top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Digital Forensics IX : 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics IX : 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XX, 398 p. 92 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computers and civilization
Information technology - Management
Cryptography
Data encryption (Computer science)
Computer networks
Data and Information Security
Computers and Society
Computer Application in Administrative Data Processing
Cryptology
Computer Communication Networks
ISBN 3-642-41148-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto History, Historiography and the Hermeneutics of the Hard -- Protecting Third Party Privacy in Digital Forensic Investigations -- On the Scientific Maturity of Digital Forensics Research -- Cognitive Approaches for Digital Forensic Readiness Planning -- A Harmonized Process Model for Digital Forensic Investigation Readiness -- Evaluation of the Semi-Automated Crime-Specific Digital Triage Process Model -- Reducing the Time Required for Hashing Operations -- Hash-Based File Content Identification Using Distributed Systems -- Creating Super Timelines in Windows Investigations -- Using a Goal-Driven Approach in the Investigation of a Questioned Contract -- File Fragment Analysis Using Normalized Compression Distance -- Quantifying Windows File Slack Size and Stability -- Automating Video File Carving and Content Identification -- Data Recovery from Proprietary-Formatted CCTV Hard Disks -- Creating Integrated Evidence Graphs for Network Forensics -- A Generic Bayesian Belief Model for Similar Cyber Crimes -- An Empirical Study Profiling Internet Pirates -- Real-Time Covert Timing Channel Detection in Networked Virtual Environments -- Impact of Cloud Computing on Digital Forensic Investigations -- Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments -- Comparison of the Data Recovery Function of Forensic Tools -- Security Analysis and Decryption of FileVault 2 -- Detecting Counterfeit Currency and Identifying its Source -- Towards Active Linguistic Authentication.
Record Nr. UNINA-9910437591203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics X : 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics X : 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XX, 335 p. 67 illus.)
Disciplina 364.168
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computers and civilization
Electronic commerce
Information technology - Management
Cryptography
Data encryption (Computer science)
Data and Information Security
Computers and Society
e-Commerce and e-Business
Computer Application in Administrative Data Processing
Cryptology
ISBN 3-662-44952-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Conditional Weighted Transaction Aggregation for Credit Card Fraud Detection -- Using Fraud Trees to Analyze Internet Credit Card Fraud -- Automated Analysis of Underground Marketplaces -- An Exploratory Profiling Study of Online Auction Fraudsters -- Web User Profiling Based on Browsing Behavior Analysis -- Validation Rules for Enhanced Foxy P2P Network Investigations -- Windows Event Forensic Process -- Schema Reconstruction in Database Forensics -- Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus -- Similarity Hashing Based on Levenshtein Distance -- Using Approximate Matching to Reduce the Volume of Digital Data -- Active Linguistic Authentication Using Real-Time Stylometric Evaluation for Multi-Modal Decision Fusion -- Breaking the Closed-World Assumption in Stylometric Authorship Attribution -- Preserving Dates and Timestamps for Incident Handling in Android Smartphones -- An Open Source Toolkit for iOS Filesystem Forensics -- Smartphones as Distributed Witnesses for Digital Forensics -- Smartphone Message Sentiment Analysis -- Forensic Analysis of the TomTom Navigation Application -- Performance of a Logical Five-Phase, Multithreaded, Bootable Triage Tool -- Towards Fully Automated Digital Alibis with Social Interactions -- Data Corpora for Digital Forensics Education and Research -- Educating the Next Generation of Cyberforensic Professionals.
Record Nr. UNINA-9910298995803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XI : 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XI : 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XVIII, 357 p. 74 illus. in color.)
