Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Entire DC Network

Adsl Router Forensics Part 2: Acquiring Evidence, Patryk Szewczyk Mar 2009

Adsl Router Forensics Part 2: Acquiring Evidence, Patryk Szewczyk

Australian Digital Forensics Conference

The demand for high-speed Internet access is escalating high sales of ADSL routers. In-turn this has prompted individuals to attack and exploit the vulnerabilities in these devices. To respond to these threats, methods of acquisition and analysis are needed. The configuration data provides a wealth of information into the current state of the device. Hence, this data may be used to identify and interpret unlawful ways in which the device was used. This paper is centres around an empirical learning approach identifying techniques to address the device’s acquirable limitations taking into consideration that the owner may not willingly present login …


Satellite Navigation Forensics Techniques, Peter Hannay Mar 2009

Satellite Navigation Forensics Techniques, Peter Hannay

Australian Digital Forensics Conference

Satellite navigation systems are becoming increasingly common for automotive use within the civilian population. This increase in use is of interest to forensic investigators as satellite navigation devices have the potential to provide historical location data to investigators. The research in progress investigates the data sources and encoding on a number of common satellite navigation devices. The aim of this research is to develop a framework for the acquisition and analysis of common satellite navigation systems in a way that valid for multiple device


The Not So Smart, Smart Grid: Potential Security Risks Associated With Thedeployment Of Smart Grid Technologies, Craig Valli Mar 2009

The Not So Smart, Smart Grid: Potential Security Risks Associated With Thedeployment Of Smart Grid Technologies, Craig Valli

Australian Digital Forensics Conference

The electricity grid has been up until now a relatively stable artifice of modern industrialized nations. The power grids are the most widespread wired networks in the world. They are heavily regulated and standardized to protect the integrity, stability and reliability of supply. The grids have been essentially closed systems, this is now rapidly changing with the introduction of the network enabled smart meter. These meters are “web” accessible, connect and interact directly with electrical appliances in domiciles and businesses. This move now brings a range of extreme risks and complexities into these stable networks. This paper explores the security …


Cybercrime Attribution: An Eastern European Case Study, Stephen Mccombie, Josef Pieprzyk, Paul Watters Mar 2009

Cybercrime Attribution: An Eastern European Case Study, Stephen Mccombie, Josef Pieprzyk, Paul Watters

Australian Digital Forensics Conference

Phishing and related cybercrime is responsible for billions of dollars in losses annually. Gartner reported more than 5 million U.S. consumers lost money to phishing attacks in the 12 months ending in September 2008 (Gartner 2009). This paper asks whether the majority of organised phishing and related cybercrime originates in Eastern Europe rather than elsewhere such as China or the USA. The Russian “Mafiya” in particular has been popularised by the media and entertainment industries to the point where it can be hard to separate fact from fiction but we have endeavoured to look critically at the information available on …


Zubulake: The Catalyst For Change In Ediscovery, Penny Herickhoff, Vicki M. Luoma Mar 2009

Zubulake: The Catalyst For Change In Ediscovery, Penny Herickhoff, Vicki M. Luoma

Australian Digital Forensics Conference

Common law countries have been struggling with electronic data in regard to their discovery rules from the first digital document. All major common law countries, including Australia, New Zealand, Australia, United Kingdom, Canada, South Africa and the United States have recently changed their rules of discovery in an attempt to make sense of all this data and determine what, when and how data should be disclosed by parties in litigation. Case law in these countries has been defining the responsibilities of potential parties and attorneys to prepare for litigation that might happen. The case that was the catalyst of change …


Qualcomm V. Broadcom: Implications For Electronic Discovery, Milton H. Luoma, Vicki M. Luoma Mar 2009

Qualcomm V. Broadcom: Implications For Electronic Discovery, Milton H. Luoma, Vicki M. Luoma

Australian Digital Forensics Conference

Electronic discovery has been the source of difficult challenges for courts, lawyers, and litigants from the beginning. The methods, document formats, and scope of electronic discovery have all contributed to the difficulties encountered. The seminal case in the United States that underscores the nature of the difficulties and challenges facing lawyers and courts in electronic discovery is Qualcomm v. Broadcom. While the case has been cited as an example of the ethical issues facing lawyers who do not follow the rules of discovery, the lessons go well beyond ethical issues. All major common law countries, including Australia, New Zealand, United …


