Results 1 - 10
of
2,407
Forensic Analysis of Database Tampering
- in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD
, 2006
"... Mechanisms now exist that detect tampering of a database, through the use of cryptographically-strong hash functions. This paper addresses the next problem, that of determining who, when, and what, by providing a systematic means of performing forensic analysis after such tampering has been uncovere ..."
Abstract
-
Cited by 40 (9 self)
- Add to MetaCart
Mechanisms now exist that detect tampering of a database, through the use of cryptographically-strong hash functions. This paper addresses the next problem, that of determining who, when, and what, by providing a systematic means of performing forensic analysis after such tampering has been
Forensic Analysis of the Windows Registry
"... Windows registry contains lots of information that are of potential evidential value or helpful in aiding forensic examiners on other aspects of forensic analysis. This paper discusses the basics of Windows XP registry and its structure, data hiding techniques in registry, and analysis on potential ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Windows registry contains lots of information that are of potential evidential value or helpful in aiding forensic examiners on other aspects of forensic analysis. This paper discusses the basics of Windows XP registry and its structure, data hiding techniques in registry, and analysis on potential
Mobile Phone Forensic Analysis
"... Recent technological advances in mobile phones and the development of smart phones has led to increased use and dependence on the mobile phone. The explosion of its use has led to problems such as fraud, criminal use and identity theft which have led to the need for mobile phone forensic analysis. T ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
Recent technological advances in mobile phones and the development of smart phones has led to increased use and dependence on the mobile phone. The explosion of its use has led to problems such as fraud, criminal use and identity theft which have led to the need for mobile phone forensic analysis
Towards models for forensic analysis
- In Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering
, 2007
"... The existing solutions in the field of computer forensics are largely ad hoc. This paper discusses the need for a rigorous model of forensics and outlines qualities that such a model should possess. It presents an overview of a forensic model and an example of how to apply the model to a real-world, ..."
Abstract
-
Cited by 18 (10 self)
- Add to MetaCart
-world, multi-stage attack. We show how using the model can result in forensic analysis requiring a much smaller amount of carefully selected, highly useful data than without the model. 1
Implementation of Forensic Analysis Procedures for
"... Communication in today’s world is mostly dependent on mobile phones allowing users to exchange messages, ideas, videos and audios. Numerous instant messengers are available for mobile devices which are better alternative over SMS technology. However, increased use of instant messengers also gave ris ..."
Abstract
- Add to MetaCart
rise to its negative impact including unwanted activities pertaining to cyber crimes. WhatsApp and Viber are mostly used instant messengers on Android mobile devices. In this paper, we perform forensic analysis procedures to obtain artifacts of WhatsApp and Viber applications. During analysis, we focus
Study on Forensic Analysis of Physical Memory
"... Abstract—In this paper we firstly describe the importance of the study on forensics analysis of physical memory. Further we introduce some tools and techniques commonly used in forensics analysis of physical memory. Lastly we present an example of forensic analysis to illustrate how to do physical m ..."
Abstract
- Add to MetaCart
Abstract—In this paper we firstly describe the importance of the study on forensics analysis of physical memory. Further we introduce some tools and techniques commonly used in forensics analysis of physical memory. Lastly we present an example of forensic analysis to illustrate how to do physical
Principles-Driven Forensic Analysis
- In Proceedings of the 2005 New Security Paradigms Workshop (NSPW
, 2005
"... It is possible to enhance our understanding of what has hap-pened on a computer system by using forensic techniques that do not require prediction of the nature of the attack, the skill of the attacker, or the details of the system resources or objects affected. These techniques address five fundame ..."
Abstract
-
Cited by 19 (13 self)
- Add to MetaCart
It is possible to enhance our understanding of what has hap-pened on a computer system by using forensic techniques that do not require prediction of the nature of the attack, the skill of the attacker, or the details of the system resources or objects affected. These techniques address five
Fingerprinting and Forensic Analysis of Multimedia
- ACM MULTIMEDIA
, 2004
"... One of the prime reasons movie and music studios have ignored the Internet for open-networked multimedia content delivery, has been the lack of a technology that can support a secure digital rights management (DRM) system on a general purpose computer. The difficulty ..."
Abstract
-
Cited by 14 (2 self)
- Add to MetaCart
One of the prime reasons movie and music studios have ignored the Internet for open-networked multimedia content delivery, has been the lack of a technology that can support a secure digital rights management (DRM) system on a general purpose computer. The difficulty
Forensic analysis of tampering database using RGBY algorithm
"... Abstract -We are using cryptographically-strong hash functions to detect tampering of a database to identify the people who have made any changes to the database silently we are applying forensic analysis algorithm and to determining who, when, and what, by providing a systematic means of performin ..."
Abstract
- Add to MetaCart
Abstract -We are using cryptographically-strong hash functions to detect tampering of a database to identify the people who have made any changes to the database silently we are applying forensic analysis algorithm and to determining who, when, and what, by providing a systematic means
Foundations for Visual Forensic Analysis
"... Abstract—Computer forensics is the preservation, analysis, and interpretation of computer data. It is a crucial tool in the arsenal of law enforcement investigators, national security analysts, and corporate computer emergency response teams. There is a need for software that aids investigators in l ..."
Abstract
- Add to MetaCart
Abstract—Computer forensics is the preservation, analysis, and interpretation of computer data. It is a crucial tool in the arsenal of law enforcement investigators, national security analysts, and corporate computer emergency response teams. There is a need for software that aids investigators
Results 1 - 10
of
2,407