Disciplina 363.25968
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computers and civilization
Electronic commerce
Information technology - Management
Cryptography
Data encryption (Computer science)
Data and Information Security
Computers and Society
e-Commerce and e-Business
Computer Application in Administrative Data Processing
Cryptology
ISBN 3-319-24123-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Contributing Authors -- Preface -- THEMES AND ISSUES -- A TALE OF TWO TRACES - DIPLOMATICS AND FORENSICS -- 1. Introduction -- 1.1 Causality as a Foundation of Science -- 1.2 Diplomatics -- 1.3 Archival Science and Public Records -- 1.4 Digital Records -- 1.5 Digital Diplomatics -- 1.6 Forensic Science -- 1.7 Digital Forensics -- 2. Digital Diplomatics and Forensics -- 2.1 Case 1 Background -- 2.2 Case 2 Background -- 2.3 Admitting the Documents -- 2.4 Related Information on Records -- 3. Case Resolution -- 3.1 Case 1 -- 3.2 Case 2 -- 4. Implications and the Path Forward -- 4.1 Implications -- 4.2 The Path Forward -- 5. Conclusions -- References -- NOTIONS OF HYPOTHESIS IN DIGITAL FORENSICS -- 1. Motivation -- 2. Related Work -- 3. Carrier's Work -- 3.1 History Duration -- 3.2 Primitive Storage System Configuration -- 3.3 Primitive Event System Configuration -- 3.4 Primitive State and Event Definition -- 3.5 Complex Storage System Configuration -- 3.6 Complex Event System Configuration -- 3.7 Complex State and Event Definition -- 4. Bunge's Classification -- 5. Limitations of the Study -- 6. Conclusions -- References -- USING YIN'S APPROACH TO CASE STUDIES AS A PARADIGM FOR CONDUCTING EXAMINATIONS -- 1. Introduction -- 2. Understanding a Case -- 2.1 What is a Case? -- 2.2 Case Study Design -- 2.3 Case Study Design -- 3. Digital Forensic Case Studies -- 3.1 Case Study 1 -- 3.2 Case Study 2 -- 3.3 Case Study 3 -- 4. Analytic Generalizations -- 5. Assessing Case Study Quality -- 6. Conclusions -- References -- AN INFORMATION EXTRACTION FRAMEWORK FOR DIGITAL FORENSIC INVESTIGATIONS -- 1. Introduction -- 2. Related Work -- 3. Information Extraction Framework -- 3.1 Named Entity Recognition -- 3.2 Relation Extraction -- 4. Experiments and Analysis -- 4.1 Dataset Description -- 4.2 Data Pre-Processing -- 4.3 Experimental Results.
5. Conclusions -- References -- INTERNET CRIME INVESTIGATIONS -- A GRAPH-BASED INVESTIGATION OF BITCOIN TRANSACTIONS -- 1. Introduction -- 2. Bitcoin System Overview -- 3. Transaction Data Collection -- 4. Graph-Based Bitcoin Transaction Analysis -- 4.1 Address Clustering -- 4.2 Address Graph Observations -- 4.3 Currency Flow Analysis -- 4.4 Mt. Gox Case Study -- 5. Discussion -- 6. Conclusions -- References -- PROFILING AND TRACKING ACYBERLOCKER LINK SHARERIN A PUBLIC WEB FORUM -- 1. Introduction -- 2. Related Work -- 3. Methodology -- 3.1 Data Collection -- 3.2 User Profile Construction -- 3.3 Multidimensional Scaling Analysis -- 3.4 Cluster Analysis -- 4. Experiments -- 4.1 Datasets -- 4.2 Evaluation Metric -- 4.3 Analysis of Sharers -- 4.4 Analysis of Sharers and Followers -- 5. Conclusions -- References -- A PRIVACY-PRESERVING ENCRYPTIONSCHEME FOR AN INTERNET REALNAMEREGISTRATION SYSTEM -- 1. Introduction -- 2. Background -- 2.1 Privacy -- 2.2 Real-Name Registration in South Korea -- 2.3 Real-Name Registration in China -- 3. Real-Name Registration Requirements -- 4. Real-Name Registration Overview -- 5. Privacy-Preserving Real-Name Registration -- 5.1 User Real-Name Registration Process -- 5.2 User Web-Name Registration Process -- 5.3 Privacy-Preserving Properties -- 6. Conclusions -- References -- A LOGIC-BASED NETWORK FORENSICMODEL FOR EVIDENCE ANALYSIS -- 1. Introduction -- 2. Background and Related Work -- 2.1 MulVAL and Logical Attack Graphs -- 2.2 Evidence Graphs -- 2.3 Related Work -- 3. Network Example -- 4. Attack Scenario Reconstruction -- 4.1 Rules and Facts -- 4.2 Evidence Graph Generation -- 5. Extending MulVAL -- 5.1 Using an Anti-Forensic Database -- 5.2 Integrating Evidence Standards -- 6. Experimental Results -- 7. Conclusions -- References -- FORENSIC TECHNIQUES -- CHARACTERISTICS OF MALICIOUSDLLS IN WINDOWS MEMORY.
