Advances in Digital Forensics IX : 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
| Advances in Digital Forensics IX : 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
| Edizione | [1st ed. 2013.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
| Descrizione fisica | 1 online resource (XX, 398 p. 92 illus.) |
| Disciplina | 005.8 |
| Collana | IFIP Advances in Information and Communication Technology |
| Soggetto topico |
Data protection
Computers and civilization Information technology - Management Cryptography Data encryption (Computer science) Computer networks Data and Information Security Computers and Society Computer Application in Administrative Data Processing Cryptology Computer Communication Networks |
| ISBN | 3-642-41148-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | History, Historiography and the Hermeneutics of the Hard -- Protecting Third Party Privacy in Digital Forensic Investigations -- On the Scientific Maturity of Digital Forensics Research -- Cognitive Approaches for Digital Forensic Readiness Planning -- A Harmonized Process Model for Digital Forensic Investigation Readiness -- Evaluation of the Semi-Automated Crime-Specific Digital Triage Process Model -- Reducing the Time Required for Hashing Operations -- Hash-Based File Content Identification Using Distributed Systems -- Creating Super Timelines in Windows Investigations -- Using a Goal-Driven Approach in the Investigation of a Questioned Contract -- File Fragment Analysis Using Normalized Compression Distance -- Quantifying Windows File Slack Size and Stability -- Automating Video File Carving and Content Identification -- Data Recovery from Proprietary-Formatted CCTV Hard Disks -- Creating Integrated Evidence Graphs for Network Forensics -- A Generic Bayesian Belief Model for Similar Cyber Crimes -- An Empirical Study Profiling Internet Pirates -- Real-Time Covert Timing Channel Detection in Networked Virtual Environments -- Impact of Cloud Computing on Digital Forensic Investigations -- Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments -- Comparison of the Data Recovery Function of Forensic Tools -- Security Analysis and Decryption of FileVault 2 -- Detecting Counterfeit Currency and Identifying its Source -- Towards Active Linguistic Authentication. |
| Record Nr. | UNINA-9910437591203321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Digital Forensics X : 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
| Advances in Digital Forensics X : 10th IFIP WG 11.9 International Conference, Vienna, Austria, January 8-10, 2014, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
| Edizione | [1st ed. 2014.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 |
| Descrizione fisica | 1 online resource (XX, 335 p. 67 illus.) |
| Disciplina | 364.168 |
| Collana | IFIP Advances in Information and Communication Technology |
| Soggetto topico |
Data protection
Computers and civilization Electronic commerce Information technology - Management Cryptography Data encryption (Computer science) Data and Information Security Computers and Society e-Commerce and e-Business Computer Application in Administrative Data Processing Cryptology |
