The Experts below are selected from a list of 1671 Experts worldwide ranked by ideXlab platform
Federica Rosso - One of the best experts on this subject based on the ideXlab platform.
-
how to deliver open sustainable innovation an integrated approach for a sustainable marketable product
Sustainability, 2016Co-Authors: Francesco Cappa, Fausto Del Sette, Darren Hayes, Federica RossoAbstract:The adoption of open innovation and peer production, powered by 3D printing technology, is transforming traditional manufacturing methods towards a “third industrial revolution”. The purpose of this research is to provide empirical evidence for an integrated approach, based on collaborative product development and peer production, combined with 3D printing, to deliver more sustainable, yet competitive, marketable products. In particular, this experimental study is conducted in the context of Mobile Forensics, an emerging market where limited expensive products exist and alternative solutions are needed. The technical viability and economic feasibility of the prototype developed in this research validate the proposed integrated approach, which could be a game-changer in the field of Mobile Forensics, as well as in other sectors. The sustainability improvements with this approach are a reduction of the total cost, thereby making it affordable for lower income users, and a decrease in energy consumption and pollutant emissions. The validated integrated approach offers start-up opportunities to develop and deliver more sustainable, marketable products, towards the paradigm of Open Sustainable Innovation. While the device developed and tested in this research has similar features to existing products, the methodology, implementation, and motivation are original.
Reiner Creutzburg - One of the best experts on this subject based on the ideXlab platform.
-
conception of a course for professional training and education in the field of computer and Mobile Forensics part iii network Forensics and penetration testing
Proceedings of SPIE, 2014Co-Authors: Knut Kroger, Reiner CreutzburgAbstract:IT security and computer Forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or were done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data make it necessary to further train the own employees in the field of network Forensics and penetration testing. Motivated by these facts, this paper - a continuation of a paper of January 2012 [1], which showed the conception of a course for professional training and education in the field of computer and Mobile Forensics - addresses the practical implementation important relationships of network forensic and penetration testing.
-
conception of a course for professional training and education in the field of computer and Mobile Forensics part ii android Forensics
Proceedings of SPIE, 2013Co-Authors: Knut Kroger, Reiner CreutzburgAbstract:The growth of Android in the Mobile sector and the interest to investigate these devices from a forensic point of view has rapidly increased. Many companies have security problems with Mobile devices in their own IT infrastructure. To respond to these incidents, it is important to have professional trained staff. Furthermore, it is necessary to further train their existing employees in the practical applications of Mobile Forensics owing to the fact that a lot of companies are trusted with very sensitive data. Inspired by these facts, this paper - a continuation of a paper of January 2012 [1] which showed the conception of a course for professional training and education in the field of computer and Mobile Forensics - addresses training approaches and practical exercises to investigate Android Mobile devices.
-
conception of a course for professional training and education in the field of computer and Mobile Forensics
Proceedings of SPIE, 2012Co-Authors: Knut Kroger, Reiner CreutzburgAbstract:IT security and computer Forensics are important components in the information technology. From year to year, incidents and crimes increase that target IT systems or was done with their help. More and more companies and authorities have security problems in their own IT infrastructure. To respond to these incidents professionally, it is important to have well trained staff. The fact that many agencies and companies work with very sensitive data makes it necessary to further train the own employees in the field of IT Forensics. Motivated by these facts, a training concept, which allows the creation of practical exercises, is presented in this paper. The focus is on the practical implementation of forensic important relationships.
Ioannis Kounelis - One of the best experts on this subject based on the ideXlab platform.
-
ICITST - The Mobileak project: Forensics methodology for Mobile application privacy assessment
2012Co-Authors: Pasquale Stirparo, Ioannis KounelisAbstract:When talking about privacy, we talk about information, about data. There are several aspects that have to be considered when aiming to assess the privacy level of an application. These aspects are the states in which data can exist: data at rest, data in use and data in transit. Each of these require different methodologies and technologies in order to be properly addressed. This paper focuses on the state where data are at rest. It will be shown how common Mobile Forensics methodologies and tools can be used to assess the privacy level of Mobile applications, and therefore how Mobile applications store and manage personal information.
-
The Mobileak project: Forensics methodology for Mobile application privacy assessment
Internet Technology And Secured …, 2012Co-Authors: Pasquale Stirparo, Ioannis KounelisAbstract:When talking about privacy, we talk about information, about data. There are several aspects that have to be considered when aiming to assess the privacy level of an application. These aspects are the states in which data can exist: data at rest, data in use and data in transit. Each of these require different methodologies and technologies in order to be properly addressed. This paper focuses on the state where data are at rest. It will be shown how common Mobile Forensics methodologies and tools can be used to assess the privacy level of Mobile applications, and therefore how Mobile applications store and manage personal information.