1. Introduction -- 2. Motivation -- 3. Related Work -- 4. Test Data Generation -- 5. Data Classification -- 6. Injected DLL Characteristics -- 7. Threats to Validity -- 8. Conclusions -- References -- DETERMINING TRIGGERINVOLVEMENT DURING FORENSICATTRIBUTION IN DATABASES -- 1. Introduction -- 2. Background -- 2.1 Forensic Attribution -- 2.2 Triggers -- 3. Trigger Identification -- 4. Algorithm Implementation -- 5. Implementation Challenges -- 5.1 Scope and Visibility -- 5.2 Encryption -- 5.3 Case Sensitivity -- 5.4 False Positive Errors -- 5.5 Data Types -- 5.6 Recursion -- 5.7 Performance -- 6. Conclusions -- References -- USING INTERNAL MySQL/InnoDBB-TREE INDEX NAVIGATION FORDATA HIDING -- 1. Introduction -- 2. Background and Related Work -- 3. InnoDB Index -- 4. Data Removal -- 4.1 Physical Deletion of Data Records -- 4.2 Forensic Impact -- 5. Data Hiding -- 5.1 Manipulating Search Results -- 5.2 Reorganizing the Index -- 5.3 Hiding Data in Index Page Garbage Space -- 5.4 Hiding Data in Index Page Free Space -- 5.5 Removing a Page from the Index -- 6. Conclusions -- References -- IDENTIFYING PASSWORDSSTORED ON DISK -- 1. Introduction -- 2. Related Work -- 3. Background -- 3.1 Probabilistic Context-Free Grammars -- 4. Examining a Disk -- 4.1 Recovering Files from a Disk -- 4.2 Retrieving Tokens from Files -- 4.3 Initial Filtering -- 4.4 Specialized Alpha String Filtering -- 5. Identifying Passwords -- 5.1 Calculating Token Probabilities -- 5.2 Ranking Algorithms -- 6. Experimental Evaluation -- 6.1 Experimental Setup -- 6.2 Initial Filtering -- 6.3 Ranking Algorithms -- 6.4 Specialized Filtering -- 7. Conclusions -- References -- FRAGMENTED JPEG FILE RECOVERYUSING PSEUDO HEADERS -- 1. Introduction -- 2. Related Work -- 3. JPEG Background -- 3.1 Essential Configurations in JPEG Headers -- 3.2 Synchronization Point.
