Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Embry-Riddle Aeronautical University

Journal

Discipline
Keyword
Publication Year
Publication

Articles 31 - 60 of 623

Full-Text Articles in Physical Sciences and Mathematics

Internet Of Things Software And Hardware Architectures And Their Impacts On Forensic Investigations: Current Approaches And Challenges, Abel Alex Boozer, Arun John, Tathagata Mukherjee Sep 2021

Internet Of Things Software And Hardware Architectures And Their Impacts On Forensic Investigations: Current Approaches And Challenges, Abel Alex Boozer, Arun John, Tathagata Mukherjee

Journal of Digital Forensics, Security and Law

The never-before-seen proliferation of interconnected low-power computing devices, patently dubbed the Internet of Things (IoT), is revolutionizing how people, organizations, and malicious actors interact with one another and the Internet. Many of these devices collect data in different forms, be it audio, location data, or user commands. In civil or criminal nature investigations, the data collected can act as evidence for the prosecution or the defense. This data can also be used as a component of cybersecurity efforts. When data is extracted from these devices, investigators are expected to do so using proven methods. Still, unfortunately, given the heterogeneity in …


The Survey On Cross-Border Collection Of Digital Evidence By Representatives From Polish Prosecutors’ Offices And Judicial Authorities, Paweł Olber Dr Sep 2021

The Survey On Cross-Border Collection Of Digital Evidence By Representatives From Polish Prosecutors’ Offices And Judicial Authorities, Paweł Olber Dr

Journal of Digital Forensics, Security and Law

Dynamic development of IT technology poses new challenges related to the cross-border collection of electronic evidence from the cloud. Many times investigators need to secure data stored on foreign servers directly and then look for solutions on how to turn the data into a legitimate source of evidence. To study the situation and propose solutions, I conducted a survey among Polish representatives of public prosecutors' offices and courts. This paper presents information from digital evidence collection practices across multiple jurisdictions. I stated that representatives from the prosecution and the judiciary in Poland are aware of the issues associated with cross-border …


Digital Forensic Readiness Framework Based On Honeypot And Honeynet For Byod, Audrey Asante, Vincent Amankona Sep 2021

Digital Forensic Readiness Framework Based On Honeypot And Honeynet For Byod, Audrey Asante, Vincent Amankona

Journal of Digital Forensics, Security and Law

The utilization of the internet within organizations has surged over the past decade. Though, it has numerous benefits, the internet also comes with its own challenges such as intrusions and threats. Bring Your Own Device (BYOD) as a growing trend among organizations allow employees to connect their portable devices such as smart phones, tablets, laptops, to the organization’s network to perform organizational duties. It has gained popularity over the years because of its flexibility and cost effectiveness. This adoption of BYOD has exposed organizations to security risks and demands proactive measures to mitigate such incidents. In this study, we propose …


An Economical Method For Securely Disintegrating Solid-State Drives Using Blenders, Brandon J. Hopkins Phd, Kevin A. Riggle Jul 2021

An Economical Method For Securely Disintegrating Solid-State Drives Using Blenders, Brandon J. Hopkins Phd, Kevin A. Riggle

Journal of Digital Forensics, Security and Law

Pulverizing solid-state drives (SSDs) down to particles no larger than 2 mm is required by the United States National Security Agency (NSA) to ensure the highest level of data security, but commercial disintegrators that achieve this standard are large, heavy, costly, and often difficult to access globally. Here, we present a portable, inexpensive, and accessible method of pulverizing SSDs using a household blender and other readily available materials. We verify this approach by pulverizing SSDs with a variety of household blenders for fixed periods of time and sieve the resulting powder to ensure appropriate particle size. Among the 6 household …


The Development And Evaluation Of The Atlantic Tropical Cyclone Intensification Regression Model (Atcirm), Bruno Platero Huarcaya, Lexi Cruz Jun 2021

