Full Text Documents

0

Search


Table of Contents
Advances in Digital Forensics VI
Kam-Pui Chow, Sujeet Shenoi
Front Matter

PART I: THEMES AND ISSUES


1


A History of Digital Forensics
Mark Pollitt
3-15

2


Toward a Science of Digital Forensic Evidence Examination
Fred Cohen
17-35

3


Using a Local Search Warrant to Acquire Evidence Stored Overseas via the Internet
Kenny Wang
37-48

4


An Analysis of the Green Dam Youth Escort Software
Frankie Li, Hilton Chan, Kam-Pui Chow, Pierre Lai
49-62

PART II: FORENSIC TECHNIQUES


5


Forensic Analysis of a PlayStation 3 Console
Scott Conrad, Greg Dorn, Philip Craiger
65-76

6


A Consistency Study of the Windows Registry
Yuandong Zhu, Joshua James, Pavel Gladyshev
77-90

7


Forensic Tracking and Mobility Prediction in Vehicular Networks
Saif Al-Kuwari, Stephen Wolthusen
91-105

8


A Forensic Readiness Model for Wireless Networks
Sipho Ngobeni, Hein Venter, Ivan Burke
107-117

PART III: INTERNET CRIME INVESTIGATIONS


9


Evaluation of Evidence in Internet Auction Fraud Investigations
Michael Kwan, Richard Overill, Kam-Pui Chow, Jantje Silomon, Hayson Tse, Frank Law, Pierre Lai
121-132

10


Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services
Murat Gunestas, Murad Mehmet, Duminda Wijesekera
133-150

11


Identifying First Seeders in Foxy Peer-to-Peer Networks
Ricci Ieong, Pierre Lai, Kam-Pui Chow, Michael Kwan, Frank Law
151-168

PART IV: LIVE FORENSICS


12


Uncertainty in Live Forensics
Antonio Savoldi, Paolo Gubian, Isao Echizen
171-184

13


Identifying Volatile Data from Multiple Memory Dumps in Live Forensics
Frank Law, Patrick Chan, Siu-Ming Yiu, Benjamin Tang, Pierre Lai, Kam-Pui Chow, Ricci Ieong, Michael Kwan, Wing-Kai Hon, Lucas Hui
185-194

14


A Compiled Memory Analysis Tool
James Okolica, Gilbert Peterson
195-204

PART V: ADVANCED FORENSIC TECHNIQUES


15


Data Fingerprinting with Similarity Digests
Vassil Roussev
207-226

16


Refining Evidence Containers for Provenance and Accurate Data Representation
Bradley Schatz, Michael Cohen
227-242

17


Virtual Expansion of Rainbow Tables
Vrizlynn Thing
243-256

18


Digital Watermarking of Virtual Machine Images
Kumiko Tadano, Masahiro Kawato, Ryo Furukawa, Fumio Machida, Yoshiharu Maeno
257-268

19


A Visualization System for Analyzing Information Leakage
Yuki Nakayama, Seiji Shibaguchi, Kenichi Okada
269-282

PART VI: FORENSIC TOOLS


20


Forensic Analysis of Popular Chinese Internet Applications
Ying Yang, Kam-Pui Chow, Lucas Hui, Chunxiao Wang, Lijuan Chen, Zhenya Chen, Jenny Chen
285-295

21


Data Recovery Function Testing for Digital Forensic Tools
Yinghua Guo, Jill Slay
297-311