Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/IMF.2009.19guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Self-Forensics Through Case Studies of Small-to-Medium Software Systems

Published: 15 September 2009 Publication History

Abstract

The notion and definition of self-forensics was introduced by Mokhov to encompass software and hardware capabilities for autonomic and other systems to record their own states, events, and others encoded in a forensic form suitable for (potentially automated) forensic analysis, evidence modeling and specification, and event reconstruction for various system components. For self-forensics, “self-dissection” is possible for analysis using a standard language and decision making if the system includes such a self-forensic subsystem. The self-forensic evidence is encoded in a cyberforensic investigation case and event reconstruction language, Forensic Lucid. The encoding of the stories depicted by the evidence comprise a context as a first-class value of a Forensic Lucid “program”, after which an investigator models the case describing relationships between various events and pieces of information. It is important to get the context right for the case to have a meaning and the proper meaning computation, so we perform case studies of some small-to-medium, distributed and not, primarily academic open-source software systems. In this work, for the purpose of implementation of the small self-forensic modules for the data structures and event flow, we specify the requirements of what the context should be for those systems. The systems share in common the base programming language – Java, so our self-forensic logging of the Java data structures and events as Forensic Lucid context specification expressions is laid out ready for an investigator to examine and model the case.

Cited By

View all
  • (2010)Evolution of MARF and its NLP frameworkProceedings of the Third C* Conference on Computer Science and Software Engineering10.1145/1822327.1822344(118-122)Online publication date: 19-May-2010
  • (2010)Towards a self-forensics property in the ASSL toolsetProceedings of the Third C* Conference on Computer Science and Software Engineering10.1145/1822327.1822342(108-113)Online publication date: 19-May-2010
  • (2010)Towards automatic deduction and event reconstruction using Forensic Lucid and probabilities to encode the IDS evidenceProceedings of the 13th international conference on Recent advances in intrusion detection10.1007/978-3-642-15512-3_36(508-509)Online publication date: 15-Sep-2010
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
IMF '09: Proceedings of the 2009 Fifth International Conference on IT Security Incident Management and IT Forensics
September 2009
163 pages
ISBN:9780769538075

Publisher

IEEE Computer Society

United States

Publication History

Published: 15 September 2009

Author Tags

  1. Cryptolysis
  2. DMARF
  3. Forensic Lucid
  4. GIPS
  5. JDSF
  6. context-aware forensic computing
  7. intensional programming
  8. self-forensics
  9. specification

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2010)Evolution of MARF and its NLP frameworkProceedings of the Third C* Conference on Computer Science and Software Engineering10.1145/1822327.1822344(118-122)Online publication date: 19-May-2010
  • (2010)Towards a self-forensics property in the ASSL toolsetProceedings of the Third C* Conference on Computer Science and Software Engineering10.1145/1822327.1822342(108-113)Online publication date: 19-May-2010
  • (2010)Towards automatic deduction and event reconstruction using Forensic Lucid and probabilities to encode the IDS evidenceProceedings of the 13th international conference on Recent advances in intrusion detection10.1007/978-3-642-15512-3_36(508-509)Online publication date: 15-Sep-2010
  • (2009)Simple dynamic key management in SQL randomizationProceedings of the 3rd international conference on New technologies, mobility and security10.1109/NTMS.2009.5384673(458-462)Online publication date: 20-Dec-2009

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media