Table of Contents
|
Advances in Digital Forensics VI Kam-Pui Chow, Sujeet Shenoi |
Front Matter |
THEMES AND ISSUES
|
A History of Digital Forensics Mark Pollitt |
3-15 |
Toward a Science of Digital Forensic Evidence Examination Fred Cohen |
17-35 |
Using a Local Search Warrant to Acquire Evidence Stored Overseas via the Internet Kenny Wang |
37-48 |
An Analysis of the Green Dam Youth Escort Software Frankie Li, Hilton Chan, Kam-Pui Chow, Pierre Lai |
49-62 |
FORENSIC TECHNIQUES
|
Forensic Analysis of a PlayStation 3 Console Scott Conrad, Greg Dorn, Philip Craiger |
65-76 |
A Consistency Study of the Windows Registry Yuandong Zhu, Joshua James, Pavel Gladyshev |
77-90 |
Forensic Tracking and Mobility Prediction in Vehicular Networks Saif Al-Kuwari, Stephen Wolthusen |
91-105 |
A Forensic Readiness Model for Wireless Networks Sipho Ngobeni, Hein Venter, Ivan Burke |
107-117 |
INTERNET CRIME INVESTIGATIONS
|
Evaluation of Evidence in Internet Auction Fraud Investigations Michael Kwan, Richard Overill, Kam-Pui Chow, Jantje Silomon, Hayson Tse, Frank Law, Pierre Lai |
121-132 |
Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services Murat Gunestas, Murad Mehmet, Duminda Wijesekera |
133-150 |
Identifying First Seeders in Foxy Peer-to-Peer Networks Ricci Ieong, Pierre Lai, Kam-Pui Chow, Michael Kwan, Frank Law |
151-168 |
LIVE FORENSICS
|
Uncertainty in Live Forensics Antonio Savoldi, Paolo Gubian, Isao Echizen |
171-184 |
Identifying Volatile Data from Multiple Memory Dumps in Live Forensics Frank Law, Patrick Chan, Siu-Ming Yiu, Benjamin Tang, Pierre Lai, Kam-Pui Chow, Ricci Ieong, Michael Kwan, Wing-Kai Hon, Lucas Hui |
185-194 |
A Compiled Memory Analysis Tool James Okolica, Gilbert Peterson |
195-204 |
ADVANCED FORENSIC TECHNIQUES
|
Data Fingerprinting with Similarity Digests Vassil Roussev |
207-226 |
Refining Evidence Containers for Provenance and Accurate Data Representation Bradley Schatz, Michael Cohen |
227-242 |
Virtual Expansion of Rainbow Tables Vrizlynn Thing |
243-256 |
Digital Watermarking of Virtual Machine Images Kumiko Tadano, Masahiro Kawato, Ryo Furukawa, Fumio Machida, Yoshiharu Maeno |
257-268 |
A Visualization System for Analyzing Information Leakage Yuki Nakayama, Seiji Shibaguchi, Kenichi Okada |
269-282 |
FORENSIC TOOLS
|
Forensic Analysis of Popular Chinese Internet Applications Ying Yang, Kam-Pui Chow, Lucas Hui, Chunxiao Wang, Lijuan Chen, Zhenya Chen, Jenny Chen |
285-295 |
Data Recovery Function Testing for Digital Forensic Tools Yinghua Guo, Jill Slay |
297-311 |