Abstract
With the increased use of Internet and information technology all over the world, there is an increased amount of criminal activities that involve computing and digital data. These digital crimes (e-crimes) impose new challenges on prevention, detection, investigation, and prosecution of the corresponding offences. Computer forensics (also known as cyberforensics) is an emerging research area that applies computer investigation and analysis techniques to help detection of these crimes and gathering of digital evidence suitable for presentation in courts. This new area combines the knowledge of information technology, forensics science, and law and gives rise to a number of interesting and challenging problems related to computer security and cryptography that are yet to be solved. In this paper, we present and discuss some of these problems together with two successful cases of computer forensics technology developed in Hong Kong that enable the law enforcement departments to detect and investigate digital crimes more efficiently and effectively. We believe that computer forensics research is an important area in applying security and computer knowledge to build a better society.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Adelstein, F.: Live forensics: Diagnosing your system without killing it first. Communications of the ACM 49(2), 63–66 (2006)
Census and The Government of Hong Kong Special Administrative Region Statistics Department. Hong kong in figures, 2006 edition (2006)
Chow, K.P., et al.: A rule-based bt monitoring scheme for detecting copyright infringement activities. Manuscript in preparation (2007)
Chow, K.P., et al.: Digital evidence search kit. In: Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 187–194 (2005)
The Government of Hong Kong Special Administrative Region Hong Kong Police. Technology crime statistics in Hong Kong (2005)
IFPI. Ifpi external press pack (2005)
The Government of Hong Kong Special Administrative Region Intellectual Property Department. Awareness of protection of intellectual property rights increases (2006)
Karagiannis, T., et al.: Is P2P dying or just hiding? In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’04), vol. 3, pp. 1532–1538 (2004)
Moore, D., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. In: Proceedings of the 10th USENIX Security Conference, pp. 9–22 (2001)
Hong Kong Ordinances. Evidence ordinance. Chapter 8
Parker, A.: Peer-to-peer in 2005. CacheLogic Research (2005)
Schneier, B., Kelsey, J.: Secure audit logs to support computer forensics. ACM Transactions on Information and System Security 2(2), 159–176 (1999)
Vixie, P., Sneeringer, G., Schleifer, M.: Event report. Events of 21-oct-2002 (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Hui, L.C.K., Chow, K.P., Yiu, S.M. (2007). Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper). In: Dawson, E., Wong, D.S. (eds) Information Security Practice and Experience. ISPEC 2007. Lecture Notes in Computer Science, vol 4464. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72163-5_2
Download citation
DOI: https://doi.org/10.1007/978-3-540-72163-5_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72159-8
Online ISBN: 978-3-540-72163-5
eBook Packages: Computer ScienceComputer Science (R0)