Forensic Analysis

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 55758 Experts worldwide ranked by ideXlab platform

Sean Cassidy - One of the best experts on this subject based on the ideXlab platform.

  • Mobile Phone Forensic Analysis
    Crime Prevention Technologies and Applications for Advancing Criminal Investigation, 2012
    Co-Authors: Kevin Curran, Andrew Robinson, Stephen Peacocke, Sean Cassidy
    Abstract:

    During the past decade, technological advances in mobile phones and the development of smart phones have led to increased use and dependence on the mobile phone. The explosion of its use has led to problems such as fraud, criminal use and identity theft, which have led to the need for mobile phone Forensic Analysis. In this regard, the authors discuss mobile phone Forensic Analysis, what it means, who avails of it and the software tools used.

  • Mobile Phone Forensic Analysis
    International Journal of Digital Crime and Forensics, 2010
    Co-Authors: Kevin Curran, Andrew Robinson, Stephen Peacocke, Sean Cassidy
    Abstract:

    Recent technological advances in mobile phones and the development of smart phones has led to increased use and dependence on the mobile phone. The explosion of its use has led to problems such as fraud, criminal use and identity theft which have led to the need for mobile phone Forensic Analysis. This paper discusses mobile phone Forensic Analysis, what it means, who avails of it and the software tools used.

Kevin Curran - One of the best experts on this subject based on the ideXlab platform.

  • Mobile Phone Forensic Analysis
    Crime Prevention Technologies and Applications for Advancing Criminal Investigation, 2012
    Co-Authors: Kevin Curran, Andrew Robinson, Stephen Peacocke, Sean Cassidy
    Abstract:

    During the past decade, technological advances in mobile phones and the development of smart phones have led to increased use and dependence on the mobile phone. The explosion of its use has led to problems such as fraud, criminal use and identity theft, which have led to the need for mobile phone Forensic Analysis. In this regard, the authors discuss mobile phone Forensic Analysis, what it means, who avails of it and the software tools used.

  • Mobile Phone Forensic Analysis
    International Journal of Digital Crime and Forensics, 2010
    Co-Authors: Kevin Curran, Andrew Robinson, Stephen Peacocke, Sean Cassidy
    Abstract:

    Recent technological advances in mobile phones and the development of smart phones has led to increased use and dependence on the mobile phone. The explosion of its use has led to problems such as fraud, criminal use and identity theft which have led to the need for mobile phone Forensic Analysis. This paper discusses mobile phone Forensic Analysis, what it means, who avails of it and the software tools used.

Lianfu Yin - One of the best experts on this subject based on the ideXlab platform.

  • Research on UNIX Forensic Analysis
    Proceedings of the 2016 International Conference on Intelligent Control and Computer Application, 2016
    Co-Authors: Lianfu Yin
    Abstract:

    UNIX is one of the most mainstream operating systems, it has great practical significance to research the methodology of UNIX Forensic Analysis. This paper firstly introduces the method to capture the volatile data from UNIX systems, then introduces the concrete steps and method of UNIX Forensic Analysis. Keywordscomputer crime; computer Forensics; UNIX Forensics Analysis

  • Research on Windows Physical Memory Forensic Analysis
    2012 Fourth International Symposium on Information Science and Engineering, 2012
    Co-Authors: Lianfu Yin
    Abstract:

    A plenty of computer evidence cannot be seized from hard disks, they must be seized from physical memory of the computer system, once the computer system is powered off, they will all be disappeared. In this paper, the basic concepts and related works of physical memory Forensic Analysis are presented, and the key technology of physical memory Forensic Analysis of Windows systems is investigated. An example about physical memory Forensic Analysis of Windows system is also given. Finally based on the Analysis of the deficiency for the current work on physical memory Forensic Analysis, future work on the improvement of physical memory Forensic Analysis is discussed.

Richard T Snodgrass - One of the best experts on this subject based on the ideXlab platform.

  • The Tiled Bitmap Forensic Analysis Algorithm
    IEEE Transactions on Knowledge and Data Engineering, 2010
    Co-Authors: Kyriacos E Pavlou, Richard T Snodgrass
    Abstract:

    Tampering of a database can be detected through the use of cryptographically strong hash functions. Subsequently, applied Forensic Analysis algorithms can help determine when, what, and perhaps ultimately who and why. This paper presents a novel Forensic Analysis algorithm, the tiled Bitmap algorithm, which is more efficient than prior Forensic Analysis algorithms. It introduces the notion of a candidate set (all possible locations of detected tampering(s)) and provides a complete characterization of the candidate set and its cardinality. An optimal algorithm for computing the candidate set is also presented. Finally, the implementation of the tiled Bitmap algorithm is discussed, along with a comparison to other Forensic algorithms in terms of space/time complexity and cost. An example of candidate set generation and proofs of the theorems and lemmata and of algorithm correctness can be found in the appendix, which can be found on the Computer Society Digital Library at http://doi.ieeecomputersociety.org/10.1109/TKDE.2009.121.

  • Forensic Analysis of database tampering
    ACM Transactions on Database Systems, 2008
    Co-Authors: Kyriacos E Pavlou, Richard T Snodgrass
    Abstract:

    Regulations and societal expectations have recently expressed the need to mediate access to valuable databases, even by insiders. One approach is tamper detection via cryptographic hashing. This article shows how to determine when the tampering occurred, what data was tampered with, and perhaps, ultimately, who did the tampering, via Forensic Analysis. We present four successively more sophisticated Forensic Analysis algorithms: the Monochromatic, RGBY, Tiled Bitmap, and a3D algorithms, and characterize their “Forensic cost” under worst-case, best-case, and average-case assumptions on the distribution of corruption sites. A lower bound on Forensic cost is derived, with RGBY and a3D being shown optimal for a large number of corruptions. We also provide validated cost formulae for these algorithms and recommendations for the circumstances in which each algorithm is indicated.

  • Forensic Analysis of database tampering
    International Conference on Management of Data, 2006
    Co-Authors: Kyriacos E Pavlou, Richard T Snodgrass
    Abstract:

    Mechanisms now exist that detect tampering of a database, through the use of cryptographically-strong hash functions. This paper addresses the next problem, that of determining who, when, and what, by providing a systematic means of performing Forensic Analysis after such tampering has been uncovered. We introduce a schematic representation termed a "corruption diagram" that aids in intrusion investigation. We use these diagrams to fully analyze the original proposal, that of a linked sequence of hash values. We examine the various kinds of intrusions that are possible, including retroactive, introactive, backdating, and postdating intrusions. We then introduce successively more sophisticated Forensic Analysis algorithms: the monochromatic, RGB, and polychromatic algorithms, and characterize the "Forensic strength" of these algorithms. We show how Forensic Analysis can efficiently extract a good deal of information concerning a corruption event.

  • SIGMOD Conference - Forensic Analysis of database tampering
    Proceedings of the 2006 ACM SIGMOD international conference on Management of data - SIGMOD '06, 2006
    Co-Authors: Kyriacos E Pavlou, Richard T Snodgrass
    Abstract:

    Mechanisms now exist that detect tampering of a database, through the use of cryptographically-strong hash functions. This paper addresses the next problem, that of determining who, when, and what, by providing a systematic means of performing Forensic Analysis after such tampering has been uncovered. We introduce a schematic representation termed a "corruption diagram" that aids in intrusion investigation. We use these diagrams to fully analyze the original proposal, that of a linked sequence of hash values. We examine the various kinds of intrusions that are possible, including retroactive, introactive, backdating, and postdating intrusions. We then introduce successively more sophisticated Forensic Analysis algorithms: the monochromatic, RGB, and polychromatic algorithms, and characterize the "Forensic strength" of these algorithms. We show how Forensic Analysis can efficiently extract a good deal of information concerning a corruption event.

Andrew Robinson - One of the best experts on this subject based on the ideXlab platform.

  • Mobile Phone Forensic Analysis
    Crime Prevention Technologies and Applications for Advancing Criminal Investigation, 2012
    Co-Authors: Kevin Curran, Andrew Robinson, Stephen Peacocke, Sean Cassidy
    Abstract:

    During the past decade, technological advances in mobile phones and the development of smart phones have led to increased use and dependence on the mobile phone. The explosion of its use has led to problems such as fraud, criminal use and identity theft, which have led to the need for mobile phone Forensic Analysis. In this regard, the authors discuss mobile phone Forensic Analysis, what it means, who avails of it and the software tools used.

  • Mobile Phone Forensic Analysis
    International Journal of Digital Crime and Forensics, 2010
    Co-Authors: Kevin Curran, Andrew Robinson, Stephen Peacocke, Sean Cassidy
    Abstract:

    Recent technological advances in mobile phones and the development of smart phones has led to increased use and dependence on the mobile phone. The explosion of its use has led to problems such as fraud, criminal use and identity theft which have led to the need for mobile phone Forensic Analysis. This paper discusses mobile phone Forensic Analysis, what it means, who avails of it and the software tools used.