Limit search to available items
Record 4 of 16
Previous Record Next Record
Book Cover
E-book
Author IFIP International Conference on Digital Forensics (15th : 2019 : Orlando, Fla.)

Title Advances in digital forensics XV : 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28-29, 2019 revised selected papers / Gilbert Peterson, Sujeet Shenoi (eds.)
Published Cham : Springer, 2019

Copies

Description 1 online resource
Series IFIP advances in information and communication technology ; 569
IFIP advances in information and communication technology ; 569.
Contents Intro; Contents; Contributing Authors; Preface; I FORENSIC MODELS; 1 A HOLISTIC FORENSIC MODEL FOR THE INTERNET OF THINGS; 1. Introduction; 2. Related Work; 3. Proposed Holistic Forensic Model; 3.1 Forensic Readiness (Proactive) Phase; 3.2 Forensic Initialization (Incident) Phase; 3.3 Forensic Investigation (Reactive) Phase; 4. Forensic Technologies; 4.1 Fog/Edge Computing; 4.2 Blockchains; 5. Research Challenges; 6. Conclusions; References; 2 IMPLEMENTING THE HARMONIZED MODEL FOR DIGITAL EVIDENCE ADMISSIBILITY ASSESSMENT; 1. Introduction; 2. Background and Related Work
3. Validation Survey Methodology and Findings4. Proposed Algorithm; 5. Evidential Weight Determination; 6. Results and Discussion; 7. Conclusions; References; II MOBILE AND EMBEDDEDDEVICE FORENSICS; 3 CLASSIFYING THE AUTHENTICITY OF EVALUATED SMARTPHONE DATA; 1. Introduction; 2. Background; 2.1 Authentic Smartphone Data; 2.2 Requirements for Authentic Data; 2.3 Smartphone Data Evaluation Model; 3. Classification Model; 3.1 Categorization of the Requirements; 3.2 Authenticity Score; 3.3 Authenticity Grading Scale; 3.4 Completeness; 3.5 Authenticity Classification
4. Authenticity Classification Tool4.1 Tool Description; 4.2 Experimental Results; 5. Conclusions; References; 4 RETROFITTING MOBILE DEVICES FOR CAPTURING MEMORY-RESIDENT; 1. Introduction; 2. Malware Categorization; 2.1 Stagefright; 2.2 Live Memory Analysis; 3. Automated Memory Acquisition; 3.1 Design Requirements; 3.2 Implementation and Testing; 3.3 Android Modification Results; 4. Hardware Enhancements; 4.1 Design Process and Requirements; 4.2 Implementation Details; 4.3 Experimental Results; 5. Conclusions; References; 5 A TARGETED DATA EXTRACTION SYSTEM FOR MOBILE DEVICES; 1. Introduction
2. Related Work3. System Overview; 4. Targeted Data Extraction; 4.1 On-Device Metadata-Based Filtering; 4.2 On-Device Content-Based Filtering; 4.3 Off-Device Backup-Based Filtering; 4.4 TDES Communications; 4.5 User Interface; 4.6 Reporting and Forensic Integrity; 5. Experiments and Results; 6. Conclusions; Acknowledgements; References; 6 EXPLOITING VENDOR-DEFINED MESSAGES IN THE USB POWER DELIVERY PROTOCOL; 1. Introduction; 2. Related Work; 3. USB Power Delivery Protocol; 4. Methodology; 5. Experimental Results; 6. Conclusions; Acknowledgement; References
7 DETECTING ANOMALIES IN PROGRAMMABLE LOGIC CONTROLLERS USING UNSUPERVISED MACHINE LEARNING1. Introduction; 2. Related Work; 3. Anomaly Detection Case Study; 3.1 Experimental Setup; 3.2 Anomaly Detection Methodology; 4. Discussion; 5. Conclusions; References; III FILESYSTEM FORENSICS; 8 CREATING A MAP OF USER DATA IN NTFS TO IMPROVE FILE CARVING; 1. Introduction; 2. Related Work; 2.1 File Fragment Carving; 2.2 Hash-Based Carving; 2.3 Data Persistence; 2.4 Data Reduction; 2.5 Data Mapping; 3. Proposed Method; 4. Experimental Setup; 4.1 Data Collection; 4.2 Implementation; 4.3 Evaluation
Summary {\bf ADVANCES IN DIGITAL FORENSICS XV} Edited by: Gilbert Peterson and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. {\bf Advances in Digital Forensics XV} describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: \begin{itemize} \item Forensic Models \item Mobile and Embedded Device Forensics \item Filesystem Forensics \item Image Forensics \item Forensic Techniques \end{itemize} This book is the fifteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of fourteen edited papers from the Fifteenth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in Orlando, Florida, USA in the winter of 2019. {\bf Advances in Digital Forensics XV} is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. {\bf Gilbert Peterson}, Chair, IFIP WG 11.9 on Digital Forensics, is a Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. {\bf Sujeet Shenoi} is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA
Subject Digital forensic science -- Congresses
Computer science -- Congresses
Computer security -- Congresses
Data encryption (Computer science) -- Congresses
Application software -- Congresses
Computers and civilization -- Congresses
Digital forensic science
Application software
Computer science
Computer security
Computers and civilization
Data encryption (Computer science)
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Peterson, Gilbert, 1969-
Shenoi, Sujeet.
ISBN 9783030287528
3030287521
Other Titles Advances in digital forensics 15