4. JPEG File Recovery Methodology -- 4.1 Huffman Table and Sub-Sampling Factor -- 4.2 Image Resolution -- 4.3 Quantization Table -- 5. Experimental Results -- 6. Conclusions -- References -- MOBILE DEVICEFORENSICS -- FORENSIC-READY SECURE iOS APPSFOR JAILBROKEN iPHONES -- 1. Introduction -- 2. Related Work -- 3. Implementation Methodology -- 3.1 Securing Apps -- 3.2 Preserving Dates and Timestamps -- 3.3 Static Library -- 3.4 Dynamic Library -- 4. Preventing Attacks and Anti-Forensics -- 4.1 Using the Static Library -- 4.2 Using the Dynamic Library -- 5. Experimental Results -- 6. Case Study -- 7. Conclusions -- References -- A FRAMEWORK FOR DESCRIBINGMULTIMEDIA CIRCULATION INA SMARTPHONE ECOSYSTEM -- 1. Introduction -- 2. Related Work -- 3. Using Graph Databases -- 4. Use Case Experiments -- 5. Results -- 6. System Design -- 7. Conclusions -- References -- CLOUD FORENSICS -- A TRUSTWORTHY CLOUDFORENSICS ENVIRONMENT -- 1. Introduction -- 2. Related Work -- 3. Desired Properties -- 4. Challenges -- 5. FECloud Architecture -- 5.1 Logger (Themis) -- 5.2 Data Possession Manager (Metis) -- 5.3 Timestamp Manager (Chronos) -- 5.4 Provenance Manager (Clio) -- 5.5 Proof Publisher (Brizo) -- 5.6 Evidence Access Interface (Horizon) -- 5.7 Forensics-Enabled Image -- 5.8 Preliminary Results -- 6. Conclusions -- References -- LOCATING AND TRACKING DIGITALOBJECTS IN THE CLOUD -- 1. Introduction -- 2. Background -- 2.1 Cloud Computing -- 2.2 Digital Forensics -- 2.3 Data Provenance -- 3. Related Work -- 3.1 Storing Provenance Data -- 3.2 Data Provenance Requirements -- 4. Cloud-Based Provenance Model -- 5. Using a Central Logging Server -- 5.1 File Wrapper -- 5.2 Tracking Wrapper Locations -- 6. Discussion -- 7. Conclusions -- References -- FORENSIC TOOLS -- A TOOL FOR EXTRACTING STATIC ANDVOLATILE FORENSIC ARTIFACTS OFWINDOWS 8.x APPS -- 1. Introduction.
2. Related Work -- 2.1 Windows 8 Forensics -- 2.2 Forensic Analysis of Apps -- 3. Background -- 3.1 Hibernation File -- 3.2 Swap File -- 3.3 Static vs. Volatile Artifacts -- 4. Experimental Methodology -- 5. Experimental Results -- 5.1 Facebook -- 5.2 Other Apps -- 5.3 Performance -- 6. Conclusions -- References -- CRITERIA FOR VALIDATINGSECURE WIPING TOOLS -- 1. Introduction -- 2. Deletion Effects and Deletion Types -- 2.1 Deletion Effects -- 2.2 Deletion Types -- 3. File Deletion Artifacts -- 3.1 MFT Records (Recycle Bin Deletion) -- 3.2 LogFile (Recycle Bin Deletion) -- 3.3 Hard Disk (Recycle Bin Deletion) -- 3.4 MFT Records (Permanent File Deletion) -- 3.5 LogFile (Permanent File Deletion) -- 3.6 Hard Disk (Permanent File Deletion) -- 4. Validation Criteria -- 4.1 Specifications -- 4.2 Test Assertions -- 4.3 Test Cases (SW-TC) -- 4.4 Relational Summary Table -- 5. Validation Testing of Eraser -- 6. Conclusions -- References -- DO DATA LOSS PREVENTIONSYSTEMS REALLY WORK? -- 1. Introduction -- 2. Related Work -- 3. Evaluated Systems -- 3.1 Agent-Based Solution -- 3.2 Agentless Solution -- 3.3 Hybrid Solution -- 3.4 File System Scanning Tool -- 4. Experimental Setup -- 5. Experimental Results -- 6. Discussion -- 7. Conclusions -- References.
Record Nr. UNINA-9910299205603321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XII : 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XII : 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XVIII, 396 p. 99 illus.)
Disciplina 363.25
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computers and civilization
Electronic commerce
Information technology - Management
Cryptography
Data encryption (Computer science)
Data and Information Security
Computers and Society
e-Commerce and e-Business
Computer Application in Administrative Data Processing
Cryptology
ISBN 3-319-46279-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910254985803321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XIII : 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XIII : 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVIII, 303 p. 98 illus.)
