Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Conference

2012

Discipline
Institution
Keyword
Publication

Articles 1 - 22 of 22

Full-Text Articles in Computer Engineering

Digital Evidence Education In Schools Of Law, Aaron Alva, Barbara Endicott-Popovsky May 2012

Digital Evidence Education In Schools Of Law, Aaron Alva, Barbara Endicott-Popovsky

Annual ADFSL Conference on Digital Forensics, Security and Law

An examination of State of Connecticut v. Julie Amero provides insight into how a general lack of understanding of digital evidence can cause an innocent defendant to be wrongfully convicted. By contrast, the 101-page opinion in Lorraine v. Markel American Insurance Co. provides legal precedence and a detailed consideration for the admission of digital evidence. An analysis of both cases leads the authors to recommend additions to Law School curricula designed to raise the awareness of the legal community to ensure such travesties of justice, as in the Amero case, don’t occur in the future. Work underway at the University …


After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma May 2012

After Five Years Of E-Discovery Missteps: Sanctions Or Safe Harbor?, Milton Luoma, Vicki Luoma

Annual ADFSL Conference on Digital Forensics, Security and Law

In 2003 the Zubulake case became the catalyst of change in the world of e-discovery. In that case Judge Shira Scheindlin of the United States District Court for the Southern District of New York set guidelines for e-discovery that served as the basis for amending the Federal Rules of Civil Procedure (FRCP) in December 2006. The amendments incorporated a number of concepts that were described by Judge Scheindlin in the Zubulake case. ( Zubulake v. UBS Warburg LLC, 2003) Since the Zubulake case and the FRCP amendments, numerous cases have interpreted these rules changes, but one of the main points …


A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington May 2012

A Case Study Of The Challenges Of Cyber Forensics Analysis Of Digital Evidence In A Child Pornography Trial, Richard Boddington

Annual ADFSL Conference on Digital Forensics, Security and Law

Perfunctory case analysis, lack of evidence validation, and an inability or unwillingness to present understandable analysis reports adversely affect the outcome course of legal trials reliant on digital evidence. These issues have serious consequences for defendants facing heavy penalties or imprisonment yet expect their defence counsel to have clear understanding of the evidence. Poorly reasoned, validated and presented digital evidence can result in conviction of the innocent as well as acquittal of the guilty. A possession of child pornography Case Study highlights the issues that appear to plague case analysis and presentation of digital evidence relied on in these odious …


Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick May 2012

Facilitating Forensics In The Mobile Millennium Through Proactive Enterprise Security, Andrew R. Scholnick

Annual ADFSL Conference on Digital Forensics, Security and Law

This work explores the impact of the emerging mobile communication device paradigm on the security-conscious enterprise, with regard to providing insights for proactive Information Assurance and facilitation of eventual Forensic analysis. Attention is given to technology evolution in the areas of best practices, attack vectors, software and hardware performance, access and activity monitoring, and architectural models.

Keywords: Forensics, enterprise security, mobile communication, best practices, attack vectors.


Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow May 2012

Multi-Parameter Sensitivity Analysis Of A Bayesian Network From A Digital Forensic Investigation, Richard E. Overill, Echo P. Zhang, Kam-Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

A multi-parameter sensitivity analysis of a Bayesian network (BN) used in the digital forensic investigation of the Yahoo! email case has been performed using the principle of ‘steepest gradient’ in the parameter space of the conditional probabilities. This procedure delivers a more reliable result for the dependence of the posterior probability of the BN on the values used to populate the conditional probability tables (CPTs) of the BN. As such, this work extends our previous studies using singleparameter sensitivity analyses of BNs, with the overall aim of more deeply understanding the indicative use of BNs within the digital forensic and …


Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili May 2012

Ipad2 Logical Acquisition: Automated Or Manual Examination?, Somaya Ali, Sumaya Alhosani, Farah Alzarooni, Ibrahim Baggili

Annual ADFSL Conference on Digital Forensics, Security and Law

Due to their usage increase worldwide, iPads are on the path of becoming key sources of digital evidence in criminal investigations. This research investigated the logical backup acquisition and examination of the iPad2 device using the Apple iTunes backup utility while manually examining the backup data (manual examination) and automatically parsing the backup data (Lantern software - automated examination). The results indicate that a manual examination of the logical backup structure from iTunes reveals more digital evidence, especially if installed application data is required for an investigation. However, the researchers note that if a quick triage is needed of an …


Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow May 2012

Cloud Forensics Investigation: Tracing Infringing Sharing Of Copyrighted Content In Cloud, Yi-Jun He, Echo P. Zhang, Lucas C.K. Hui, Siu Ming Yiu, K.P. Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud Computing is becoming a significant technology trend nowadays, but its abrupt rise also creates a brand new front for cybercrime investigation with various challenges. One of the challenges is to track down infringing sharing of copyrighted content in cloud. To solve this problem, we study a typical type of content sharing technologies in cloud computing, analyze the challenges that the new technologies bring to forensics, formalize a procedure to get digital evidences and obtain analytical results based on the evidences to track down illegal uploader. Furthermore, we propose a reasoning model based on the probability distribution in a Bayesian …


