Table of Contents
|
Advances in Digital Forensics XV Gilbert Peterson, Sujeet Shenoi |
Front Matter |
Forensic Models
|
A Holistic Forensic Model for the Internet of Things Lakshminarayana Sadineni, Emmanuel Pilli, Ramesh Battula |
3-18 |
Implementing the Harmonized Model for Digital Evidence Admissibility Assessment Albert Antwi-Boasiako, Hein Venter |
19-36 |
Mobile and Embedded Device Forensics
|
Classifying the Authenticity of Evaluated Smartphone Data Heloise Pieterse, Martin Olivier, Renier Heerden |
39-57 |
Retrofitting Mobile Devices for Capturing Memory-Resident Malware Based on System Side-Effects Zachary Grimmett, Jason Staggs, Sujeet Shenoi |
59-72 |
A Targeted Data Extraction System for Mobile Devices Sudhir Aggarwal, Gokila Dorai, Umit Karabiyik, Tathagata Mukherjee, Nicholas Guerra, Manuel Hernandez, James Parsons, Khushboo Rathi, Hongmei Chi, Temilola Aderibigbe, Rodney Wilson |
73-100 |
Exploiting Vendor-Defined Messages in the USB Power Delivery Protocol Gunnar Alendal, Stefan Axelsson, Geir Dyrkolbotn |
101-118 |
Detecting Anomalies in Programmable Logic Controllers Using Unsupervised Machine Learning Chun-Fai Chan, Kam-Pui Chow, Cesar Mak, Raymond Chan |
119-130 |
Filesystem Forensics
|
Creating a Map of User Data in NTFS to Improve File Carving Martin Karresand, Asalena Warnqvist, David Lindahl, Stefan Axelsson, Geir Dyrkolbotn |
133-158 |
Analyzing Windows Subsystem for Linux Metadata to Detect Timestamp Forgery Bhupendra Singh, Gaurav Gupta |
159-182 |
Image Forensics
|
Quick Response Encoding of Human Facial Images for Identity Fraud Detection Shweta Singh, Saheb Chhabra, Garima Gupta, Monika Gupta, Gaurav Gupta |
185-199 |
Using Neural Networks for Fake Colorized Image Detection Yuze Li, Yaping Zhang, Liangfu Lu, Yongheng Jia, Jingcheng Liu |
201-215 |
Forensic Techniques
|
Digital Forensic Atomic Force Microscopy of Semiconductor Memory Arrays Struan Gray, Stefan Axelsson |
219-237 |
Timeline Visualization of Keywords Wynand Staden |
239-252 |
Determining the Forensic Data Requirements for Investigating Hypervisor Attacks Changwei Liu, Anoop Singhal, Ramaswamy Chandramouli, Duminda Wijesekera |
253-272 |