Table of Contents
|
Advances in Digital Forensics XI Gilbert Peterson, Sujeet Shenoi (Eds.)
|
Front Matter |
THEMES AND ISSUES
|
A TALE OF TWO TRACES – DIPLOMATICS AND FORENSICS Fred Cohen |
3-27 |
NOTIONS OF HYPOTHESIS IN DIGITAL FORENSICS Segen Tewelde, Stefan Gruner, Martin Olivier |
29-43 |
USING YIN’S APPROACH TO CASE STUDIES AS A PARADIGM FOR CONDUCTING EXAMINATIONS Oluwasayo Oyelami, Martin Olivier |
45-59 |
AN INFORMATION EXTRACTION FRAMEWORK FOR DIGITAL FORENSIC INVESTIGATIONS Min Yang, Kam-Pui Chow |
61-76 |
INTERNET CRIME INVESTIGATIONS
|
A GRAPH-BASED INVESTIGATION OF BITCOIN TRANSACTIONS Chen Zhao, Yong Guan |
79-95 |
PROFILING AND TRACKING A CYBERLOCKER LINK SHARER IN A PUBLIC WEB FORUM Xiao-Xi Fan, Kam-Pui Chow, Fei Xu |
97-113 |
A PRIVACY-PRESERVING ENCRYPTION SCHEME FOR AN INTERNET REALNAME REGISTRATION SYSTEM Fei Xu, Ken Yau, Ping Zhang, Kam-Pui Chow |
115-128 |
A LOGIC-BASED NETWORK FORENSIC MODEL FOR EVIDENCE ANALYSIS Changwei Liu, Anoop Singhal, Duminda Wijesekera |
129-145 |
FORENSIC TECHNIQUES
|
CHARACTERISTICS OF MALICIOUS DLLS IN WINDOWS MEMORY Dae Glendowne, Cody Miller, Wesley Mcgrew, David Dampier |
149-161 |
DETERMINING TRIGGER INVOLVEMENT DURING FORENSIC ATTRIBUTION IN DATABASES Werner Hauger, Martin Olivier |
163-177 |
USING INTERNAL MySQL/InnoDB B-TREE INDEX NAVIGATION FOR DATA HIDING Peter Fruhwirt, Peter Kieseberg, Edgar Weippl |
179-194 |
IDENTIFYING PASSWORDS STORED ON DISK Shiva Houshmand, Sudhir Aggarwal, Umit Karabiyik |
195-213 |
FRAGMENTED JPEG FILE RECOVERY USING PSEUDO HEADERS Yanbin Tang, Zheng Tan, Kam-Pui Chow, Siu-Ming Yiu, Junbin Fang, Xiamu Niu, Qi Han, Xianyan Wu |
215-231 |
MOBILE DEVICE FORENSICS
|
FORENSIC-READY SECURE iOS APPS FOR JAILBROKEN iPHONES Jayaprakash Govindaraj, Rashmi Mata, Robin Verma, Gaurav Gupta |
235-249 |
A FRAMEWORK FOR DESCRIBING MULTIMEDIA CIRCULATION IN A SMARTPHONE ECOSYSTEM Panagiotis Andriotis, Theo Tryfonas, George Oikonomou, Irwin King |
251-267 |
CLOUD FORENSICS
|
A TRUSTWORTHY CLOUD FORENSICS ENVIRONMENT Shams Zawoad, Ragib Hasan |
271-285 |
LOCATING AND TRACKING DIGITAL OBJECTS IN THE CLOUD Philip Trenwith, Hein Venter |
287-301 |
FORENSIC TOOLS
|
A TOOL FOR EXTRACTING STATIC AND VOLATILE FORENSIC ARTIFACTS OF WINDOWS 8.x APPS Shariq Murtuza, Robin Verma, Jayaprakash Govindaraj, Gaurav Gupta |
305-320 |
CRITERIA FOR VALIDATING SECURE WIPING TOOLS Muhammad Zareen, Baber Aslam, Monis Akhlaq |
321-339 |
DO DATA LOSS PREVENTION SYSTEMS REALLY WORK? Sara Ghorbanian, Glenn Fryklund, Stefan Axelsson |
341-357 |