Disciplina 004
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Information technology - Management
Computers and civilization
Cryptography
Data encryption (Computer science)
Data and Information Security
Computer Application in Administrative Data Processing
Computers and Society
Cryptology
ISBN 3-319-67208-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- 1 ESTABLISHING FINDINGS IN DIGITAL FORENSIC EXAMINATIONS: A CASE STUDY METHOD -- 1. Introduction -- 2. Causality and Digital Systems -- 3. Using Yin's Method -- 3.1 Body of Knowledge -- 3.2 Hypotheses Formulation -- 3.3 Hypotheses Testing -- 4. Causal Relationships in Digital Forensics -- 4.1 Understanding Causal Relationships -- 4.2 Establishing Causal Relationships -- 5. Lottery Terminal Hacking Incident -- 5.1 The Case -- 5.2 The Investigation -- 5.3 The Examination -- 5.4 Hypotheses Formulation -- 5.5 Hypothesis Testing -- 6. Conclusions -- References -- 2 A MODEL FOR DIGITAL EVIDENCE ADMISSIBILITY ASSESSMENT -- 1. Introduction -- 2. Background -- 2.1 Digital Forensics and Digital Evidence -- 2.2 Harmonization and Standardization -- 3. Requirements for Assessing Admissibility -- 3.1 Harmonization of Requirements -- 3.2 Technical Requirements and Assessment -- 3.3 Legal Requirements and Assessment -- 4. Model for Assessing Evidence Admissibility -- 4.1 Phase 1: Evidence Assessment Phase -- 4.2 Phase 2: Evidence Consideration Phase -- 4.3 Phase 3: Evidence Determination Phase -- 5. Application in Legal Proceedings -- 6. Conclusions -- References -- II MOBILE AND EMBEDDED DEVICE FORENSICS -- 3 EVALUATING THE AUTHENTICITY OF SMARTPHONE EVIDENCE -- 1. Introduction -- 2. Related Research -- 3. Reference Architecture -- 3.1 Architectural Designs of Applications -- 3.2 Reference Architecture Components -- 3.3 Modeling Application Behavior -- 3.4 Exploring an Android Application -- 4. Theories of Normality -- 5. Discussion -- 6. Conclusions -- References -- 4 FORENSIC EVALUATION OF AN AMAZON FIRE TV STICK -- 1. Introduction -- 2. Related Work -- 2.1 Chromecast -- 2.2 Measy A2W Miracast -- 2.3 Amazon Kindle Fire HD -- 3. Proposed Forensic Methodology.
3.1 Experimental Methodology -- 3.2 Sample Data -- 4. Forensic Assessment -- 4.1 ADB Extraction Test -- 4.2 UFED Touch Test -- 4.3 Python Script Test -- 4.4 Rooting Test -- 4.5 ADB Extraction Test -- 4.6 Manual Acquisition Test -- 5. Recommended Forensic Analysis Method -- 6. Conclusions -- References -- 5 DETECTING ANOMALOUS PROGRAMMABLE LOGIC CONTROLLER EVENTS USING MACHINE LEARNING -- 1. Introduction -- 2. Programmable Logic Controllers -- 3. Forensic Challenges -- 4. Machine Learning -- 5. Related Work -- 6. Experimental Setup and Methodology -- 6.1 Experimental Setup -- 6.2 Classifying Anomalous Operations -- 7. Experimental Results and Discussion -- 8. Conclusions -- References -- III NETWORK AND CLOUD FORENSICS -- 6 A FORENSIC METHODOLOGY FOR SOFTWARE-DEFINED NETWORK SWITCHES -- 1. Introduction -- 2. Background -- 3. Related Work -- 4. Proposed Forensic Methodology -- 5. Experimental Evaluation -- 5.1 Experimental Setup -- 5.2 Attack Scenario -- 5.3 Memory Analysis -- 5.4 Southbound Traffic Analysis -- 5.5 Service-Level Event Logging -- 5.6 Discussion -- 6. Conclusions -- Acknowledgement -- References -- 7 IDENTIFYING EVIDENCE FOR CLOUD FORENSIC ANALYSIS -- 1. Introduction -- 2. Background and Related Work -- 3. Attack Reconstruction -- 4. Reconstructing Attack Scenarios -- 4.1 Experimental Setup -- 4.2 Experimental Attacks -- 4.3 Collecting Evidence for Reconstruction -- 5. Using System Calls for Evidence Analysis -- 6. Conclusions -- References -- IV THREAT DETECTION AND MITIGATION -- 8 DIGITAL FORENSIC IMPLICATIONS OF COLLUSION ATTACKS ON THE LIGHTNING NETWORK -- 1. Introduction -- 2. Related Work -- 3. Bitcoin Blockchain -- 4. Lightning Network -- 4.1 Payment Routing -- 4.2 Lightning Network Topology -- 5. Collusion Attack on the Lightning Network -- 6. Collusion Attack Implications -- 6.1 Fraud -- 6.2 Money Laundering -- 6.3 Forfeiture.
