Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/2863693guideproceedingsBook PagePublication PagesConference Proceedingsacm-pubtype
IMF '15: Proceedings of the 2015 Ninth International Conference on IT Security Incident Management & IT Forensics (imf 2015)
2015 Proceeding
Publisher:
  • IEEE Computer Society
  • 1730 Massachusetts Ave., NW Washington, DC
  • United States
Conference:
May 18 - 20, 2015
ISBN:
978-1-4799-9903-3
Published:
18 May 2015

Reflects downloads up to 26 Jan 2025Bibliometrics
Abstract

No abstract available.

Skip Table Of Content Section
Article
Cover Art
Article
Article
Title Page iii
Article
Article
Preface
Article
Conference Organization
Article
Windows NT pagefile.sys Virtual Memory Analysis

As hard disk encryption, RAM disks, persistent data avoidance technology and memory resident malware become morewidespread, memory analysis becomes more important. In order to provide more virtual memory than is actually physicalpresent on a system, an ...

Article
Recovery of SQLite Data Using Expired Indexes

SQLite databases have tremendous forensic potential. In addition to active data, expired data remain in the database file, if the option secure delete is not applied. Tests of available forensic tools show, that the indexes were not considered, although ...

Article
Improving the Detection of Encrypted Data on Storage Devices

The detection of persistently stored encrypted data plays an increasingly important role in digital forensics. This is especially true during live analysis of IT systems, when the encrypted data structures are temporarily decrypted in main memory and ...

Article
What is Essential Data in Digital Forensic Analysis?

In his seminal work on file system forensic analysis, Carrier defined the notion of essential data as "those that areneeded to save and retrieve files." He argues that essential data is therefore more trustworthy since it has to be correctin order for ...

Article
Towards Automated Incident Handling: How to Select an Appropriate Response against a Network-Based Attack?

The increasing amount of network-based attacks evolved to one of the top concerns responsible for network infrastructure and service outages. In order to counteract these threats, computer networks are monitored to detect malicious traffic and initiate ...

Article
Mobile Payment Fraud: A Practical View on the Technical Architecture and Starting Points for Forensic Analysis of New Attack Scenarios

As payment cards and mobile devices are equipped with Near Field Communication (NFC) technology, electronic paymenttransactions at physical Point of Sale (POS) environments are changing. Payment transactions do not require the customerto insert their ...

Article
Characteristic Evidence, Counter Evidence and Reconstruction Problems in Forensic Computing

Historically, forensic computing (as digital forensics) developed pragmatically, driven by specific technical needs. Indeed, in comparison with other forensic sciences the field still is rather immature and has many deficits, such as the unclear ...

Article
Supporting Forensic Design - A Course Profile to Teach Forensics

There is a growing demand for experts with a dedicated knowledge of forensics, especially in the domain of digital and digitised forensics, besides a general shortage of teaching of digital forensics. Further, there is prominent lack of standardisation ...

Article
Conception of a Master Course for IT and Media Forensics Part II: Android Forensics

The growth of Android in the mobile sector and the interest to investigate these devices from a forensic point of view has rapidly increased. Many companies have security problems with mobile devices in their own IT infrastructure. To respond to these ...

Article
Platform Independent Malware Analysis Framework

Over the past years malicious software has evolved to a persistent threat on all major computer platforms. Due tothe high number of new threats which are released every day security researchers have developed automatic systems toanalyze and classify ...

Article
Smart Home Definition and Security Threats

The home of the future should be a smart one, to support us in our daily life. Up to now only a few security incidents in that area are known. Depending on different security analyses, this fact is rather a result of the low spread of Smart Home ...

Article
Latent Fingerprint Aging from a Hyperspectral Perspective: First Qualitative Degradation Studies Using UV/VIS Spectroscopy

Latent print age estimation is an important topic in the emerging field of digitized crime scene forensics. While several capturing devices have recently been studied towards this goal, hyperspectral imaging in the UV/VIS (ultraviolet and visible light) ...

Article
Author Index
Article
Roster Page

Recommendations