| ISBN | 3-662-44952-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Conditional Weighted Transaction Aggregation for Credit Card Fraud Detection -- Using Fraud Trees to Analyze Internet Credit Card Fraud -- Automated Analysis of Underground Marketplaces -- An Exploratory Profiling Study of Online Auction Fraudsters -- Web User Profiling Based on Browsing Behavior Analysis -- Validation Rules for Enhanced Foxy P2P Network Investigations -- Windows Event Forensic Process -- Schema Reconstruction in Database Forensics -- Analysis of the Use of XOR as an Obfuscation Technique in a Real Data Corpus -- Similarity Hashing Based on Levenshtein Distance -- Using Approximate Matching to Reduce the Volume of Digital Data -- Active Linguistic Authentication Using Real-Time Stylometric Evaluation for Multi-Modal Decision Fusion -- Breaking the Closed-World Assumption in Stylometric Authorship Attribution -- Preserving Dates and Timestamps for Incident Handling in Android Smartphones -- An Open Source Toolkit for iOS Filesystem Forensics -- Smartphones as Distributed Witnesses for Digital Forensics -- Smartphone Message Sentiment Analysis -- Forensic Analysis of the TomTom Navigation Application -- Performance of a Logical Five-Phase, Multithreaded, Bootable Triage Tool -- Towards Fully Automated Digital Alibis with Social Interactions -- Data Corpora for Digital Forensics Education and Research -- Educating the Next Generation of Cyberforensic Professionals. |
| Record Nr. | UNINA-9910298995803321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Digital Forensics XI : 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
| Advances in Digital Forensics XI : 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
| Edizione | [1st ed. 2015.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
| Descrizione fisica | 1 online resource (XVIII, 357 p. 74 illus. in color.) |
| Disciplina | 363.25968 |
| Collana | IFIP Advances in Information and Communication Technology |
| Soggetto topico |
Data protection
Computers and civilization Electronic commerce Information technology - Management Cryptography Data encryption (Computer science) Data and Information Security Computers and Society e-Commerce and e-Business Computer Application in Administrative Data Processing Cryptology |
| ISBN | 3-319-24123-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Contents -- Contributing Authors -- Preface -- THEMES AND ISSUES -- A TALE OF TWO TRACES - DIPLOMATICS AND FORENSICS -- 1. Introduction -- 1.1 Causality as a Foundation of Science -- 1.2 Diplomatics -- 1.3 Archival Science and Public Records -- 1.4 Digital Records -- 1.5 Digital Diplomatics -- 1.6 Forensic Science -- 1.7 Digital Forensics -- 2. Digital Diplomatics and Forensics -- 2.1 Case 1 Background -- 2.2 Case 2 Background -- 2.3 Admitting the Documents -- 2.4 Related Information on Records -- 3. Case Resolution -- 3.1 Case 1 -- 3.2 Case 2 -- 4. Implications and the Path Forward -- 4.1 Implications -- 4.2 The Path Forward -- 5. Conclusions -- References -- NOTIONS OF HYPOTHESIS IN DIGITAL FORENSICS -- 1. Motivation -- 2. Related Work -- 3. Carrier's Work -- 3.1 History Duration -- 3.2 Primitive Storage System Configuration -- 3.3 Primitive Event System Configuration -- 3.4 Primitive State and Event Definition -- 3.5 Complex Storage System Configuration -- 3.6 Complex Event System Configuration -- 3.7 Complex State and Event Definition -- 4. Bunge's Classification -- 5. Limitations of the Study -- 6. Conclusions -- References -- USING YIN'S APPROACH TO CASE STUDIES AS A PARADIGM FOR CONDUCTING EXAMINATIONS -- 1. Introduction -- 2. Understanding a Case -- 2.1 What is a Case? -- 2.2 Case Study Design -- 2.3 Case Study Design -- 3. Digital Forensic Case Studies -- 3.1 Case Study 1 -- 3.2 Case Study 2 -- 3.3 Case Study 3 -- 4. Analytic Generalizations -- 5. Assessing Case Study Quality -- 6. Conclusions -- References -- AN INFORMATION EXTRACTION FRAMEWORK FOR DIGITAL FORENSIC INVESTIGATIONS -- 1. Introduction -- 2. Related Work -- 3. Information Extraction Framework -- 3.1 Named Entity Recognition -- 3.2 Relation Extraction -- 4. Experiments and Analysis -- 4.1 Dataset Description -- 4.2 Data Pre-Processing -- 4.3 Experimental Results.