The Development And Evaluation Of The Atlantic Tropical Cyclone Intensification Regression Model (Atcirm), Bruno Platero Huarcaya, Lexi Cruz

Beyond: Undergraduate Research Journal

Operational track forecasts of Tropical Cyclones (TCs) have been improved substantially in recent years and nowadays are sufficiently accurate. However, intensity forecasts have not shown similar improvements, especially for rapidly intensifying storms. The improvement of intensity forecast accuracy can help authorities in risk management and decision making to prevent loss of life and property. The purpose of our project is to develop a statistical linear regression model that provides better predictions for TC intensification over the ocean. Here, different predictor variables are studied, and 2011-2017 Atlantic basin storms are investigated. The final set of predictor variables selected for the model …


Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin Jun 2021

Windows Kernel Hijacking Is Not An Option: Memoryranger Comes To The Rescue Again, Igor Korkin

Journal of Digital Forensics, Security and Law

The security of a computer system depends on OS kernel protection. It is crucial to reveal and inspect new attacks on kernel data, as these are used by hackers. The purpose of this paper is to continue research into attacks on dynamically allocated data in the Windows OS kernel and demonstrate the capacity of MemoryRanger to prevent these attacks. This paper discusses three new hijacking attacks on kernel data, which are based on bypassing OS security mechanisms. The first two hijacking attacks result in illegal access to files open in exclusive access. The third attack escalates process privileges, without applying …


Viability Of Consumer Grade Hardware For Learning Computer Forensics Principles, Lazaro A. Herrera Apr 2021

Viability Of Consumer Grade Hardware For Learning Computer Forensics Principles, Lazaro A. Herrera

Journal of Digital Forensics, Security and Law

We propose utilizing budget consumer hardware and software to teach computer forensics principles and for non-case work, research and developing new techniques. Consumer grade hardware and free / open source software is more easily accessible in most developing markets and can be used as a first purchase for education, technique development and even when developing new techniques. These techniques should allow for small forensics laboratories or classroom settings to have the tooling and framework for trying existing forensics techniques or creating new forensics techniques on consumer grade hardware. We'll be testing how viable each individual piece of hardware is as …


A Constructive Direst Security Threat Modeling For Drone As A Service, Fahad E. Salamh, Umit Karabiyik, Marcus Rogers Mar 2021

A Constructive Direst Security Threat Modeling For Drone As A Service, Fahad E. Salamh, Umit Karabiyik, Marcus Rogers

Journal of Digital Forensics, Security and Law

The technology used in drones is similar or identical across drone types and components, with many common risks and opportunities. The purpose of this study is to enhance the risk assessment procedures for Drone as a Service (DaaS) capabilities. STRIDE is an acronym that includes the following security risks: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privileges. The paper presents a modified STRIDE threat model and prioritize its desired properties (i.e., authenticity, integrity, non-reputability, confidentiality, availability, and authorization) to generate an appropriate DaaS threat model. To this end, the proposed DIREST threat model better meets the …


Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Chuck Easttom Feb 2021

Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Chuck Easttom

Journal of Digital Forensics, Security and Law

Steganography has long been used to counter forensic investigation. This use of steganography as an anti-forensics technique is becoming more widespread. This requires forensic examiners to have additional tools to more effectively detect steganography. In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. This technique is embodied in a software implementation named CounterSteg. The CounterSteg software allows detailed analysis and comparison of both the original cover …


Backup And Recovery Mechanisms Of Cassandra Database: A Review, Karina Bohora, Amol Bothe, Damini Sheth, Rupali Chopade, V. K. Pachghare Feb 2021

Backup And Recovery Mechanisms Of Cassandra Database: A Review, Karina Bohora, Amol Bothe, Damini Sheth, Rupali Chopade, V. K. Pachghare

