Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Physical Sciences and Mathematics

A Method To Detect Aac Audio Forgery, Qingzhong Liu, Andrew Sung, Lei Chen, Ming Yang, Zhongxue Chen, Yanxin Liu, Jing Zhang Aug 2015

A Method To Detect Aac Audio Forgery, Qingzhong Liu, Andrew Sung, Lei Chen, Ming Yang, Zhongxue Chen, Yanxin Liu, Jing Zhang

Department of Information Technology Faculty Publications

Advanced Audio Coding (AAC), a standardized lossy compression scheme for digital audio, which was designed to be the successor of the MP3 format, generally achieves better sound quality than MP3 at similar bit rates. While AAC is also the default or standard audio format for many devices and AAC audio files may be presented as important digital evidences, the authentication of the audio files is highly needed but relatively missing. In this paper, we propose a scheme to expose tampered AAC audio streams that are encoded at the same encoding bit-rate. Specifically, we design a shift-recompression based method to retrieve …


An Indistinguishability Model For Evaluating Diverse Classes Of Phishing Attacks And Quantifying Attack Efficacy, Narasimha Shashidhar, Lei Chen Jul 2015

An Indistinguishability Model For Evaluating Diverse Classes Of Phishing Attacks And Quantifying Attack Efficacy, Narasimha Shashidhar, Lei Chen

Department of Information Technology Faculty Publications

Phishing is a growing threat to Internet users and causes billions of dollars in damage every year. While there are a number of research articles that study the tactics, techniques and procedures employed by phishers in the literature, in this paper, we present a theoretical yet practical model to study this menacing threat in a formal manner. While it is common folklore knowledge that a successful phishing attack entails creating messages that are indistinguishable from the natural, expected messages by the intended victim, this concept has not been formalized. Our model attempts to capture a phishing attack in terms of …


Cloud Storage Client Application Analysis, Rakesh Malik, Narasimha Shashidhar, Lei Chen Jun 2015

Cloud Storage Client Application Analysis, Rakesh Malik, Narasimha Shashidhar, Lei Chen

Department of Information Technology Faculty Publications

The research proposed in this paper focuses on gathering evidence from devices with UNIX/Linux systems (in particular on Ubuntu 14.04 and Android OS), and Windows 8.1, in order to find artifacts left by cloud storage applications that suggests their use even after the deletion of the applications. The work performed aims to expand upon the prior work done by other researches in the field of cloud forensics and to show an example of analysis. We show where and what type of data remnants can be found using our analysis and how this information can be used as evidence in a …