5. Conclusions -- References -- INTERNET CRIME INVESTIGATIONS -- A GRAPH-BASED INVESTIGATION OF BITCOIN TRANSACTIONS -- 1. Introduction -- 2. Bitcoin System Overview -- 3. Transaction Data Collection -- 4. Graph-Based Bitcoin Transaction Analysis -- 4.1 Address Clustering -- 4.2 Address Graph Observations -- 4.3 Currency Flow Analysis -- 4.4 Mt. Gox Case Study -- 5. Discussion -- 6. Conclusions -- References -- PROFILING AND TRACKING ACYBERLOCKER LINK SHARERIN A PUBLIC WEB FORUM -- 1. Introduction -- 2. Related Work -- 3. Methodology -- 3.1 Data Collection -- 3.2 User Profile Construction -- 3.3 Multidimensional Scaling Analysis -- 3.4 Cluster Analysis -- 4. Experiments -- 4.1 Datasets -- 4.2 Evaluation Metric -- 4.3 Analysis of Sharers -- 4.4 Analysis of Sharers and Followers -- 5. Conclusions -- References -- A PRIVACY-PRESERVING ENCRYPTIONSCHEME FOR AN INTERNET REALNAMEREGISTRATION SYSTEM -- 1. Introduction -- 2. Background -- 2.1 Privacy -- 2.2 Real-Name Registration in South Korea -- 2.3 Real-Name Registration in China -- 3. Real-Name Registration Requirements -- 4. Real-Name Registration Overview -- 5. Privacy-Preserving Real-Name Registration -- 5.1 User Real-Name Registration Process -- 5.2 User Web-Name Registration Process -- 5.3 Privacy-Preserving Properties -- 6. Conclusions -- References -- A LOGIC-BASED NETWORK FORENSICMODEL FOR EVIDENCE ANALYSIS -- 1. Introduction -- 2. Background and Related Work -- 2.1 MulVAL and Logical Attack Graphs -- 2.2 Evidence Graphs -- 2.3 Related Work -- 3. Network Example -- 4. Attack Scenario Reconstruction -- 4.1 Rules and Facts -- 4.2 Evidence Graph Generation -- 5. Extending MulVAL -- 5.1 Using an Anti-Forensic Database -- 5.2 Integrating Evidence Standards -- 6. Experimental Results -- 7. Conclusions -- References -- FORENSIC TECHNIQUES -- CHARACTERISTICS OF MALICIOUSDLLS IN WINDOWS MEMORY. 1. Introduction -- 2. Motivation -- 3. Related Work -- 4. Test Data Generation -- 5. Data Classification -- 6. Injected DLL Characteristics -- 7. Threats to Validity -- 8. Conclusions -- References -- DETERMINING TRIGGERINVOLVEMENT DURING FORENSICATTRIBUTION IN DATABASES -- 1. Introduction -- 2. Background -- 2.1 Forensic Attribution -- 2.2 Triggers -- 3. Trigger Identification -- 4. Algorithm Implementation -- 5. Implementation Challenges -- 5.1 Scope and Visibility -- 5.2 Encryption -- 5.3 Case Sensitivity -- 5.4 False Positive Errors -- 5.5 Data Types -- 5.6 Recursion -- 5.7 Performance -- 6. Conclusions -- References -- USING INTERNAL MySQL/InnoDBB-TREE INDEX NAVIGATION FORDATA HIDING -- 1. Introduction -- 2. Background and Related Work -- 3. InnoDB Index -- 4. Data Removal -- 4.1 Physical Deletion of Data Records -- 4.2 Forensic Impact -- 5. Data Hiding -- 5.1 Manipulating Search Results -- 5.2 Reorganizing the Index -- 5.3 Hiding Data in Index Page Garbage Space -- 5.4 Hiding Data in Index Page Free Space -- 5.5 Removing a Page from the Index -- 6. Conclusions -- References -- IDENTIFYING PASSWORDSSTORED ON DISK -- 1. Introduction -- 2. Related Work -- 3. Background -- 3.1 Probabilistic Context-Free Grammars -- 4. Examining a Disk -- 4.1 Recovering Files from a Disk -- 4.2 Retrieving Tokens from Files -- 4.3 Initial Filtering -- 4.4 Specialized Alpha String Filtering -- 5. Identifying Passwords -- 5.1 Calculating Token Probabilities -- 5.2 Ranking Algorithms -- 6. Experimental Evaluation -- 6.1 Experimental Setup -- 6.2 Initial Filtering -- 6.3 Ranking Algorithms -- 6.4 Specialized Filtering -- 7. Conclusions -- References -- FRAGMENTED JPEG FILE RECOVERYUSING PSEUDO HEADERS -- 1. Introduction -- 2. Related Work -- 3. JPEG Background -- 3.1 Essential Configurations in JPEG Headers -- 3.2 Synchronization Point. 