Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery,
2010
Tokyo Denki University
Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki
Journal of Digital Forensics, Security and Law
These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve …
Digital Records Forensics: A New Science And Academic Program For Forensic Readiness,
2010
The University of British Columbia
Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky
Journal of Digital Forensics, Security and Law
This paper introduces the Digital Records Forensics project, a research endeavour located at the University of British Columbia in Canada and aimed at the development of a new science resulting from the integration of digital forensics with diplomatics, archival science, information science and the law of evidence, and of an interdisciplinary graduate degree program, called Digital Records Forensics Studies, directed to professionals working for law enforcement agencies, legal firms, courts, and all kind of institutions and business that require their services. The program anticipates the need for organizations to become “forensically ready,” defined by John Tan as “maximizing the ability …
Book Review: Digital Forensic Evidence Examination (2nd Ed.),
2010
Gary Kessler Associates
Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler
Journal of Digital Forensics, Security and Law
On the day that I sat down to start to write this review, the following e-mail came across on one of my lists: Person A and Person B write back and forth and create an email thread. Person A then forwards the email to Person C, but changes some wording in the email exchange between A & B. What is the easiest way (and is it even possible) to find out when that earlier email message was altered before sent to Person C? Before you try to answer these questions, read Fred Cohen's Digital Forensic Evidence Examination. His book won't …
Table Of Contents,
2010
Embry-Riddle Aeronautical University
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Reeling In Big Phish With A Deep Md5 Net,
2010
University of Alabama, Birmingham
Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum
Journal of Digital Forensics, Security and Law
Phishing continues to grow as phishers discover new exploits and attack vectors for hosting malicious content; the traditional response using takedowns and blacklists does not appear to impede phishers significantly. A handful of law enforcement projects — for example the FBI's Digital PhishNet and the Internet Crime and Complaint Center (ic3.gov) — have demonstrated that they can collect phishing data in substantial volumes, but these collections have not yet resulted in a significant decline in criminal phishing activity. In this paper, a new system is demonstrated for prioritizing investigative resources to help reduce the time and effort expended examining this …
Table Of Contents,
2010
Embry-Riddle Aeronautical University
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Malware Forensics: Discovery Of The Intent Of Deception,
2010
Edith Cowan University
Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward
Journal of Digital Forensics, Security and Law
Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ to hinder forensic analysis. Although legitimate software can incorporate the same analysis avoidance techniques to provide a measure of protection against reverse engineering and to protect intellectual property, malware invariably makes much greater use of such techniques to make detailed analysis labour intensive and very time consuming. Analysis avoidance techniques are so heavily used by malware that the detection of the use of analysis avoidance techniques could be a very good indicator of the presence of malicious intent. However, there is a tendency for analysis …
Table Of Contents,
2010
Embry-Riddle Aeronautical University
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Adaptive Resource Allocation For Cognitive Wireless Ad Hoc Networks,
2010
Missouri University of Science and Technology
Adaptive Resource Allocation For Cognitive Wireless Ad Hoc Networks, Behdis Eslamnour
Doctoral Dissertations
"Widespread use of resource constrained wireless ad hoc networks requires careful management of the network resources in order to maximize the utilization. In cognitive wireless networks, resources such as spectrum, energy, communication links/paths, time, space, modulation scheme, have to be managed to maintain quality of service (QoS). Therefore in the first paper, a distributed dynamic channel allocation scheme is proposed for multi-channel wireless ad hoc networks with single-radio nodes. The proposed learning scheme adapts the probabilities of selecting each channel as a function of the error in the performance index at each step.
