
Home Hub as a potential goldmine for digital foren-
sics, with its centralised data collection. In addition,
Lee et al. (Lee et al., 2020) proposed a blockchain-
based Smart Home gateway architecture that ensures
data integrity and availability, in prevention of data
forgery. James (James, 2019) developed an intrusion
prevention system that can detect and protect against
cyber-attacks in Smart Home ecosystems. Anthi et
al. (Anthi et al., 2019) introduced a supervised in-
trusion detection system specifically for Smart Home
IoT devices, which can effectively distinguish be-
tween benign and malicious network activity. More-
over, Forfot and Østby (Forfot and Østby, 2021) sug-
gested a risk assessment model for Digital Forensic
Readiness in IoT.
2.2 Anti-Digital Forensics
Various studies have investigated Anti-Digital Foren-
sics techniques employed by cyber-criminals to hide
their activities, but a comprehensive analysis of the
various existing Anti-Forensics techniques is often
lacking. The discussion surrounding Anti-Forensics
(AF) has had a more pronounced impact within law
enforcement circles than in the scientific commu-
nity (Conlan et al., 2016). Harris (Harris, 2006) de-
fined Anti-Forensics as: “methods used to prevent (or
act against) the application of science [...] enforced
by police agencies.”.
Literature abounds in numerous definitions of
Anti-Digital Forensics, but one of the more widely
known and accepted comes from Rogers: “Attempts
to negatively affect the existence, amount and/or qual-
ity of evidence from a crime scene or make the anal-
ysis and examination of evidence difficult or impos-
sible to conduct.” (Rogers, 2005). Rogers also pro-
posed a widely adopted taxonomy for the categorisa-
tion of ADF techniques: data hiding, artefact wiping,
trail obfuscation and attacks against the forensic pro-
cess and tools. Figure 2 depicts Rogers’ taxonomy
and provides an example for each category: steganog-
raphy represents a method for data hiding, physical
destruction is an extreme practice for artefact wiping,
data forgery is a common method for trailing obfus-
cation, and reverse engineering of forensic tools al-
lows spotting weaknesses and/or vulnerabilities that
can lead to hinder the tool effectiveness.
In an Anti-Digital Forensics domain the primary
objective is to break the forensic process, thereby
such practices can be summarised as the dichotomous
counterpart to the “Forensic Readiness” (FR) prin-
ciple, coined by Tan (Sachowski, 2016). Forensic
Readiness was standardised within the Digital Foren-
sic Investigation Readiness Process (DFIRP) model in
ISO/IEC 27043:2015 standard. A trending approach
to FR, proposed by Rahman et al. (Ab Rahman et al.,
2016) and conceptually similar to Security-by-design,
is Forensic-by-Design (FbD), which aims to integrate
forensic requirements into every relevant phase of a
system design and development stages, ultimately to
obtain “Forensic-ready” systems by continuously re-
viewing the desired state of forensic readiness.
Alenezi et al. (Alenezi. et al., 2019) advanced
a review of challenges and future directions in IoT
Forensics, with the inclusion of Anti-Digital Foren-
sics as one of the major challenges. Furthermore,
Jean-Paul et al. (Yaacoub et al., 2022) discussed the
rise of the Anti-Anti-Forensic protection mechanism
against Anti-Forensics activities specifically in IoT
systems.
3 MOTIVATION
As Section 2.1 outlined, there has been some atten-
tion directed towards Smart Home Forensics. How-
ever, a noticeable disparity arises when consider-
ing the scarcity of studies dedicated to Anti-Digital
Forensics, especially in relation with Smart Home
ecosystems, thereby indicating a discernible gap in
the scientific community and among law enforce-
ment and forensics experts. A critical lack in the
current research landscape is given by the absence
of guidelines or standardised frameworks that incor-
porate the steps of Anti-Digital Forensics in Smart
Home scenarios. In fact, while the traditional Cyber
Kill Chain framework (Lockheed, ND), developed by
Lockheed Martin, is widely used to understand the
stages of cyber-attacks and respond effectively, it is
not specifically designed for IoT devices, thus fail-
ing to address the unique challenges and intricacies
associated with Smart Home ecosystems. The same
argument holds for the MITRE duality kill chains
ATT&CK (MITRE, NDa) and D3FEND (MITRE,
NDb). Moreover, the PEnetration Testing the Inter-
net of Things (PETIoT) (Bella et al., 2023) frame-
work advances a kill chain for IoT devices, but it fo-
cuses on cybersecurity aspects, rather than forensics.
Hence, the general motivation for this paper to raise
the problem and initiate research on the topic.
4 AN IDEAL KILL CHAIN
The term kill chain is a military concept which iden-
tifies the structure of an attack. It typically consists
of: identification of target, dispatching of (military)
forces to target, initiation of attack on target, destruc-
Conceptualising an Anti-Digital Forensics Kill Chain for Smart Homes
833