4. JPEG File Recovery Methodology -- 4.1 Huffman Table and Sub-Sampling Factor -- 4.2 Image Resolution -- 4.3 Quantization Table -- 5. Experimental Results -- 6. Conclusions -- References -- MOBILE DEVICEFORENSICS -- FORENSIC-READY SECURE iOS APPSFOR JAILBROKEN iPHONES -- 1. Introduction -- 2. Related Work -- 3. Implementation Methodology -- 3.1 Securing Apps -- 3.2 Preserving Dates and Timestamps -- 3.3 Static Library -- 3.4 Dynamic Library -- 4. Preventing Attacks and Anti-Forensics -- 4.1 Using the Static Library -- 4.2 Using the Dynamic Library -- 5. Experimental Results -- 6. Case Study -- 7. Conclusions -- References -- A FRAMEWORK FOR DESCRIBINGMULTIMEDIA CIRCULATION INA SMARTPHONE ECOSYSTEM -- 1. Introduction -- 2. Related Work -- 3. Using Graph Databases -- 4. Use Case Experiments -- 5. Results -- 6. System Design -- 7. Conclusions -- References -- CLOUD FORENSICS -- A TRUSTWORTHY CLOUDFORENSICS ENVIRONMENT -- 1. Introduction -- 2. Related Work -- 3. Desired Properties -- 4. Challenges -- 5. FECloud Architecture -- 5.1 Logger (Themis) -- 5.2 Data Possession Manager (Metis) -- 5.3 Timestamp Manager (Chronos) -- 5.4 Provenance Manager (Clio) -- 5.5 Proof Publisher (Brizo) -- 5.6 Evidence Access Interface (Horizon) -- 5.7 Forensics-Enabled Image -- 5.8 Preliminary Results -- 6. Conclusions -- References -- LOCATING AND TRACKING DIGITALOBJECTS IN THE CLOUD -- 1. Introduction -- 2. Background -- 2.1 Cloud Computing -- 2.2 Digital Forensics -- 2.3 Data Provenance -- 3. Related Work -- 3.1 Storing Provenance Data -- 3.2 Data Provenance Requirements -- 4. Cloud-Based Provenance Model -- 5. Using a Central Logging Server -- 5.1 File Wrapper -- 5.2 Tracking Wrapper Locations -- 6. Discussion -- 7. Conclusions -- References -- FORENSIC TOOLS -- A TOOL FOR EXTRACTING STATIC ANDVOLATILE FORENSIC ARTIFACTS OFWINDOWS 8.x APPS -- 1. Introduction. 2. Related Work -- 2.1 Windows 8 Forensics -- 2.2 Forensic Analysis of Apps -- 3. Background -- 3.1 Hibernation File -- 3.2 Swap File -- 3.3 Static vs. Volatile Artifacts -- 4. Experimental Methodology -- 5. Experimental Results -- 5.1 Facebook -- 5.2 Other Apps -- 5.3 Performance -- 6. Conclusions -- References -- CRITERIA FOR VALIDATINGSECURE WIPING TOOLS -- 1. Introduction -- 2. Deletion Effects and Deletion Types -- 2.1 Deletion Effects -- 2.2 Deletion Types -- 3. File Deletion Artifacts -- 3.1 MFT Records (Recycle Bin Deletion) -- 3.2 LogFile (Recycle Bin Deletion) -- 3.3 Hard Disk (Recycle Bin Deletion) -- 3.4 MFT Records (Permanent File Deletion) -- 3.5 LogFile (Permanent File Deletion) -- 3.6 Hard Disk (Permanent File Deletion) -- 4. Validation Criteria -- 4.1 Specifications -- 4.2 Test Assertions -- 4.3 Test Cases (SW-TC) -- 4.4 Relational Summary Table -- 5. Validation Testing of Eraser -- 6. Conclusions -- References -- DO DATA LOSS PREVENTIONSYSTEMS REALLY WORK? -- 1. Introduction -- 2. Related Work -- 3. Evaluated Systems -- 3.1 Agent-Based Solution -- 3.2 Agentless Solution -- 3.3 Hybrid Solution -- 3.4 File System Scanning Tool -- 4. Experimental Setup -- 5. Experimental Results -- 6. Discussion -- 7. Conclusions -- References. |
| Record Nr. | UNINA-9910299205603321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Digital Forensics XII : 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
