index - Advances in Digital Forensics XIII
   


Full Text Documents

16

Search


Table of Contents
Advances in Digital Forensics XIII
Gilbert Peterson, Sujeet Shenoi
Front Matter

Themes and Issues


Establishing Findings in Digital Forensic Examinations: A Case Study Method
Oluwasayo Oyelami, Martin Olivier
3-21
A Model for Digital Evidence Admissibility Assessment
Albert Antwi-Boasiako, Hein Venter
23-38

Mobile and Embedded Device Forensics


Evaluating the Authenticity of Smartphone Evidence
Heloise Pieterse, Martin Olivier, Renier Heerden
41-61
Forensic Evaluation of an Amazon Fire TV Stick
Logan Morrison, Huw Read, Konstantinos Xynos, Iain Sutherland
63-79
Detecting Anomalous Programmable Logic Controller Events Using Machine Learning
Ken Yau, Kam-Pui Chow
81-94

Network and Cloud Forensics


A Forensic Methodology for Software-Defined Network Switches
Tommy Chin, Kaiqi Xiong
97-110
Identifying Evidence for Cloud Forensic Analysis
Changwei Liu, Anoop Singhal, Duminda Wijesekera
111-130

Threat Detection and Mitigation


Digital Forensic Implications of Collusion Attacks on the Lightning Network
Dmytro Piatkivskyi, Stefan Axelsson, Mariusz Nowostawski
133-147
Insider Threat Detection Using Time-Series-Based Raw Disk Forensic Analysis
Nicole Beebe, Lishu Liu, Zi Ye
149-167
Anti-Forensic Threat Modeling
Bruno Hoelz, Marcelo Maues
169-183

Malware Forensics


A Behavior-Based Approach for Malware Detection
Rayan Mosli, Rui Li, Bo Yuan, Yin Pan
187-201
Categorizing Mobile Device Malware Based on System Side-Effects
Zachary Grimmett, Jason Staggs, Sujeet Shenoi
203-219

Image Forensics


Semantic Video Carving Using Perceptual Hashing and Optical Flow
Sijin Li, Guikai Xi, Zoe Jiang, Siu-Ming Yiu, Liyang Yu, Xuan Wang, Qi Han, Qiong Li
223-244
Detecting Fraudulent Bank Checks
Saheb Chhabra, Garima Gupta, Monika Gupta, Gaurav Gupta
245-266

Forensic Techniques


Automated Collection and Correlation of File Provenance Information
Ryan Good, Gilbert Peterson
269-284
Using Personal Information in Targeted Grammar-Based Probabilistic Password Attacks
Shiva Houshmand, Sudhir Aggarwal
285-303

 

 


Designed by Inria-IES Team : http://hal.inria.fr/    Hosted by HAL : http://hal.archives-ouvertes.fr/