No abstract available.
Windows NT pagefile.sys Virtual Memory Analysis
As hard disk encryption, RAM disks, persistent data avoidance technology and memory resident malware become morewidespread, memory analysis becomes more important. In order to provide more virtual memory than is actually physicalpresent on a system, an ...
Recovery of SQLite Data Using Expired Indexes
SQLite databases have tremendous forensic potential. In addition to active data, expired data remain in the database file, if the option secure delete is not applied. Tests of available forensic tools show, that the indexes were not considered, although ...
Improving the Detection of Encrypted Data on Storage Devices
The detection of persistently stored encrypted data plays an increasingly important role in digital forensics. This is especially true during live analysis of IT systems, when the encrypted data structures are temporarily decrypted in main memory and ...
What is Essential Data in Digital Forensic Analysis?
In his seminal work on file system forensic analysis, Carrier defined the notion of essential data as "those that areneeded to save and retrieve files." He argues that essential data is therefore more trustworthy since it has to be correctin order for ...
Towards Automated Incident Handling: How to Select an Appropriate Response against a Network-Based Attack?
The increasing amount of network-based attacks evolved to one of the top concerns responsible for network infrastructure and service outages. In order to counteract these threats, computer networks are monitored to detect malicious traffic and initiate ...
Mobile Payment Fraud: A Practical View on the Technical Architecture and Starting Points for Forensic Analysis of New Attack Scenarios
- Christof Kier,
- Gerald Madlmayr,
- Alexander Nawratil,
- Michael Schafferer,
- Christian Schanes,
- Thomas Grechenig
As payment cards and mobile devices are equipped with Near Field Communication (NFC) technology, electronic paymenttransactions at physical Point of Sale (POS) environments are changing. Payment transactions do not require the customerto insert their ...
Characteristic Evidence, Counter Evidence and Reconstruction Problems in Forensic Computing
Historically, forensic computing (as digital forensics) developed pragmatically, driven by specific technical needs. Indeed, in comparison with other forensic sciences the field still is rather immature and has many deficits, such as the unclear ...
Supporting Forensic Design - A Course Profile to Teach Forensics
There is a growing demand for experts with a dedicated knowledge of forensics, especially in the domain of digital and digitised forensics, besides a general shortage of teaching of digital forensics. Further, there is prominent lack of standardisation ...
Conception of a Master Course for IT and Media Forensics Part II: Android Forensics
The growth of Android in the mobile sector and the interest to investigate these devices from a forensic point of view has rapidly increased. Many companies have security problems with mobile devices in their own IT infrastructure. To respond to these ...
Platform Independent Malware Analysis Framework
Over the past years malicious software has evolved to a persistent threat on all major computer platforms. Due tothe high number of new threats which are released every day security researchers have developed automatic systems toanalyze and classify ...
Smart Home Definition and Security Threats
The home of the future should be a smart one, to support us in our daily life. Up to now only a few security incidents in that area are known. Depending on different security analyses, this fact is rather a result of the low spread of Smart Home ...
Latent Fingerprint Aging from a Hyperspectral Perspective: First Qualitative Degradation Studies Using UV/VIS Spectroscopy
Latent print age estimation is an important topic in the emerging field of digitized crime scene forensics. While several capturing devices have recently been studied towards this goal, hyperspectral imaging in the UV/VIS (ultraviolet and visible light) ...