Rajiv V. Dharaskar - One of the best experts on this subject based on the ideXlab platform.
-
Mobile Forensics: the roadblocks ahead, proposed solutions using Protocol Filtering and SIM programming
2009Co-Authors: Rizwan Ahmed, Rajiv V. DharaskarAbstract:From student to business worker, the popularity and ubiquity of Mobile devices is exploding. As these devices saturate modern culture, they continue to grow in functionality. Acquiring information from a Mobile phone is now an important issue in many criminal investigations. Mobile phones can contain large amounts of information which can be of use in an investigation. These include typical Mobile device data including SMS, phone records, images, audio, video, calendar and diary entries. As the difference between a PDA and a Mobile phone is now blurred, the data that can reside on a Mobile phone is somewhat endless.In this paper, we try to identify factors that pose as major roadblocks for Mobile Forensics and describes techniques to address two resulting problems in particular: the limited coverage of available phone models by forensic tools, and the inadequate means for validating the correct functioning of forensic tools
-
ICISTM - Mobile Forensics: An Introduction from Indian Law Enforcement Perspective
Information Systems Technology and Management, 2009Co-Authors: Rizwan Ahmed, Rajiv V. DharaskarAbstract:Mobile phone proliferation in our societies is on the increase. Advances in semiconductor technologies related to Mobile phones and the increase of computing power of Mobile phones led to an increase of functionality of Mobile phones while keeping the size of such devices small enough to fit in a pocket. This led Mobile phones to become portable data carriers. This in turn increased the potential for data stored on Mobile phone handsets to be used as evidence in civil or criminal cases. This paper examines the nature of some of the newer pieces of information that can become potential evidence on Mobile phones. It also highlights some of the weaknesses of Mobile forensic toolkits and procedures. Finally, the paper shows the need for more in depth examination of Mobile phone evidence.
Rajesh Krishna Balan - One of the best experts on this subject based on the ideXlab platform.
-
the case for Mobile Forensics of private data leaks towards large scale user oriented privacy protection
Asia-Pacific Workshop on Systems, 2013Co-Authors: Joseph Chan Joo Keng, Tan Kiat Wee, Lingxiao Jiang, Rajesh Krishna BalanAbstract:Privacy protection against Mobile applications on Mobile devices is becoming a serious concern as user sensitive data may be leaked without proper justification. Most current leak detection tools only report leaked private data, but provide inadequate information about the causes of the leaks for end users to take preventive measures. Hence, users often cannot reconcile the way they have used an application to a reported leak --- i.e., they are unable to comprehend the (il)legitimacy of the leak or make a decision on whether to allow the leak. This paper aims to demonstrate the feasibility and benefits of identifying the causes of leaks from a user's point of view, which we call Mobile Forensics of privacy leaks. Its goal is to correlate user actions to leaks, and report the causes from a user-oriented perspective. To make the case, we have performed a preliminary study that identifies leak causes based on logs of user actions in more than 220 Android applications and corresponding leak reports from a leak detection tool. Our results show that more than 60% of the 105 applications (of the 220 we sampled) that leak private data leak data do so due to user actions on certain in-application GUI widgets. About 44% also leak data right after users launch them, while 32% leak data periodically after launch. We also constructed a database containing leak causes from all tested apps, and demonstrated the use of visual overlays to warn users about potential leaks.
-
APSys - The case for Mobile Forensics of private data leaks: towards large-scale user-oriented privacy protection
Proceedings of the 4th Asia-Pacific Workshop on Systems - APSys '13, 2013Co-Authors: Joseph Chan Joo Keng, Tan Kiat Wee, Lingxiao Jiang, Rajesh Krishna BalanAbstract:Privacy protection against Mobile applications on Mobile devices is becoming a serious concern as user sensitive data may be leaked without proper justification. Most current leak detection tools only report leaked private data, but provide inadequate information about the causes of the leaks for end users to take preventive measures. Hence, users often cannot reconcile the way they have used an application to a reported leak --- i.e., they are unable to comprehend the (il)legitimacy of the leak or make a decision on whether to allow the leak. This paper aims to demonstrate the feasibility and benefits of identifying the causes of leaks from a user's point of view, which we call Mobile Forensics of privacy leaks. Its goal is to correlate user actions to leaks, and report the causes from a user-oriented perspective. To make the case, we have performed a preliminary study that identifies leak causes based on logs of user actions in more than 220 Android applications and corresponding leak reports from a leak detection tool. Our results show that more than 60% of the 105 applications (of the 220 we sampled) that leak private data leak data do so due to user actions on certain in-application GUI widgets. About 44% also leak data right after users launch them, while 32% leak data periodically after launch. We also constructed a database containing leak causes from all tested apps, and demonstrated the use of visual overlays to warn users about potential leaks.