Full Text Documents

Search


Table of Contents
Advances in Digital Forensics XI
Gilbert Peterson, Sujeet Shenoi (Eds.)
Front Matter

THEMES AND ISSUES


A TALE OF TWO TRACES – DIPLOMATICS AND FORENSICS
Fred Cohen
3-27
NOTIONS OF HYPOTHESIS IN DIGITAL FORENSICS
Segen Tewelde, Stefan Gruner, Martin Olivier
29-43
USING YIN’S APPROACH TO CASE STUDIES AS A PARADIGM FOR CONDUCTING EXAMINATIONS
Oluwasayo Oyelami, Martin Olivier
45-59
AN INFORMATION EXTRACTION FRAMEWORK FOR DIGITAL FORENSIC INVESTIGATIONS
Min Yang, Kam-Pui Chow
61-76

INTERNET CRIME INVESTIGATIONS


A GRAPH-BASED INVESTIGATION OF BITCOIN TRANSACTIONS
Chen Zhao, Yong Guan
79-95
PROFILING AND TRACKING A CYBERLOCKER LINK SHARER IN A PUBLIC WEB FORUM
Xiao-Xi Fan, Kam-Pui Chow, Fei Xu
97-113
A PRIVACY-PRESERVING ENCRYPTION SCHEME FOR AN INTERNET REALNAME REGISTRATION SYSTEM
Fei Xu, Ken Yau, Ping Zhang, Kam-Pui Chow
115-128
A LOGIC-BASED NETWORK FORENSIC MODEL FOR EVIDENCE ANALYSIS
Changwei Liu, Anoop Singhal, Duminda Wijesekera
129-145

FORENSIC TECHNIQUES


CHARACTERISTICS OF MALICIOUS DLLS IN WINDOWS MEMORY
Dae Glendowne, Cody Miller, Wesley Mcgrew, David Dampier
149-161
DETERMINING TRIGGER INVOLVEMENT DURING FORENSIC ATTRIBUTION IN DATABASES
Werner Hauger, Martin Olivier
163-177
USING INTERNAL MySQL/InnoDB B-TREE INDEX NAVIGATION FOR DATA HIDING
Peter Fruhwirt, Peter Kieseberg, Edgar Weippl
179-194
IDENTIFYING PASSWORDS STORED ON DISK
Shiva Houshmand, Sudhir Aggarwal, Umit Karabiyik
195-213
FRAGMENTED JPEG FILE RECOVERY USING PSEUDO HEADERS
Yanbin Tang, Zheng Tan, Kam-Pui Chow, Siu-Ming Yiu, Junbin Fang, Xiamu Niu, Qi Han, Xianyan Wu
215-231

MOBILE DEVICE FORENSICS


FORENSIC-READY SECURE iOS APPS FOR JAILBROKEN iPHONES
Jayaprakash Govindaraj, Rashmi Mata, Robin Verma, Gaurav Gupta
235-249
A FRAMEWORK FOR DESCRIBING MULTIMEDIA CIRCULATION IN A SMARTPHONE ECOSYSTEM
Panagiotis Andriotis, Theo Tryfonas, George Oikonomou, Irwin King
251-267

CLOUD FORENSICS


A TRUSTWORTHY CLOUD FORENSICS ENVIRONMENT
Shams Zawoad, Ragib Hasan
271-285
LOCATING AND TRACKING DIGITAL OBJECTS IN THE CLOUD
Philip Trenwith, Hein Venter
287-301

FORENSIC TOOLS


A TOOL FOR EXTRACTING STATIC AND VOLATILE FORENSIC ARTIFACTS OF WINDOWS 8.x APPS
Shariq Murtuza, Robin Verma, Jayaprakash Govindaraj, Gaurav Gupta
305-320
CRITERIA FOR VALIDATING SECURE WIPING TOOLS
Muhammad Zareen, Baber Aslam, Monis Akhlaq
321-339
DO DATA LOSS PREVENTION SYSTEMS REALLY WORK?
Sara Ghorbanian, Glenn Fryklund, Stefan Axelsson
341-357

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/