identity verification, data integrity, and non-repudiation. However, the increasing sophistication of tampering techniques, including signature spoofing, certificate forgery, and man-in-the-middle attacks, necessitates advanced forensic methodologies for detection and mitigation. This study presents an integrated approach utilizing cyber forensic analysis and reverse engineering techniques to enhance the verification of digital signature integrity. A multi-layered verification framework is proposed, incorporating forensic audit trails, cryptographic anomaly detection, and reverse engineering-based signature validation. By examining digital artifacts, hashing inconsistencies, and cryptographic vulnerabilities, the methodology strengthens the detection of unauthorized modifications. Experimental evaluations demonstrate the framework’s effectiveness in identifying forged and altered digital signatures across diverse cybersecurity scenarios. Findings emphasize the critical role of forensic methodologies in strengthening cyber defense mechanisms, particularly in sectors requiring high-assurance security, such as e-government, financial institutions, and blockchain-based smart contracts. The results highlight the necessity for continuous advancements in forensic tools and reverse engineering techniques to counter evolving cyber threats. The growing reliance on secure digital communications underscores the need for enhanced forensic-based verification frameworks. This research contributes to cybersecurity by providing a robust forensic approach for ensuring the reliability and authenticity of digital signatures in modern cyber ecosystems.


Keywords


Cyber Forensics, Reverse Engineering, Digital Signature, Tampering Detection, Cryptographic Integrity, Cybersecurity

Full Text:

PDF

References


Shi, C., Chen, L., Wang, C., Zhou, X., & Qin, Z. (2023). Review of image forensic techniques based on deep learning. Mathematics, 11(14), 3134. https://doi.org/10.3390/math11143134

Zhang, Y., & Wang, S. (2021). A survey of digital signature schemes for communication networks. IEEE Communications Surveys & Tutorials, 23(1), 1-19. https://doi.org/10.1109/COMST.2020.3039820

Li, J., Huang, Y., & Guo, Y. (2020). A survey on digital forensics in Internet of Things. IEEE Internet of Things Journal, 7(1), 1-15. https://doi.org/10.1109/JIOT.2019.2949789

Wang, W., & Farid, H. (2020). Exposing digital forgeries in video by detecting duplication. Proceedings of the National Academy of Sciences, 117(30), 17664-17670. https://doi.org/10.1073/pnas.2016118117

Khan, S., Rahman, S. M. M., & Madani, S. A. (2020). Digital image forgery detection using deep learning techniques: A survey. IEEE Access, 8, 156965-156987. https://doi.org/10.1109/ACCESS.2020.3019460

Zhou, P., Han, X., Morariu, V. I., & Davis, L. S. (2020). Learning rich features for image manipulation detection. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 1053-1061. https://doi.org/10.1109/CVPR42600.2020.00112

Verdoliva, L. (2020). Media forensics and deepfakes: An overview. IEEE Journal of Selected Topics in Signal Processing, 14(5), 910-932. https://doi.org/10.1109/JSTSP.2020.3002101

Tolosana, R., Vera-Rodriguez, R., Fierrez, J., Morales, A., & Ortega-Garcia, J. (2020). Deepfakes and beyond: A survey of face manipulation and fake detection. Information Fusion, 64, 131-148. https://doi.org/10.1016/j.inffus.2020.06.014

Barni, M., & Tondi, B. (2020). Adversarial multimedia forensics: Overview and challenges ahead. Proceedings of the IEEE, 108(1), 378-396. https://doi.org/10.1109/JPROC.2019.2937274

Cozzolino, D., & Verdoliva, L. (2020). Noiseprint: A CNN-based camera model fingerprint. IEEE Transactions on Information Forensics and Security, 15, 144-159. https://doi.org/10.1109/TIFS.2019.2916364

Bondi, L., Baroffio, G., Güera, D., Bestagini, P., Delp, E. J., & Tubaro, S. (2020). Tampering detection and localization through clustering of camera-based CNN features. Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 1855-1864. https://doi.org/10.1109/CVPRW.2020.00234

Yang, X., Li, Y., & Lyu, S. (2020). Exposing deep fakes using inconsistent head poses. IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 8261-8265. https://doi.org/10.1109/ICASSP40776.2020.9053567

Marra, F., Gragnaniello, D., Cozzolino, D., & Verdoliva, L. (2020). Detection of GAN-generated fake images over social networks. Proceedings of the IEEE Conference on Multimedia Information Processing and Retrieval (MIPR), 384-389. https://doi.org/10.1109/MIPR49039.2020.00080

Wang, S. Y., Wang, O., Zhang, R., Owens, A., & Efros, A. A. (2020). CNN-generated images are surprisingly easy to spot... for now. IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 8695-8704. https://doi.org/10.1109/CVPR42600.2020.00872

Gragnaniello, D., Cozzolino, D., Poggi, G., & Verdoliva, L. (2020). Are GAN generated images easy to detect? A critical analysis of the state-of-the-art. IEEE International Conference on Multimedia and Expo (ICME), 1-6. https://doi.org/10.1109/ICME46284.2020.9102814




DOI: http://dx.doi.org/10.52155/ijpsat.v49.1.6976

Refbacks

  • There are currently no refbacks.


Copyright (c) 2025 Lisdi Inu Kencana

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.