| Advances in Digital Forensics XII : 12th IFIP WG 11.9 International Conference, New Delhi, January 4-6, 2016, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
| Edizione | [1st ed. 2016.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
| Descrizione fisica | 1 online resource (XVIII, 396 p. 99 illus.) |
| Disciplina | 363.25 |
| Collana | IFIP Advances in Information and Communication Technology |
| Soggetto topico |
Data protection
Computers and civilization Electronic commerce Information technology - Management Cryptography Data encryption (Computer science) Data and Information Security Computers and Society e-Commerce and e-Business Computer Application in Administrative Data Processing Cryptology |
| ISBN | 3-319-46279-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910254985803321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Digital Forensics XIII : 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
| Advances in Digital Forensics XIII : 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30 - February 1, 2017, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
| Edizione | [1st ed. 2017.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
| Descrizione fisica | 1 online resource (XVIII, 303 p. 98 illus.) |
| Disciplina | 004 |
| Collana | IFIP Advances in Information and Communication Technology |
| Soggetto topico |
Data protection
Information technology - Management Computers and civilization Cryptography Data encryption (Computer science) Data and Information Security Computer Application in Administrative Data Processing Computers and Society Cryptology |
| ISBN | 3-319-67208-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- 1 ESTABLISHING FINDINGS IN DIGITAL FORENSIC EXAMINATIONS: A CASE STUDY METHOD -- 1. Introduction -- 2. Causality and Digital Systems -- 3. Using Yin's Method -- 3.1 Body of Knowledge -- 3.2 Hypotheses Formulation -- 3.3 Hypotheses Testing -- 4. Causal Relationships in Digital Forensics -- 4.1 Understanding Causal Relationships -- 4.2 Establishing Causal Relationships -- 5. Lottery Terminal Hacking Incident -- 5.1 The Case -- 5.2 The Investigation -- 5.3 The Examination -- 5.4 Hypotheses Formulation -- 5.5 Hypothesis Testing -- 6. Conclusions -- References -- 2 A MODEL FOR DIGITAL EVIDENCE ADMISSIBILITY ASSESSMENT -- 1. Introduction -- 2. Background -- 2.1 Digital Forensics and Digital Evidence -- 2.2 Harmonization and Standardization -- 3. Requirements for Assessing Admissibility -- 3.1 Harmonization of Requirements -- 3.2 Technical Requirements and Assessment -- 3.3 Legal Requirements and Assessment -- 4. Model for Assessing Evidence Admissibility -- 4.1 Phase 1: Evidence Assessment Phase -- 4.2 Phase 2: Evidence Consideration Phase -- 4.3 Phase 3: Evidence Determination Phase -- 5. Application in Legal Proceedings -- 6. Conclusions -- References -- II MOBILE AND EMBEDDED DEVICE FORENSICS -- 3 EVALUATING THE AUTHENTICITY OF SMARTPHONE EVIDENCE -- 1. Introduction -- 2. Related Research -- 3. Reference Architecture -- 3.1 Architectural Designs of Applications -- 3.2 Reference Architecture Components -- 3.3 Modeling Application Behavior -- 3.4 Exploring an Android Application -- 4. Theories of Normality -- 5. Discussion -- 6. Conclusions -- References -- 4 FORENSIC EVALUATION OF AN AMAZON FIRE TV STICK -- 1. Introduction -- 2. Related Work -- 2.1 Chromecast -- 2.2 Measy A2W Miracast -- 2.3 Amazon Kindle Fire HD -- 3. Proposed Forensic Methodology.