A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier May 2012

A Fuzzy Hashing Approach Based On Random Sequences And Hamming Distance, Frank Breitinger, Harald Baier

Annual ADFSL Conference on Digital Forensics, Security and Law

Hash functions are well-known methods in computer science to map arbitrary large input to bit strings of a fixed length that serve as unique input identifier/fingerprints. A key property of cryptographic hash functions is that even if only one bit of the input is changed the output behaves pseudo randomly and therefore similar files cannot be identified. However, in the area of computer forensics it is also necessary to find similar files (e.g. different versions of a file), wherefore we need a similarity preserving hash function also called fuzzy hash function. In this paper we present a new approach for …


The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey May 2012

The Xbox 360 And Steganography: How Criminals And Terrorists Could Be "Going Dark", Ashley Podhradsky, Rob D’Ovidio, Cindy Casey

Annual ADFSL Conference on Digital Forensics, Security and Law

Video game consoles have evolved from single-player embedded systems with rudimentary processing and graphics capabilities to multipurpose devices that provide users with parallel functionality to contemporary desktop and laptop computers. Besides offering video games with rich graphics and multiuser network play, today's gaming consoles give users the ability to communicate via email, video and text chat; transfer pictures, videos, and file;, and surf the World-Wide-Web. These communication capabilities have, unfortunately, been exploited by people to plan and commit a variety of criminal activities. In an attempt to cover the digital tracks of these unlawful undertakings, anti-forensic techniques, such as steganography, …


Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser May 2012

Toward Alignment Between Communities Of Practice And Knowledge-Based Decision Support, Jason Nichols, David Biros, Mark Weiser

Annual ADFSL Conference on Digital Forensics, Security and Law

The National Repository of Digital Forensics Information (NRDFI) is a knowledge repository for law enforcement digital forensics investigators (LEDFI). Over six years, the NRDFI has undertaken significant design revisions in order to more closely align the architecture of the system with theory addressing motivation to share knowledge and communication within ego-centric groups and communities of practice. These revisions have been met with minimal change in usage patterns by LEDFI community members, calling into question the applicability of relevant theory when the domain for knowledge sharing activities expands beyond the confines of an individual organization to a community of practice. When …


Double-Compressed Jpeg Detection In A Steganalysis System, Jennifer L. Davidson, Pooja Parajape May 2012

Double-Compressed Jpeg Detection In A Steganalysis System, Jennifer L. Davidson, Pooja Parajape

Annual ADFSL Conference on Digital Forensics, Security and Law

The detection of hidden messages in JPEG images is a growing concern. Current detection of JPEG stego images must include detection of double compression: a JPEG image is double compressed if it has been compressed with one quality factor, uncompressed, and then re-compressed with a different quality factor. When detection of double compression is not included, erroneous detection rates are very high. The main contribution of this paper is to present an efficient double-compression detection algorithm that has relatively lower dimensionality of features and relatively lower computational time for the detection part, than current comparative classifiers. We use a model-based …


A Proposal For Incorporating Programming Blunder As Important Evidence In Abstraction-Filtration-Comparison Test, P. Vinod Bhattathiripad May 2012

A Proposal For Incorporating Programming Blunder As Important Evidence In Abstraction-Filtration-Comparison Test, P. Vinod Bhattathiripad

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper investigates an unexplored concept in Cyber Forensics, namely, a Programming Blunder. Programming Blunder is identified as a variable or a code segment or a field in a database table, which is hardly used or executed in the context of the application or the user’s functionality. Blunder genes can be found in many parts of any program. It is the contention of this paper that this phenomenon of blunders needs to be studied systematically from its very genetic origins to their surface realizations in contrast to bugs and flaws, especially in view of their importance in software copyright infringement …


Update On The State Of The Science Of Digital Evidence Examination, Fred Cohen May 2012

Update On The State Of The Science Of Digital Evidence Examination, Fred Cohen

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper updates previous work on the level of consensus in foundational elements of digital evidence examination. Significant consensus is found present only after definitions are made explicit, suggesting that, while there is a scientific agreement around some of the basic notions identified, the use of a common language is lacking.

Keywords: Digital forensics examination, terminology, scientific methodology, testability, validation, classification, scientific consensus


Traffic Counter Mobile Application, Victor Molano Apr 2012

Traffic Counter Mobile Application, Victor Molano

College of Engineering: Graduate Celebration Programs

INTRODUCTION

Manual Counters:

•The vehicles counts and characteristics at signalized intersections and others transportation facilities are usually made using manual counters. These manual counters are mechanical or digital boards in which the user can record the different observations from the field. The use of these devices is usually required when more sophisticated methods are not available, when expensive equipment is not justified and for scholastic practices.