Due to frequent changes in topology and …
Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?,
2010
Murdoch University, Perth
Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington
Journal of Digital Forensics, Security and Law
Digital evidence is increasingly relied upon in computer forensic examinations and legal proceedings in the modern courtroom. The primary storage technology used for digital information has remained constant over the last two decades, in the form of the magnetic disc. Consequently, investigative, forensic, and judicial procedures are well-established for magnetic disc storage devices (Carrier, 2005). However, a paradigm shift has taken place in technology storage and complex, transistor-based devices for primary storage are now increasingly common. Most people are aware of the transition from portable magnetic floppy discs to portable USB transistor flash devices, yet the transition from magnetic hard …
Forensic Analysis Of The Windows 7 Registry,
2010
Khalifa University of Science, Technology and Research (KUSTAR)
Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin
Journal of Digital Forensics, Security and Law
The recovery of digital evidence of crimes from storage media is an increasingly time consuming process as the capacity of the storage media is in a state of constant growth. It is also a difficult and complex task for the forensic investigator to analyse all of the locations in the storage media. These two factors, when combined, may result in a delay in bringing a case to court. The concept of this paper is to start the initial forensic analysis of the storage media in locations that are most likely to contain digital evidence, the Windows Registry. Consequently, the forensic …
The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market,
2010
Security Research Centre, Edith Cowan University, Khalifa University of Science, Technology and Research
The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies
Journal of Digital Forensics, Security and Law
The ever increasing use and reliance upon computers in both the public and private sector has led to enormous numbers of computers being disposed of at the end of their useful life within an organisation. As the cost of computers has dropped, their use in the home has also continued to increase. In most organisations, computers have a relatively short life and are replaced on a regular basis with the result that, if not properly cleansed of data, they are released into the public domain containing data that can be relatively up to date. This problem is exacerbated by the …
Integrated Circuit Implementation For A Gan Hfet Driver Circuit,
2010
University of South Carolina - Columbia
Integrated Circuit Implementation For A Gan Hfet Driver Circuit, Bo Wang, Jason D. Bakos, Antonello Monti
Faculty Publications
This paper presents the design and implementation of a new integrated circuit (IC) that is suitable for driving the new generation of high-frequency GaN HFETs. The circuit, based upon a resonant switching transition technique, is first briefly described and then discussed in detail, focusing on the design process practical considerations. A new level-shifter topology, used to generate the zero and negative gate-source voltages required to switch the GaN HFET, is introduced and analyzed. The experimental measurements included in this paper report the results of tests carried out on an IC designed and fabricated as part of the multiproject die in …
Runtime Assertion Checking For Jml On The Eclipse Platform Using Ast Merging,
2010
University of Texas at El Paso
Runtime Assertion Checking For Jml On The Eclipse Platform Using Ast Merging, Amritam Sarcar
Departmental Technical Reports (CS)
The Java Modeling Language (JML) is a formal behavioral interface specification language for Java. It is used for detailed design documentation of Java program modules such as classes and interfaces. JML has been used extensively by many researchers across various projects and has a large and varied spectrum of tool support. It extends from runtime assertion checking (RAC) to theorem proving.
