Table of Contents
|
Advances in Digital Forensics XIII Gilbert Peterson, Sujeet Shenoi |
Front Matter |
Themes and Issues
|
Establishing Findings in Digital Forensic Examinations: A Case Study Method Oluwasayo Oyelami, Martin Olivier |
3-21 |
A Model for Digital Evidence Admissibility Assessment Albert Antwi-Boasiako, Hein Venter |
23-38 |
Mobile and Embedded Device Forensics
|
Evaluating the Authenticity of Smartphone Evidence Heloise Pieterse, Martin Olivier, Renier Heerden |
41-61 |
Forensic Evaluation of an Amazon Fire TV Stick Logan Morrison, Huw Read, Konstantinos Xynos, Iain Sutherland |
63-79 |
Detecting Anomalous Programmable Logic Controller Events Using Machine Learning Ken Yau, Kam-Pui Chow |
81-94 |
Network and Cloud Forensics
|
A Forensic Methodology for Software-Defined Network Switches Tommy Chin, Kaiqi Xiong |
97-110 |
Identifying Evidence for Cloud Forensic Analysis Changwei Liu, Anoop Singhal, Duminda Wijesekera |
111-130 |
Threat Detection and Mitigation
|
Digital Forensic Implications of Collusion Attacks on the Lightning Network Dmytro Piatkivskyi, Stefan Axelsson, Mariusz Nowostawski |
133-147 |
Insider Threat Detection Using Time-Series-Based Raw Disk Forensic Analysis Nicole Beebe, Lishu Liu, Zi Ye |
149-167 |
Anti-Forensic Threat Modeling Bruno Hoelz, Marcelo Maues |
169-183 |
Malware Forensics
|
A Behavior-Based Approach for Malware Detection Rayan Mosli, Rui Li, Bo Yuan, Yin Pan |
187-201 |
Categorizing Mobile Device Malware Based on System Side-Effects Zachary Grimmett, Jason Staggs, Sujeet Shenoi |
203-219 |
Image Forensics
|
Semantic Video Carving Using Perceptual Hashing and Optical Flow Sijin Li, Guikai Xi, Zoe Jiang, Siu-Ming Yiu, Liyang Yu, Xuan Wang, Qi Han, Qiong Li |
223-244 |
Detecting Fraudulent Bank Checks Saheb Chhabra, Garima Gupta, Monika Gupta, Gaurav Gupta |
245-266 |
Forensic Techniques
|
Automated Collection and Correlation of File Provenance Information Ryan Good, Gilbert Peterson |
269-284 |
Using Personal Information in Targeted Grammar-Based Probabilistic Password Attacks Shiva Houshmand, Sudhir Aggarwal |
285-303 |