7. Attack Mitigation -- 8. Conclusions -- References -- 9 INSIDER THREAT DETECTION USING TIME-SERIES-BASED RAW DISK FORENSIC ANALYSIS -- 1. Introduction -- 2. Methodology -- 2.1 Sample Data -- 2.2 Data Driven Algorithm Development -- 2.3 Time-Series-Based Anomaly Detection -- 3. Experimental Results -- 3.1 Unpaired t-Test/Split Window Method -- 3.2 Unpaired t-Test/Sliding Window Method -- 3.3 Autoregressive Method -- 3.4 Ground Truth Analysis -- 4. Conclusions -- Acknowledgement -- References -- 10 ANTI-FORENSIC THREAT MODELING -- 1. Introduction -- 2. Threats to the Digital Forensic Process -- 2.1 Evidence Destruction -- 2.2 Evidence Hiding -- 2.3 Evidence Source Elimination -- 2.4 Evidence Counterfeiting -- 3. Threat Modeling Applied to Digital Forensics -- 3.1 Case Understanding -- 3.2 Evidence Source Identification -- 3.3 Threat Identification -- 3.4 Risk Management -- 3.5 Result Reporting and Model Updating -- 4. Applying the Threat Model -- 5. Conclusions -- References -- V MALWARE FORENSICS -- 11 A BEHAVIOR-BASED APPROACH FOR MALWARE DETECTION -- 1. Introduction -- 2. Related Work -- 2.1 Static Analysis -- 2.2 Dynamic Analysis -- 3. Windows Handles and Objects -- 4. Malware Detection Using Handles -- 4.1 Experimental Setup -- 4.2 Vectorizing the Handle Data -- 4.3 Model Training -- 5. Results and Analysis -- 6. Conclusions -- References -- 12 CATEGORIZING MOBILE DEVICE MALWARE BASED ON SYSTEM SIDE-EFFECTS -- 1. Introduction -- 2. Live Memory Analysis of Mobile Devices -- 2.1 Information in Volatile Memory -- 2.2 Memory Capture Techniques -- 3. Android Exploitation Techniques -- 3.1 Heap Exploitation -- 3.2 Defeating ASL Randomization -- 4. Stagefright Exploits -- 4.1 Zimperium zLabs -- 4.2 Google Project Zero -- 4.3 NorthBit -- 5. Categorizing Malware by Behavior -- 5.1 Malware Categories -- 5.2 Benefits of Malware Categorization.