Node Filtering And Face Routing For Sensor Network, Umang Amatya Apr 2012

Node Filtering And Face Routing For Sensor Network, Umang Amatya

College of Engineering: Graduate Celebration Programs

Main Contributions

•Efficient Algorithms for identifying Redundant Sensor Nodes

•New Technique for Filtering Redundant Nodes in Sensor Network

•Reliable Algorithm for Message Routing - Forwarding

•User Friendly Prototype Implementation in Java

•Results of Experimental Investigation


A Consumer Level Simulation Model For Demand Response Analysis On Smart Grid, Sungchul Lee, Yoohwan Kim Apr 2012

A Consumer Level Simulation Model For Demand Response Analysis On Smart Grid, Sungchul Lee, Yoohwan Kim

College of Engineering: Graduate Celebration Programs

With the growing awareness of the need for Smart Grid, various countries are taking initiatives for developing Smart Grid.

However, there is limited research on utilizing Smart Grid for Demand-Response (DR).

This study advances the current system of DR by creating a Smart Grid Simulator that allows an intuitive demand response analysis.

The simulator demonstrates that substantial amount of electric power can be reduced efficiently by selective demand control over Smart Grid.

The graphical interface allows generating the electrical usage data and displays both individual and aggregate usage data over time.

This research employs U.S. census data for accurate estimate …


Architecture For An Interactive Motion-Based Traffic Simulation Environment, Romesh Khaddar, Naveen Veeramisti, Alexander Paz, Pushkin Kachroo Apr 2012

Architecture For An Interactive Motion-Based Traffic Simulation Environment, Romesh Khaddar, Naveen Veeramisti, Alexander Paz, Pushkin Kachroo

College of Engineering: Graduate Celebration Programs

In simple words, the objective of this research is to identify the effect of human behavior on traffic To enhance the traffic simulation modeling realism by involving actual human beings navigating the system along with simulated entities in an immersive environment


Decimal Alu, Ming Zhu Apr 2012

Decimal Alu, Ming Zhu

College of Engineering: Graduate Celebration Programs

The decimal number system is used in many commercial applications, such as financial analysis, banking, tax calculation, currency conversion, insurance and accounting. With the explosively increasing amount the data to be proposed, computers are introduced to help deal with it. However, in digital Arithmetic Logic Unit (ALU) circuit systems, the binary number system is widely used for its simplicity and easy realization in physical layout. This project aims at constructing an ALU that contains decimal additions, subtractions and multiplications using binary coded decimal (BCD) on a binary system platform.


A Refreshable And Portable E-Braille System For The Blind And Visually Impaired, Mohammad Saadeh, Mohamed Trabia Apr 2012

A Refreshable And Portable E-Braille System For The Blind And Visually Impaired, Mohammad Saadeh, Mohamed Trabia

College of Engineering: Graduate Celebration Programs

  • Braille is a communication system to assist the blind and visually impaired.
  • Present an approach to measure fingertip forces while identifying Braille characters.
  • Implement a force sensory feedback in the device to measure the force developed on the fingertip.
  • Introduce a preliminary design for the device.
  • Build a prototype for the device and evaluate its functionality and integrate its components


Cognitive Congestion Control For Data Portal, Ershad Sharifahmadian, Shahram Latifi Apr 2012

Cognitive Congestion Control For Data Portal, Ershad Sharifahmadian, Shahram Latifi

College of Engineering: Graduate Celebration Programs

Network congestion is one of challenging tasks in communication networks and leads to queuing delay, packet loss or the blocking of new connections. Here, a data portal is considered as an application-based network, and a cognitive method is proposed to deal with congestion in this kind of network. The cognitive method is proposed to improve bandwidth sharing, and deal with congestion in a data portal. When the data portal is about climate change data, congestion control is more emphasized, because the scientific climate data is voluminous and there is a high traffic to/from data portal by the scientific community, research …


Millennium Systems On The Cloud: Experience On System Migration From Sun V490 To Vmware Platform, Yiu On Li, Jimmy Tsang Apr 2012

Millennium Systems On The Cloud: Experience On System Migration From Sun V490 To Vmware Platform, Yiu On Li, Jimmy Tsang

Hong Kong Innovative Users Group Meetings

No abstract provided.


Technology Trends And Predictions: Is A Flying Car In Our Future?, Carol A. Watson Mar 2012

Technology Trends And Predictions: Is A Flying Car In Our Future?, Carol A. Watson

Continuing Legal Education Presentations

Discusses the future of legal research and technologies that are currently available for law offices. Highlights current technology trends and predictions and the latest innovations in courtroom technology. Concludes with a list of general technology predictions that will hopefully provide food for thought and generate excitement about the coming prospects of technology.