3.1 Experimental Methodology -- 3.2 Sample Data -- 4. Forensic Assessment -- 4.1 ADB Extraction Test -- 4.2 UFED Touch Test -- 4.3 Python Script Test -- 4.4 Rooting Test -- 4.5 ADB Extraction Test -- 4.6 Manual Acquisition Test -- 5. Recommended Forensic Analysis Method -- 6. Conclusions -- References -- 5 DETECTING ANOMALOUS PROGRAMMABLE LOGIC CONTROLLER EVENTS USING MACHINE LEARNING -- 1. Introduction -- 2. Programmable Logic Controllers -- 3. Forensic Challenges -- 4. Machine Learning -- 5. Related Work -- 6. Experimental Setup and Methodology -- 6.1 Experimental Setup -- 6.2 Classifying Anomalous Operations -- 7. Experimental Results and Discussion -- 8. Conclusions -- References -- III NETWORK AND CLOUD FORENSICS -- 6 A FORENSIC METHODOLOGY FOR SOFTWARE-DEFINED NETWORK SWITCHES -- 1. Introduction -- 2. Background -- 3. Related Work -- 4. Proposed Forensic Methodology -- 5. Experimental Evaluation -- 5.1 Experimental Setup -- 5.2 Attack Scenario -- 5.3 Memory Analysis -- 5.4 Southbound Traffic Analysis -- 5.5 Service-Level Event Logging -- 5.6 Discussion -- 6. Conclusions -- Acknowledgement -- References -- 7 IDENTIFYING EVIDENCE FOR CLOUD FORENSIC ANALYSIS -- 1. Introduction -- 2. Background and Related Work -- 3. Attack Reconstruction -- 4. Reconstructing Attack Scenarios -- 4.1 Experimental Setup -- 4.2 Experimental Attacks -- 4.3 Collecting Evidence for Reconstruction -- 5. Using System Calls for Evidence Analysis -- 6. Conclusions -- References -- IV THREAT DETECTION AND MITIGATION -- 8 DIGITAL FORENSIC IMPLICATIONS OF COLLUSION ATTACKS ON THE LIGHTNING NETWORK -- 1. Introduction -- 2. Related Work -- 3. Bitcoin Blockchain -- 4. Lightning Network -- 4.1 Payment Routing -- 4.2 Lightning Network Topology -- 5. Collusion Attack on the Lightning Network -- 6. Collusion Attack Implications -- 6.1 Fraud -- 6.2 Money Laundering -- 6.3 Forfeiture. 7. Attack Mitigation -- 8. Conclusions -- References -- 9 INSIDER THREAT DETECTION USING TIME-SERIES-BASED RAW DISK FORENSIC ANALYSIS -- 1. Introduction -- 2. Methodology -- 2.1 Sample Data -- 2.2 Data Driven Algorithm Development -- 2.3 Time-Series-Based Anomaly Detection -- 3. Experimental Results -- 3.1 Unpaired t-Test/Split Window Method -- 3.2 Unpaired t-Test/Sliding Window Method -- 3.3 Autoregressive Method -- 3.4 Ground Truth Analysis -- 4. Conclusions -- Acknowledgement -- References -- 10 ANTI-FORENSIC THREAT MODELING -- 1. Introduction -- 2. Threats to the Digital Forensic Process -- 2.1 Evidence Destruction -- 2.2 Evidence Hiding -- 2.3 Evidence Source Elimination -- 2.4 Evidence Counterfeiting -- 3. Threat Modeling Applied to Digital Forensics -- 3.1 Case Understanding -- 3.2 Evidence Source Identification -- 3.3 Threat Identification -- 3.4 Risk Management -- 3.5 Result Reporting and Model Updating -- 4. Applying the Threat Model -- 5. Conclusions -- References -- V MALWARE FORENSICS -- 11 A BEHAVIOR-BASED APPROACH FOR MALWARE DETECTION -- 1. Introduction -- 2. Related Work -- 2.1 Static Analysis -- 2.2 Dynamic Analysis -- 3. Windows Handles and Objects -- 4. Malware Detection Using Handles -- 4.1 Experimental Setup -- 4.2 Vectorizing the Handle Data -- 4.3 Model Training -- 5. Results and Analysis -- 6. Conclusions -- References -- 12 CATEGORIZING MOBILE DEVICE MALWARE BASED ON SYSTEM SIDE-EFFECTS -- 1. Introduction -- 2. Live Memory Analysis of Mobile Devices -- 2.1 Information in Volatile Memory -- 2.2 Memory Capture Techniques -- 3. Android Exploitation Techniques -- 3.1 Heap Exploitation -- 3.2 Defeating ASL Randomization -- 4. Stagefright Exploits -- 4.1 Zimperium zLabs -- 4.2 Google Project Zero -- 4.3 NorthBit -- 5. Categorizing Malware by Behavior -- 5.1 Malware Categories -- 5.2 Benefits of Malware Categorization. 