Journal of Digital Forensics, Security and Law

Cassandra is a NoSQL database having a peer-to-peer, ring-type architecture. Cassandra offers fault-tolerance, data replication for higher availability as well as ensures no single point of failure. Given that Cassandra is a NoSQL database, it is evident that it lacks the amount of research that has gone into comparatively older and more widely and broadly used SQL databases. Cassandra’s growing popularity in recent times gives rise to the need of addressing any security-related or recovery-related concerns associated with its usage. This review paper discusses the existing deletion mechanism in Cassandra and presents some identified issues related to backup and recovery …


Social Media User Relationship Framework (Smurf), Anne David, Sarah Morris, Gareth Appleby-Thomas Feb 2021

Social Media User Relationship Framework (Smurf), Anne David, Sarah Morris, Gareth Appleby-Thomas

Journal of Digital Forensics, Security and Law

The use of social media has spread through many aspects of society, allowing millions of individuals, corporate as well as government entities to leverage the opportunities it affords. These opportunities often end up being exploited by a small percentage of the user community who use it for objectionable or unlawful activities; for example, trolling, cyber bullying, grooming, luring. In some cases, these unlawful activities result in investigations where swift retrieval of critical evidence required in order to save a life.

This paper presents a proof of concept (PoC) framework for social media user attribution. The framework aims to provide digital …


Co2 Reduction Measures In The Aviation Industry: Current Measures And Outlook, Florian Mathys, P. Wild, J. Wang Jan 2021

Co2 Reduction Measures In The Aviation Industry: Current Measures And Outlook, Florian Mathys, P. Wild, J. Wang

International Journal of Aviation, Aeronautics, and Aerospace

This article gives a holistic overview of the current CO2 reduction measures and analyses the effectiveness of measures that are feasible for implementation in the future. To achieve the objectives of the Paris Agreement, the aviation industry needs to implement reduction measures because of its forecasted growth and contribution to global warming. The focus is set on CO2 reduction measures, categorized in technology, operations, infrastructure/air traffic management (ATM), and market-based measures. The most promising long-term technologies to reduce CO2 emissions are hydrogen-powered aircrafts and sustainable aviation fuels (SAF). In terms of operations, CO2 emissions can be …


Integrating The First Person View And The Third Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh, Kwanghee Lee, Myunghoon Oh Jan 2021

Integrating The First Person View And The Third Person View Using A Connected Vr-Mr System For Pilot Training, Chang-Geun Oh, Kwanghee Lee, Myunghoon Oh

Journal of Aviation/Aerospace Education & Research

Virtual reality (VR)-based flight simulator provides pilots the enhanced reality from the first-person view. Mixed reality (MR) technology generates effective 3D graphics. The users who wear the MR headset can walk around the 3D graphics to see all its 360 degrees of vertical and horizontal aspects maintaining the consciousness of real space. A VR flight simulator and an MR application were connected to create the capability of both first-person view and third-person view for a comprehensive pilot training system. This system provided users the capability to monitor the aircraft progress along the planned path from the third-person view as well …


A Model For Inhalation Of Infectious Aerosol Contaminants In An Aircraft Passenger Cabin, Bert A. Silich Jan 2021

A Model For Inhalation Of Infectious Aerosol Contaminants In An Aircraft Passenger Cabin, Bert A. Silich

International Journal of Aviation, Aeronautics, and Aerospace

Aerosol contamination of an aircraft cabin by infectious passengers is a concern of passengers, aircrew and the aviation industry. This may be especially important during a pandemic, such as COVID-19, where the full extent of aerosol transmission is not well understood. A statistical method to determine the number of infectious passengers on board along with a mathematical model estimating the contaminant concentration of aerosols in the cabin and the number of inhaled infectious particles by passengers is presented. An example is used to demonstrated how the results can be estimated during normal operations and emergency conditions with malfunctions of the …


Potential Applications Of Electrodynamic Tethers, Sai Charan Petchetti Jan 2021

Potential Applications Of Electrodynamic Tethers, Sai Charan Petchetti

International Journal of Aviation, Aeronautics, and Aerospace

In recent decades, alternative propulsion systems have been investigated and have attracted great interest in the space community. Most of these alternative propulsion systems need propellants. One alternative propulsion system that does not require propellants and is not often discussed is electrodynamic tethers (EDTs). This paper speculates the potential applications of EDTs ranging from radiation belt remediation to momentum exchange tether re-boosting.


