IFIP TC6 Open Digital Library

Digital Forensics 2010: Hong Kong, China

Advances in Digital Forensics VI - Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China, January 4-6, 2010, Revised Selected Papers

Kam-Pui Chow, Sujeet Shenoi

Springer, IFIP Advances in Information and Communication Technology 337, ISBN: 978-3-642-15505-5



Contents

Themes and Issues

A History of Digital Forensics.

Mark Pollitt

 3-15

Toward a Science of Digital Forensic Evidence Examination.

Fred Cohen

 17-35

Using a Local Search Warrant to Acquire Evidence Stored Overseas via the Internet.

Kenny Wang

 37-48

An Analysis of the Green Dam Youth Escort Software.

Frankie Li, Hilton Chan, Kam-Pui Chow, Pierre K. Y. Lai

 49-62

Forensic Techniques

Forensic Analysis of a PlayStation 3 Console.

Scott Conrad, Greg Dorn, Philip Craiger

 65-76

A Consistency Study of the Windows Registry.

Yuandong Zhu, Joshua James, Pavel Gladyshev

 77-90

Forensic Tracking and Mobility Prediction in Vehicular Networks.

Saif Al-Kuwari, Stephen D. Wolthusen

 91-105

A Forensic Readiness Model for Wireless Networks.

Sipho Ngobeni, Hein S. Venter, Ivan Burke

 107-117

Internet Crime Investigations

Evaluation of Evidence in Internet Auction Fraud Investigations.

Michael Y. K. Kwan, Richard E. Overill, Kam-Pui Chow, Jantje A. M. Silomon, Hayson Tse, Frank Y. W. Law, Pierre K. Y. Lai

 121-132

Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services.

Murat Gunestas, Murad Mehmet, Duminda Wijesekera

 133-150

Identifying First Seeders in Foxy Peer-to-Peer Networks.

Ricci S. C. Ieong, Pierre K. Y. Lai, Kam-Pui Chow, Michael Y. K. Kwan, Frank Y. W. Law

 151-168

Live Forensics

Uncertainty in Live Forensics.

Antonio Savoldi, Paolo Gubian, Isao Echizen

 171-184

Identifying Volatile Data from Multiple Memory Dumps in Live Forensics.

Frank Y. W. Law, Patrick P. F. Chan, Siu-Ming Yiu, Benjamin Tang, Pierre K. Y. Lai, Kam-Pui Chow, Ricci S. C. Ieong, Michael Y. K. Kwan, Wing-Kai Hon, Lucas Chi Kwong Hui

 185-194

A Compiled Memory Analysis Tool.

James S. Okolica, Gilbert L. Peterson

 195-204

Advanced Forensice Techniques

Data Fingerprinting with Similarity Digests.

Vassil Roussev

 207-226

Refining Evidence Containers for Provenance and Accurate Data Representation.

Bradley Schatz, Michael Cohen

 227-242

Virtual Expansion of Rainbow Tables.

Vrizlynn L. L. Thing

 243-256

Digital Watermarking of Virtual Machine Images.

Kumiko Tadano, Masahiro Kawato, Ryo Furukawa, Fumio Machida, Yoshiharu Maeno

 257-268

A Visualization System for Analyzing Information Leakage.

Yuki Nakayama, Seiji Shibaguchi, Ken-ichi Okada

 269-282

Forensic Tools

Forensic Analysis of Popular Chinese Internet Applications.

Ying Yang, Kam-Pui Chow, Lucas Chi Kwong Hui, Chunxiao Wang, Lijuan Chen, Zhenya Chen, Jenny Chen

 285-295

Data Recovery Function Testing for Digital Forensic Tools.

Yinghua Guo, Jill Slay

 297-311