5.3 Detecting Malware Side-Effects -- 6. Conclusions -- References -- VI IMAGE FORENSICS -- 13 SEMANTIC VIDEO CARVING USING PERCEPTUAL HASHING AND OPTICAL FLOW -- 1. Introduction -- 2. Related Work -- 3. Proposed Video Carving Approach -- 3.1 Perceptual Grouping -- 3.2 Precise Stitching -- 4. Experimental Results -- 5. Conclusions -- Acknowledgements -- References -- 14 DETECTING FRAUDULENT BANK CHECKS -- 1. Introduction -- 2. Related Work -- 3. Experimental Setup -- 4. Fraud Detection Methodology Overview -- 5. Details of the Fraud Detection Methodology -- 5.1 Check Pantographs -- 5.2 Check Microlines -- 5.3 Check Alterations -- 5.4 Printed vs. Handwritten Signatures -- 6. Experimental Results -- 6.1 Check Pantograph Results -- 6.2 Check Microline Results -- 6.3 Check Alteration Results -- 6.4 Printed vs. Handwritten Signature Results -- 6.5 Results for Checks from Multiple Banks -- 7. Integrated Check Fraud Detection Tool -- 8. Conclusions -- References -- VII FORENSIC TECHNIQUES -- 15 AUTOMATED COLLECTION AND CORRELATION OF FILE PROVENANCE INFORMATION -- 1. Introduction -- 2. Related Work -- 2.1 File Provenance Maintenance Systems -- 2.2 Sources of Provenance Data -- 2.3 Evidence Correlation -- 3. Provenance Collection -- 3.1 Data Gathering -- 3.2 Data Processing -- 4. Experimental Results -- 5. Conclusions -- References -- 16 USING PERSONAL INFORMATION IN TARGETED GRAMMAR-BASED PROBABILISTIC PASSWORD ATTACKS -- 1. Introduction -- 2. Background and Related Work -- 3. Building a Targeted Attack -- 3.1 Merging Context-Free Grammars -- 3.2 Integrating Personal Information -- 3.3 Using Old Password Information -- 3.4 Predicting New Passwords -- 3.5 Merging Grammars and Generating Guesses -- 4. Experiments -- 4.1 Password Survey -- 4.2 Testing and Cracking Results -- 5. Conclusions -- References. |
| Record Nr. | UNINA-9910254836703321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Digital Forensics XIV : 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
| Advances in Digital Forensics XIV : 14th IFIP WG 11.9 International Conference, New Delhi, India, January 3-5, 2018, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
| Edizione | [1st ed. 2018.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
| Descrizione fisica | 1 online resource (XVIII, 367 p. 98 illus.) |
| Disciplina | 363.25968 |
| Collana | IFIP Advances in Information and Communication Technology |
| Soggetto topico |
Data protection
Computer networks Computers and civilization Computers - Law and legislation Information technology - Law and legislation Data structures (Computer science) Information theory Data and Information Security Computer Communication Networks Computers and Society Legal Aspects of Computing Data Structures and Information Theory |
| ISBN | 3-319-99277-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910299163103321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Digital Forensics XIX [[electronic resource] ] : 19th IFIP WG 11.9 International Conference, ICDF 2023, Arlington, Virginia, USA, January 30-31, 2023, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
| Advances in Digital Forensics XIX [[electronic resource] ] : 19th IFIP WG 11.9 International Conference, ICDF 2023, Arlington, Virginia, USA, January 30-31, 2023, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