A Mathematical Analysis Of The Wind Triangle Problem And An Inquiry Of True Airspeed Calculations In Supersonic Flight, Leonard T. Huang, Lisa I. Cummings Jan 2021

A Mathematical Analysis Of The Wind Triangle Problem And An Inquiry Of True Airspeed Calculations In Supersonic Flight, Leonard T. Huang, Lisa I. Cummings

International Journal of Aviation, Aeronautics, and Aerospace

In the first half of this paper, we present a fresh perspective toward the Wind Triangle Problem in aerial navigation by deriving necessary and sufficient conditions, which we call "go/no-go conditions", for the existence/non-existence of a solution of the problem. Although our derivation is based on simple trigonometry and basic properties of quadratic functions, it is mathematically rigorous. We also offer examples to demonstrate how easy it is to check these conditions graphically. In the second half of this paper, we use function theory to re-examine another problem in aerial navigation, namely, that of computing true airspeed — even in …


Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools, Ian M. Kennedy, Blaine Price, Arosha Bandara Oct 2020

Towards Increasing Trust In Expert Evidence Derived From Malware Forensic Tools, Ian M. Kennedy, Blaine Price, Arosha Bandara

Journal of Digital Forensics, Security and Law

Following a series of high profile miscarriages of justice in the UK linked to questionable expert evidence, the post of the Forensic Science Regulator was created in 2008. The main objective of this role is to improve the standard of practitioner competences and forensic procedures. One of the key strategies deployed to achieve this is the push to incorporate a greater level of scientific conduct in the various fields of forensic practice. Currently there is no statutory requirement for practitioners to become accredited to continue working with the Criminal Justice System of England and Wales. However, the Forensic Science Regulator …


A Forensic First Look At A Pos Device: Searching For Pci Dss Data Storage Violations, Stephen Larson, James Jones, Jim Swauger Oct 2020

A Forensic First Look At A Pos Device: Searching For Pci Dss Data Storage Violations, Stephen Larson, James Jones, Jim Swauger

Journal of Digital Forensics, Security and Law

According to the Verizon 2018 Data Breach Investigations Report, 321 POS terminals (user devices) were involved in about 14% of the 2,216 data breaches in 2017 (Verizon, 2018). These data breaches involved standalone POS terminals as well as associated controller systems. This paper examines a standalone Point-of-Sale (POS) system which is ubiquitous in smaller retail stores and restaurants. An attempt to extract unencrypted data and identify possible violations of the Payment Card Industry Data Security Standard (PCI DSS) requirement to protect stored cardholder data were be made. Persistent storage (flash memory chips) were removed from the devices and their contents …


Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips Aug 2020

Cryptography, Passwords, Privacy, And The Fifth Amendment, Gary C. Kessler, Ann M. Phillips

Journal of Digital Forensics, Security and Law

Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the …


A Two-Stage Model For Social Network Investigations In Digital Forensics, Anne David, Sarah Morris, Gareth Appleby-Thomas Aug 2020

A Two-Stage Model For Social Network Investigations In Digital Forensics, Anne David, Sarah Morris, Gareth Appleby-Thomas

Journal of Digital Forensics, Security and Law

This paper proposes a two-stage model for identifying and contextualizing features from artefacts created as a result of social networking activity. This technique can be useful in digital investigations and is based on understanding and the deconstruction of the processes that take place prior to, during and after user activity; this includes corroborating artefacts. Digital Investigations are becoming more complex due to factors such as, the volume of data to be examined; different data formats; a wide range of sources for digital evidence; the volatility of data and the limitations of some of the standard digital forensic tools. This paper …


What’S In The Cloud? - An Examination Of The Impact Of Cloud Storage Usage On The Browser Cache., Graeme Horsman Jun 2020

What’S In The Cloud? - An Examination Of The Impact Of Cloud Storage Usage On The Browser Cache., Graeme Horsman

Journal of Digital Forensics, Security and Law

Cloud storage is now a well established and popular service adopted by many individuals, often at limited or no cost. It provides users with the ability to store content on a cloud service provider’s infrastructure offering the benefit of redundancy, reliability, security, flexibility of access and the potential assumed liability of the provider for data loss within the contexts of a licensing agreement. Consequently, this form of remote storage provides a regulatory challenge as content which once resided upon a seized digital exhibit, available for scrutiny during a digital forensic investigatory, may no longer be present where attempting to acquire …


An Evaluation Of Data Erasing Tools, Andrew Jones, Isaac Afrifa Jun 2020

An Evaluation Of Data Erasing Tools, Andrew Jones, Isaac Afrifa

Journal of Digital Forensics, Security and Law

The permanent removal of data from media is a major area of concern mainly because of the misconception that once a file is deleted or storage media is formatted, it cannot be recovered. There has been the development of both commercial and freeware data erasing tools, which all claim complete file or disk erasure. This report analyzes the efficiency of a number of these tools in performing erasures on an electromechanical drive. It focuses on a selection of popular and modern erasing tools; taking into consideration their usability, claimed erasing standards and whether they perform complete data erasure with the …


Teaching Data Carving Using The Real World Problem Of Text Message Extraction From Unstructured Mobile Device Data Dumps, Gary D. Cantrell, Joan Runs Through Apr 2020

Teaching Data Carving Using The Real World Problem Of Text Message Extraction From Unstructured Mobile Device Data Dumps, Gary D. Cantrell, Joan Runs Through

Journal of Digital Forensics, Security and Law

Data carving is a technique used in data recovery to isolate and extract files based on file content without any file system guidance. It is an important part of data recovery and digital forensics, but it is also useful in teaching computer science students about file structure and binary encoding of information especially within a digital forensics program. This work demonstrates how the authors teach data carving using a real world problem they encounter in digital forensics evidence processing involving the extracting of text messages from unstructured small device binary extractions. The authors have used this problem for instruction in …


Cyber-Security Risks Of Fedwire, Mark J. Bilger Apr 2020

Cyber-Security Risks Of Fedwire, Mark J. Bilger

Journal of Digital Forensics, Security and Law

This paper will review the risks associated with the Federal Reserve's Fedwire network as a key resource necessary for the efficient function of the American financial system. It will examine the business model of the Fedwire system of real-time interbank transfers, the network characteristics of Fedwire, and the possibility of a successful attack on Fedwire and its potential impact on the U.S. financial system.


Front Matter Mar 2020

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Development Of A Sensor Suite For Atmospheric Boundary Layer Measurement With A Small Multirotor Unmanned Aerial System, Kevin A. Adkins, Christopher J. Swinford, Peter D. Wambolt, Gordon Bease Jan 2020

Development Of A Sensor Suite For Atmospheric Boundary Layer Measurement With A Small Multirotor Unmanned Aerial System, Kevin A. Adkins, Christopher J. Swinford, Peter D. Wambolt, Gordon Bease

International Journal of Aviation, Aeronautics, and Aerospace

Small unmanned aerial systems (sUAS) are increasingly being used to conduct atmospheric research. Because of the dynamic nature and inhomogeneity of the atmospheric boundary layer (ABL), the ability of instrumented sUAS to make on-demand 3-dimensional high-resolution spatial measurements of atmospheric parameters makes them particularly suited to ABL investigations. Both fixed-wing and multirotor sUAS have been used for ABL investigations. Most investigations to date have included in-situ measurement of thermodynamic quantities such as temperature, pressure and humidity. When wind has been measured, a variety of strategies have been used. Two of the most popular techniques have been deducing wind from inertial …


Automatic Gaze Classification For Aviators: Using Multi-Task Convolutional Networks As A Proxy For Flight Instructor Observation, Justin Wilson, Sandro Scielzo, Sukumaran Nair, Eric C. Larson Jan 2020

Automatic Gaze Classification For Aviators: Using Multi-Task Convolutional Networks As A Proxy For Flight Instructor Observation, Justin Wilson, Sandro Scielzo, Sukumaran Nair, Eric C. Larson

International Journal of Aviation, Aeronautics, and Aerospace

In this work, we investigate how flight instructors observe aviator scan patterns and assign quality to an aviator's gaze. We first establish the reliability of instructors to assign similar quality to an aviator's scan patterns, and then investigate methods to automate this quality using machine learning. In particular, we focus on the classification of gaze for aviators in a mixed-reality flight simulation. We create and evaluate two machine learning models for classifying gaze quality of aviators: a task-agnostic model and a multi-task model. Both models use deep convolutional neural networks to classify the quality of pilot gaze patterns for 40 …


A Proposed Taxonomy For General Aviation Pilot Weather Education And Training, John M. Lanicci, Thomas A. Guinn, Jayde M. King, Beth Blickensderfer, Robert Thomas, Yolanda Ortiz Jan 2020

A Proposed Taxonomy For General Aviation Pilot Weather Education And Training, John M. Lanicci, Thomas A. Guinn, Jayde M. King, Beth Blickensderfer, Robert Thomas, Yolanda Ortiz

Journal of Aviation/Aerospace Education & Research

As General Aviation (GA) safety continues to remain a focus of the aviation community, GA pilot weather education and training continues to be an active area of interest within the research community. This study introduces a taxonomy for organizing GA pilot weather education and training materials that was originally conceived as part of the FAA’s Weather Technology In the Cockpit research program. The taxonomy is built upon three main knowledge categories, or tiers:1) Weather Phenomena (which includes hazards); 2) Weather Hazard Products; and 3) Weather Hazard Product Sources and their Application. The concept behind the categorization is to link knowledge …


Implementing Active Learning Techniques In An Undergraduate Aviation Meteorology Course, Daniel J. Halperin, Robert W. Eicher, Thomas A. Guinn, Joseph R. Keebler, Kim O. Chambers Jan 2020

Implementing Active Learning Techniques In An Undergraduate Aviation Meteorology Course, Daniel J. Halperin, Robert W. Eicher, Thomas A. Guinn, Joseph R. Keebler, Kim O. Chambers

Journal of Aviation/Aerospace Education & Research

A course in Aviation Weather is an integral component of multiple degree programs at Embry-Riddle Aeronautical University. Consequently, the course sustains large enrollments with several faculty teaching it. Efforts to promote a consistent experience for students resulted in primarily PowerPoint-based lectures. This paper describes a set of changes made to the course with the goal of improving students’ engagement, understanding, and retention of the course material that are consistent with effective teaching strategies based on prior research. Specifically, daily quizzes, Poll Everywhere questions, in-class activities, flipped classroom sessions, and assertion-evidence based lectures were introduced. These changes initially were implemented in …


Real-Time Urban Weather Observations For Urban Air Mobility, Kevin A. Adkins, Mustafa Akbas, Marc Compere Jan 2020

Real-Time Urban Weather Observations For Urban Air Mobility, Kevin A. Adkins, Mustafa Akbas, Marc Compere

International Journal of Aviation, Aeronautics, and Aerospace

Cities of the future will have to overcome congestion, air pollution and increasing infrastructure cost while moving more people and goods smoothly, efficiently and in an eco-friendly manner. Urban air mobility (UAM) is expected to be an integral component of achieving this new type of city. This is a new environment for sustained aviation operations. The heterogeneity of the urban fabric and the roughness elements within it create a unique environment where flight conditions can change frequently across very short distances. UAM vehicles with their lower mass, more limited thrust and slower speeds are especially sensitive to these conditions. Since …