5.3 Detecting Malware Side-Effects -- 6. Conclusions -- References -- VI IMAGE FORENSICS -- 13 SEMANTIC VIDEO CARVING USING PERCEPTUAL HASHING AND OPTICAL FLOW -- 1. Introduction -- 2. Related Work -- 3. Proposed Video Carving Approach -- 3.1 Perceptual Grouping -- 3.2 Precise Stitching -- 4. Experimental Results -- 5. Conclusions -- Acknowledgements -- References -- 14 DETECTING FRAUDULENT BANK CHECKS -- 1. Introduction -- 2. Related Work -- 3. Experimental Setup -- 4. Fraud Detection Methodology Overview -- 5. Details of the Fraud Detection Methodology -- 5.1 Check Pantographs -- 5.2 Check Microlines -- 5.3 Check Alterations -- 5.4 Printed vs. Handwritten Signatures -- 6. Experimental Results -- 6.1 Check Pantograph Results -- 6.2 Check Microline Results -- 6.3 Check Alteration Results -- 6.4 Printed vs. Handwritten Signature Results -- 6.5 Results for Checks from Multiple Banks -- 7. Integrated Check Fraud Detection Tool -- 8. Conclusions -- References -- VII FORENSIC TECHNIQUES -- 15 AUTOMATED COLLECTION AND CORRELATION OF FILE PROVENANCE INFORMATION -- 1. Introduction -- 2. Related Work -- 2.1 File Provenance Maintenance Systems -- 2.2 Sources of Provenance Data -- 2.3 Evidence Correlation -- 3. Provenance Collection -- 3.1 Data Gathering -- 3.2 Data Processing -- 4. Experimental Results -- 5. Conclusions -- References -- 16 USING PERSONAL INFORMATION IN TARGETED GRAMMAR-BASED PROBABILISTIC PASSWORD ATTACKS -- 1. Introduction -- 2. Background and Related Work -- 3. Building a Targeted Attack -- 3.1 Merging Context-Free Grammars -- 3.2 Integrating Personal Information -- 3.3 Using Old Password Information -- 3.4 Predicting New Passwords -- 3.5 Merging Grammars and Generating Guesses -- 4. Experiments -- 4.1 Password Survey -- 4.2 Testing and Cracking Results -- 5. Conclusions -- References.
Record Nr. UNINA-9910254836703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XIV : 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XIV : 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XVIII, 367 p. 98 illus.)
Disciplina 363.25968
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computer networks
Computers and civilization
Computers - Law and legislation
Information technology - Law and legislation
Data structures (Computer science)
Information theory
Data and Information Security
Computer Communication Networks
Computers and Society
Legal Aspects of Computing
Data Structures and Information Theory
ISBN 3-319-99277-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910299163103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XIX [[electronic resource] ] : 19th IFIP WG 11.9 International Conference, ICDF 2023, Arlington, Virginia, USA, January 30-31, 2023, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XIX [[electronic resource] ] : 19th IFIP WG 11.9 International Conference, ICDF 2023, Arlington, Virginia, USA, January 30-31, 2023, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Autore Peterson Gilbert
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (268 pages)
Disciplina 005.8
Altri autori (Persone) ShenoiSujeet
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computer engineering
Computer networks
Computers
Data and Information Security
Computer Engineering and Networks
Computing Milieux
ISBN 3-031-42991-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mobile Device Forensics -- Forensic Data Collection -- Image and Video Forensics -- Novel Applications -- Legal Issues and Applications.
Record Nr. UNISA-996558568503316
Peterson Gilbert  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XIX : 19th IFIP WG 11.9 International Conference, ICDF 2023, Arlington, Virginia, USA, January 30-31, 2023, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XIX : 19th IFIP WG 11.9 International Conference, ICDF 2023, Arlington, Virginia, USA, January 30-31, 2023, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Autore Peterson Gilbert
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (268 pages)
Disciplina 005.8
Altri autori (Persone) ShenoiSujeet
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computer engineering
Computer networks
Computers
Data and Information Security
Computer Engineering and Networks
Computing Milieux
ISBN 3-031-42991-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mobile Device Forensics -- Forensic Data Collection -- Image and Video Forensics -- Novel Applications -- Legal Issues and Applications.
Record Nr. UNINA-9910754087703321
Peterson Gilbert  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Digital Forensics XV : 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Advances in Digital Forensics XV : 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XVIII, 272 p. 1 illus.)
Disciplina 005.8
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Data protection
Computer crimes
Computers - Law and legislation
Information technology - Law and legislation
Robotics
Computer vision
Data and Information Security
Computer Crime
Legal Aspects of Computing
Computer Vision
ISBN 3-030-28752-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910349290003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in digital forensics XVI : 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, revised selected papers / / Gilbert Peterson, Sujeet Shenoi (editors)
Advances in digital forensics XVI : 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, revised selected papers / / Gilbert Peterson, Sujeet Shenoi (editors)
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XVIII, 308 p. 48 illus.)
Disciplina 004
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer science
ISBN 3-030-56223-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465358603316
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui