The Experts below are selected from a list of 55758 Experts worldwide ranked by ideXlab platform
Sean Cassidy - One of the best experts on this subject based on the ideXlab platform.
-
Mobile Phone Forensic Analysis
Crime Prevention Technologies and Applications for Advancing Criminal Investigation, 2012Co-Authors: Kevin Curran, Andrew Robinson, Stephen Peacocke, Sean CassidyAbstract:During the past decade, technological advances in mobile phones and the development of smart phones have led to increased use and dependence on the mobile phone. The explosion of its use has led to problems such as fraud, criminal use and identity theft, which have led to the need for mobile phone Forensic Analysis. In this regard, the authors discuss mobile phone Forensic Analysis, what it means, who avails of it and the software tools used.
-
Mobile Phone Forensic Analysis
International Journal of Digital Crime and Forensics, 2010Co-Authors: Kevin Curran, Andrew Robinson, Stephen Peacocke, Sean CassidyAbstract:Recent technological advances in mobile phones and the development of smart phones has led to increased use and dependence on the mobile phone. The explosion of its use has led to problems such as fraud, criminal use and identity theft which have led to the need for mobile phone Forensic Analysis. This paper discusses mobile phone Forensic Analysis, what it means, who avails of it and the software tools used.
Kevin Curran - One of the best experts on this subject based on the ideXlab platform.
-
Mobile Phone Forensic Analysis
Crime Prevention Technologies and Applications for Advancing Criminal Investigation, 2012Co-Authors: Kevin Curran, Andrew Robinson, Stephen Peacocke, Sean CassidyAbstract:During the past decade, technological advances in mobile phones and the development of smart phones have led to increased use and dependence on the mobile phone. The explosion of its use has led to problems such as fraud, criminal use and identity theft, which have led to the need for mobile phone Forensic Analysis. In this regard, the authors discuss mobile phone Forensic Analysis, what it means, who avails of it and the software tools used.
-
Mobile Phone Forensic Analysis
International Journal of Digital Crime and Forensics, 2010Co-Authors: Kevin Curran, Andrew Robinson, Stephen Peacocke, Sean CassidyAbstract:Recent technological advances in mobile phones and the development of smart phones has led to increased use and dependence on the mobile phone. The explosion of its use has led to problems such as fraud, criminal use and identity theft which have led to the need for mobile phone Forensic Analysis. This paper discusses mobile phone Forensic Analysis, what it means, who avails of it and the software tools used.
Lianfu Yin - One of the best experts on this subject based on the ideXlab platform.
-
Research on UNIX Forensic Analysis
Proceedings of the 2016 International Conference on Intelligent Control and Computer Application, 2016Co-Authors: Lianfu YinAbstract:UNIX is one of the most mainstream operating systems, it has great practical significance to research the methodology of UNIX Forensic Analysis. This paper firstly introduces the method to capture the volatile data from UNIX systems, then introduces the concrete steps and method of UNIX Forensic Analysis. Keywordscomputer crime; computer Forensics; UNIX Forensics Analysis
-
Research on Windows Physical Memory Forensic Analysis
2012 Fourth International Symposium on Information Science and Engineering, 2012Co-Authors: Lianfu YinAbstract:A plenty of computer evidence cannot be seized from hard disks, they must be seized from physical memory of the computer system, once the computer system is powered off, they will all be disappeared. In this paper, the basic concepts and related works of physical memory Forensic Analysis are presented, and the key technology of physical memory Forensic Analysis of Windows systems is investigated. An example about physical memory Forensic Analysis of Windows system is also given. Finally based on the Analysis of the deficiency for the current work on physical memory Forensic Analysis, future work on the improvement of physical memory Forensic Analysis is discussed.
Richard T Snodgrass - One of the best experts on this subject based on the ideXlab platform.
-
The Tiled Bitmap Forensic Analysis Algorithm
IEEE Transactions on Knowledge and Data Engineering, 2010Co-Authors: Kyriacos E Pavlou, Richard T SnodgrassAbstract:Tampering of a database can be detected through the use of cryptographically strong hash functions. Subsequently, applied Forensic Analysis algorithms can help determine when, what, and perhaps ultimately who and why. This paper presents a novel Forensic Analysis algorithm, the tiled Bitmap algorithm, which is more efficient than prior Forensic Analysis algorithms. It introduces the notion of a candidate set (all possible locations of detected tampering(s)) and provides a complete characterization of the candidate set and its cardinality. An optimal algorithm for computing the candidate set is also presented. Finally, the implementation of the tiled Bitmap algorithm is discussed, along with a comparison to other Forensic algorithms in terms of space/time complexity and cost. An example of candidate set generation and proofs of the theorems and lemmata and of algorithm correctness can be found in the appendix, which can be found on the Computer Society Digital Library at http://doi.ieeecomputersociety.org/10.1109/TKDE.2009.121.
-
Forensic Analysis of database tampering
ACM Transactions on Database Systems, 2008Co-Authors: Kyriacos E Pavlou, Richard T SnodgrassAbstract:Regulations and societal expectations have recently expressed the need to mediate access to valuable databases, even by insiders. One approach is tamper detection via cryptographic hashing. This article shows how to determine when the tampering occurred, what data was tampered with, and perhaps, ultimately, who did the tampering, via Forensic Analysis. We present four successively more sophisticated Forensic Analysis algorithms: the Monochromatic, RGBY, Tiled Bitmap, and a3D algorithms, and characterize their “Forensic cost” under worst-case, best-case, and average-case assumptions on the distribution of corruption sites. A lower bound on Forensic cost is derived, with RGBY and a3D being shown optimal for a large number of corruptions. We also provide validated cost formulae for these algorithms and recommendations for the circumstances in which each algorithm is indicated.
-
Forensic Analysis of database tampering
International Conference on Management of Data, 2006Co-Authors: Kyriacos E Pavlou, Richard T SnodgrassAbstract:Mechanisms now exist that detect tampering of a database, through the use of cryptographically-strong hash functions. This paper addresses the next problem, that of determining who, when, and what, by providing a systematic means of performing Forensic Analysis after such tampering has been uncovered. We introduce a schematic representation termed a "corruption diagram" that aids in intrusion investigation. We use these diagrams to fully analyze the original proposal, that of a linked sequence of hash values. We examine the various kinds of intrusions that are possible, including retroactive, introactive, backdating, and postdating intrusions. We then introduce successively more sophisticated Forensic Analysis algorithms: the monochromatic, RGB, and polychromatic algorithms, and characterize the "Forensic strength" of these algorithms. We show how Forensic Analysis can efficiently extract a good deal of information concerning a corruption event.
-
SIGMOD Conference - Forensic Analysis of database tampering
Proceedings of the 2006 ACM SIGMOD international conference on Management of data - SIGMOD '06, 2006Co-Authors: Kyriacos E Pavlou, Richard T SnodgrassAbstract:Mechanisms now exist that detect tampering of a database, through the use of cryptographically-strong hash functions. This paper addresses the next problem, that of determining who, when, and what, by providing a systematic means of performing Forensic Analysis after such tampering has been uncovered. We introduce a schematic representation termed a "corruption diagram" that aids in intrusion investigation. We use these diagrams to fully analyze the original proposal, that of a linked sequence of hash values. We examine the various kinds of intrusions that are possible, including retroactive, introactive, backdating, and postdating intrusions. We then introduce successively more sophisticated Forensic Analysis algorithms: the monochromatic, RGB, and polychromatic algorithms, and characterize the "Forensic strength" of these algorithms. We show how Forensic Analysis can efficiently extract a good deal of information concerning a corruption event.
Andrew Robinson - One of the best experts on this subject based on the ideXlab platform.
-
Mobile Phone Forensic Analysis
Crime Prevention Technologies and Applications for Advancing Criminal Investigation, 2012Co-Authors: Kevin Curran, Andrew Robinson, Stephen Peacocke, Sean CassidyAbstract:During the past decade, technological advances in mobile phones and the development of smart phones have led to increased use and dependence on the mobile phone. The explosion of its use has led to problems such as fraud, criminal use and identity theft, which have led to the need for mobile phone Forensic Analysis. In this regard, the authors discuss mobile phone Forensic Analysis, what it means, who avails of it and the software tools used.
-
Mobile Phone Forensic Analysis
International Journal of Digital Crime and Forensics, 2010Co-Authors: Kevin Curran, Andrew Robinson, Stephen Peacocke, Sean CassidyAbstract:Recent technological advances in mobile phones and the development of smart phones has led to increased use and dependence on the mobile phone. The explosion of its use has led to problems such as fraud, criminal use and identity theft which have led to the need for mobile phone Forensic Analysis. This paper discusses mobile phone Forensic Analysis, what it means, who avails of it and the software tools used.