| Autore | Peterson Gilbert |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (268 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) | ShenoiSujeet |
| Collana | IFIP Advances in Information and Communication Technology |
| Soggetto topico |
Data protection
Computer engineering Computer networks Computers Data and Information Security Computer Engineering and Networks Computing Milieux |
| ISBN | 3-031-42991-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Mobile Device Forensics -- Forensic Data Collection -- Image and Video Forensics -- Novel Applications -- Legal Issues and Applications. |
| Record Nr. | UNISA-996558568503316 |
Peterson Gilbert
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Advances in Digital Forensics XIX : 19th IFIP WG 11.9 International Conference, ICDF 2023, Arlington, Virginia, USA, January 30-31, 2023, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
| Advances in Digital Forensics XIX : 19th IFIP WG 11.9 International Conference, ICDF 2023, Arlington, Virginia, USA, January 30-31, 2023, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
| Autore | Peterson Gilbert |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (268 pages) |
| Disciplina | 005.8 |
| Altri autori (Persone) | ShenoiSujeet |
| Collana | IFIP Advances in Information and Communication Technology |
| Soggetto topico |
Data protection
Computer engineering Computer networks Computers Data and Information Security Computer Engineering and Networks Computing Milieux |
| ISBN | 3-031-42991-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Mobile Device Forensics -- Forensic Data Collection -- Image and Video Forensics -- Novel Applications -- Legal Issues and Applications. |
| Record Nr. | UNINA-9910754087703321 |
Peterson Gilbert
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Digital Forensics XV : 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi
| Advances in Digital Forensics XV : 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papers / / edited by Gilbert Peterson, Sujeet Shenoi |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (XVIII, 272 p. 1 illus.) |
| Disciplina | 005.8 |
| Collana | IFIP Advances in Information and Communication Technology |
| Soggetto topico |
Data protection
Computer crimes Computers - Law and legislation Information technology - Law and legislation Robotics Computer vision Data and Information Security Computer Crime Legal Aspects of Computing Computer Vision |
| ISBN | 3-030-28752-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910349290003321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in digital forensics XVI : 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, revised selected papers / / Gilbert Peterson, Sujeet Shenoi (editors)
| Advances in digital forensics XVI : 16th IFIP WG 11.9 International Conference, New Delhi, India, January 6-8, 2020, revised selected papers / / Gilbert Peterson, Sujeet Shenoi (editors) |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
| Descrizione fisica | 1 online resource (XVIII, 308 p. 48 illus.) |
| Disciplina | 004 |
| Collana | IFIP Advances in Information and Communication Technology |
| Soggetto topico | Computer science |
| ISBN | 3-030-56223-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996465358603316 |
| Cham, Switzerland : , : Springer, , [2020] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||