Amongst these tools, RAC and ESC/Java has been used as a common tool for many research projects. RAC for JML is a tool that checks at runtime for possible violations of any specifications. However, lately there has been a …
Estimating Information Amount Under Uncertainty: Algorithmic Solvability And Computational Complexity,
2010
The University of Texas at El Paso
Estimating Information Amount Under Uncertainty: Algorithmic Solvability And Computational Complexity, Vladik Kreinovich, Gang Xiang
Departmental Technical Reports (CS)
Measurement results (and, more generally, estimates) are never absolutely accurate: there is always an uncertainty, the actual value x is, in general, different from the estimate X. Sometimes, we know the probability of different values of the estimation error dx=X-x, sometimes, we only know the interval of possible values of dx, sometimes, we have interval bounds on the cdf of dx. To compare different measuring instruments, it is desirable to know which of them brings more information - i.e., it is desirable to gauge the amount of information. For probabilistic uncertainty, this amount of information is described by Shannon's entropy; …
Development Of Novel Backscatter Communication Systems Using A Multi-Hop Framework And Distributed Beamforming,
2010
Missouri University of Science and Technology
Development Of Novel Backscatter Communication Systems Using A Multi-Hop Framework And Distributed Beamforming, Vikram Reddy Surendra
Masters Theses
"The goal of this thesis it to develop a wireless networking framework for battery-free devices based on passive, backscatter communication. In contrast to traditional, active communication systems, where the radio signal has to be generated using large amount of energy from batteries, the passive systems reflect the RF signal. The information is encoded by modulating the reflected signal, which consumes significantly less energy than active transmission. The existing passive, backscatter systems have limited communication capabilities. For example, the Radio Frequency Identification (RFID) systems support short-distance, direct communication between active reader and passive tags. The communication range is limited due to …
Genome3d: A Viewer-Model Framework For Integrating And Visualizing Multi-Scale Epigenomic Information Within A Three-Dimensional Genome,
2010
University of South Carolina - Columbia
Genome3d: A Viewer-Model Framework For Integrating And Visualizing Multi-Scale Epigenomic Information Within A Three-Dimensional Genome, Thomas M. Asbury, Matt Mitman, Jijun Tang, W. Jim Zheng
Faculty Publications
Background
New technologies are enabling the measurement of many types of genomic and epigenomic information at scales ranging from the atomic to nuclear. Much of this new data is increasingly structural in nature, and is often difficult to coordinate with other data sets. There is a legitimate need for integrating and visualizing these disparate data sets to reveal structural relationships not apparent when looking at these data in isolation.
Results
We have applied object-oriented technology to develop a downloadable visualization tool, Genome3D, for integrating and displaying epigenomic data within a prescribed three-dimensional physical model of the human genome. In order …
Using Jackknife To Assess The Quality Of Gene Order Phylogenies,
2010
University of South Carolina - Columbia
Using Jackknife To Assess The Quality Of Gene Order Phylogenies, Jian Shi, Yiwei Zhang, Haiwei Luo, Jijun Tang
Faculty Publications
Background
In recent years, gene order data has attracted increasing attention from both biologists and computer scientists as a new type of data for phylogenetic analysis. If gene orders are viewed as one character with a large number of states, traditional bootstrap procedures cannot be applied. Researchers began to use a jackknife resampling method to assess the quality of gene order phylogenies.
Results
In this paper, we design and conduct a set of experiments to validate the performance of this jackknife procedure and provide discussions on how to conduct it properly. Our results show that jackknife is very useful to …
Innovations In The Internet’S Architecture That Challenge The Status Quo,
2010
University of Pennsylvania Carey Law School
Innovations In The Internet’S Architecture That Challenge The Status Quo, Christopher S. Yoo
Faculty Scholarship at Penn Carey Law
The current debate over broadband policy has largely overlooked a number of changes to the architecture of the Internet that have caused the price paid by and quality of service received by traffic traveling across the Internet to vary widely. Topological innovations, such as private peering, multihoming, secondary peering, server farms, and content delivery networks, have caused the Internet’s traditionally hierarchical architecture to be replaced by one that is more heterogeneous. Moreover, network providers have begun to employ an increasingly varied array of business arrangements. Some of these innovations are responses to the growing importance of peer-to-peer technologies. Others, such …
Transmitter Optimization In Multiuser Wireless Systems With Quality Of Service Constraints,
2010
Old Dominion University
Transmitter Optimization In Multiuser Wireless Systems With Quality Of Service Constraints, Danda B. Rawat
Electrical & Computer Engineering Theses & Dissertations
In this dissertation, transmitter adaptation for optimal resource allocation in wireless communication systems are investigated. First, a multiple access channel model is considered where many transmitters communicate with a single receiver. This scenario is a basic component of a. wireless network in which multiple users simultaneously access the resources of a wireless service provider. Adaptive algorithms for transmitter optimization to meet Quality-of-Service (QoS) requirements in a distributed manner are studied. Second, an interference channel model is considered where multiple interfering transmitter-receiver pairs co-exist such that a given transmitter communicates with its intended receiver in the presence of interference from other …