Automatic Detection Of Child Pornography, Glen Thompson Mar 2009

Automatic Detection Of Child Pornography, Glen Thompson

Australian Digital Forensics Conference

Before the introduction of the internet, the availability of child pornography was reported as on the decline (Jenkins 2001). Since its emergence, however, the internet has made child pornography a much more accessible and available means of trafficking across borders (Biegel 2001; Jenkins 2001; Wells, Finkelhor et al. 2007). The internet as it is at present is made up of a vast array of protocols and networks where traffickers can anonymously share large volumes of illegal material amongst each other from locations with relaxed or non-existent laws that prohibit the possession or trafficking of illegal material. Likewise the internet is …


Smartpot: Creating A 1st Generation Smartphone Honeypot, Michael Freeman, Andrew Woodward Mar 2009

Smartpot: Creating A 1st Generation Smartphone Honeypot, Michael Freeman, Andrew Woodward

Australian Digital Forensics Conference

This paper discusses an experimental method for creating a 1st generation smart-phone honey-pot with the intention of discovering automated worms. A Honeyd low-interaction virtual honey-pot is conceived as a possible method of discovering automated smart-phone worms by emulating the operating system Windows Mobile 5 and Windows Mobile 6, along with the available TCP/UDP ports of each operating system. This is an experimental method as there are currently no known malicious smart-phone worms. Honeyd emulates devices by mimicking the devices operating system fingerprint which is created by the unique responses each operating system sends to a discrete series of TCP and …


Secure State Deletion: Testing The Efficacy And Integrity Of Secure Deletion Tools Onsolid State Drives, Michael Freeman, Andrew Woodward Mar 2009

Secure State Deletion: Testing The Efficacy And Integrity Of Secure Deletion Tools Onsolid State Drives, Michael Freeman, Andrew Woodward

Australian Digital Forensics Conference

The research aimed to determine the efficacy and integrity of several hard-drive disk deletion tools on solid state drives (SSDs). SSDs contain new technologies such as wear-levelling and device under provisioning to provide efficient functionality and speed for data management, but the same technologies may also provide obstacles to ensuring that all information is fully removed from the drive. Furthermore SSDs stores files in 4KB pages, yet data can only be deleted in 512KB blocks. This function uses the disk controller to remove all the pages from the block a file is being deleted from, storing the pages in a …


The 2009 Analysis Of Information Remaining On Usb Storage Devices Offered Forsale On The Second Hand Market, Andy Jones, Craig Valli, G. Dabibi Mar 2009

The 2009 Analysis Of Information Remaining On Usb Storage Devices Offered Forsale On The Second Hand Market, Andy Jones, Craig Valli, G. Dabibi

Australian Digital Forensics Conference

The use of the USB storage device, also known as the USB drive, a thumb drive, a keychain drive and a flash drive has, for the most part, replaced the floppy disk and to some extent the Compact Disk (CD), the DVD (Digital Video Disk or Digital Versatile Disk) and the external hard disk. Their robustness, size and weight make them easy to transport, but also to lose or misplace. They are inexpensive and are often given away as promotional items by organisations. Over the last few years there has been a dramatic increase in the storage capacity of these …


Theory And Practice Of Flash Memory Mobile Forensics, Salvatore Fiorillo Mar 2009

Theory And Practice Of Flash Memory Mobile Forensics, Salvatore Fiorillo

Australian Digital Forensics Conference

This paper is an introduction to flash memory forensics with a special focus on completeness of evidence acquired from mobile phones. Moving through academic papers and industrial documents will be introduced the particular nature of non-volatile memories present in nowadays mobile phones; how they really work and which challenges they pose to forensic investigators. Then will be presented an advanced test in which some brand new flash memories have been used to hide data in man-made bad blocks: the aim is to verify if forensic software tools are able to acquire data from such blocks, and to evaluate the possibility …


A Forensics Overview And Analysis Of Usb Flash Memory Devices, Krishnun Sansurooah Mar 2009

A Forensics Overview And Analysis Of Usb Flash Memory Devices, Krishnun Sansurooah

Australian Digital Forensics Conference

Current forensic tools for examination of embedded systems like mobile phones and PDAs mostly perform data extraction on a logical level and do not consider the type of storage media during data analysis. This report suggests different low level approaches for the forensic examination of flash memories and describes three lowlevel data acquisition methods for making full memory copies of flash memory devices. Results of a file system study in which USB memory sticks from 45 different make and models were used are presented. For different mobile phones, this paper shows how full memory copies of their flash memories can …