Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

PDF

Edith Cowan University

Theses/Dissertations

Digital forensics

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

A Non-Device Specific Framework For The Development Of Forensic Locational Data Analysis Procedure For Consumer Grade Small And Embedded Devices, Peter Hannay Jan 2017

A Non-Device Specific Framework For The Development Of Forensic Locational Data Analysis Procedure For Consumer Grade Small And Embedded Devices, Peter Hannay

Theses: Doctorates and Masters

Portable and wearable computing devices such as smart watches, navigation units, mobile phones, and tablet computers commonly ship with Global Navigation Satellite System (GNSS) supported locational awareness. Locational functionality is no longer limited to navigation specific devices such as satellite navigation devices and location tracking systems. Instead the use of these technologies has extended to become secondary functionality on many devices, including mobile phones, cameras, portable computers, and video game consoles. The increase in use of location aware technology is of use to forensic investigators as it has the potential to provide historic locational information. The evidentiary value of these …


Analysis Avoidance Techniques Of Malicious Software, Murray Brand Jan 2010

Analysis Avoidance Techniques Of Malicious Software, Murray Brand

Theses: Doctorates and Masters

Anti Virus (AV) software generally employs signature matching and heuristics to detect the presence of malicious software (malware). The generation of signatures and determination of heuristics is dependent upon an AV analyst having successfully determined the nature of the malware, not only for recognition purposes, but also for the determination of infected files and startup mechanisms that need to be removed as part of the disinfection process. If a specimen of malware has not been previously extensively analyzed, it is unlikely to be detected by AV software. In addition, malware is becoming increasingly profit driven and more likely to incorporate …