Table of Contents
|
Advances in Digital Forensics XIX Gilbert Peterson, Sujeet Shenoi |
Front Matter |
Mobile Device Forensics
|
Forensic Analysis of the iOS Apple Pay Mobile Payment System Trevor Nicholson, Darren Hayes, Nhien-An Le-Khac |
3-19 |
Forensic Analysis of Android Cryptocurrency Wallet Applications Chen Shi, Yong Guan |
21-36 |
An Anti-Fuzzing Approach for Android Apps Chris Chao-Chun Cheng, Li Lin, Chen Shi, Yong Guan |
37-53 |
Nintendo 3DS Forensic Examination Tools Konstantinos Xynos, Huw Read, Iain Sutherland, Matthew Bovee, Trang Do |
55-70 |
Forensic Data Collection
|
Revealing Human Attacker Behaviors Using an Adaptive Internet of Things Honeypot Ecosystem Armin Ziaie Tabari, Guojun Liu, Xinming Ou, Anoop Singhal |
73-90 |
Towards Direct-Control Data Acquisition by Nano-Probing Non-Volatile Memory Cells Shawn Mckay, Nathan Hutchins, Steven Baskerville, Sujeet Shenoi |
91-122 |
Image and Video Forensics
|
Using Perceptual Hashing for Targeted Content Scanning Leon Twenning, Harald Baier, Thomas Göbel |
125-142 |
Analysis of Document Security Features Pulkit Garg, Saheb Chhabra, Garima Gupta, Vishal Srivastava, Gaurav Gupta |
143-159 |
Deepfake Detection Using Multiple Facial Features Xinzhe Wang, Duohe Ma, Liming Wang, Zhitong Lu, Zhenchao Zhang, Junye Jiang |
161-175 |
Novel Applications
|
Identifying Superspreaders by Ranking System Object Instance Graphs Rajani Suryavanshi, Xiaoyan Sun, Jun Dai |
179-201 |
A Dynamic Malicious Document Detection Method Based on Multi-Memory Features Yuanyuan Wang, Gengwang Li, Min Yu, Kam-Pui Chow, Jianguo Jiang, Xiang Meng, Weiqing Huang |
203-218 |
Traceable Transformer-Based Anomaly Detection for a Water Treatment System Shenzhi Qin, Yubo Lang, Kam-Pui Chow |
219-234 |
Legal Issues and Applications
|
Evolution of Global Digital Forensics Laws and Emergent Challenges Kaushik Thinnaneri Ganesan |
237-248 |
A Blockchain Model for Sharing Information in Criminal Justice Systems Pardon Ramazhamba, Hein Venter |
249-266 |