Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

Volatile Memory Acquisition Tools – A Comparison Across Taint And Correctness, William Campbell Dec 2013

Volatile Memory Acquisition Tools – A Comparison Across Taint And Correctness, William Campbell

Australian Digital Forensics Conference

The growth in volatile memory forensics has steadily increased in recent times. With this growth comes a need to test the tools associated with this practise. Although there appears to be a large amount of effort in testing static memory capture tools, there is perhaps less so for volatile memory capture. This paper describes the attempts at categorizing criteria for testing, and then introduces and extends upon a methodology proposed by Lempereur and colleagues in 2012. Four tools (Windows Memory Reader, WinPmem, FTK Imager and DumpIt) are tested against two criteria (impact and completeness). WMR and DumpIt were found to …


Security Of Internet Protocol Cameras – A Case Example, William Campbell Dec 2013

Security Of Internet Protocol Cameras – A Case Example, William Campbell

Australian Digital Forensics Conference

The interaction of consumer devices and the internet, especially in relation to security, has always been tenuous. Where it is in the best interests of companies to produce products that are cheap and accessible, these traits often go against that of security. This investigation undertakes an analysis of one such device – the DCS 930L internet protocol camera from D Link. This camera is analysed for vulnerabilities, with an emphasis on those relating to authentication mechanisms. Several vulnerabilities are identified, and potential attacks based on these are discussed. Solutions or mitigations to these vulnerabilities are presented.


A Study On Information Induced Medication Errors, Rebecca Hermon, Patricia A.H. Williams Dec 2013

A Study On Information Induced Medication Errors, Rebecca Hermon, Patricia A.H. Williams

Australian eHealth Informatics and Security Conference

Preventable medical adverse events are a serious concern for healthcare. Medication errors form a significant part of these concerns and it is evident that these errors can have serious consequences such as death or disability. Many medication errors are a consequence of information failure. Therefore to prevent such adverse events, the associated information flow must be understood. This research used a systematic review methodology to conduct an analysis of medication error as a result of information failure. Its aim was to suggest solutions on reducing information induced medication errors. The results indicate that is apparent that human error such as …


Forensic Memory Dump Analysis And Recovery Of The Artefacts Of Using Tor Bundle Browser – The Need, Divya Dayalamurthy Dec 2013

Forensic Memory Dump Analysis And Recovery Of The Artefacts Of Using Tor Bundle Browser – The Need, Divya Dayalamurthy

Australian Digital Forensics Conference

The Onion Routing (TOR) project is a network of virtual tunnels that facilitates secure, private communications on the internet. A recent article published in “The Registry” claims that TOR bundle browser usage has increased in recent years; statistics show that in January 2012, there were approximately 950,000 users globally and now in August 2013 that figure is estimated to have reached 1,200,000 users. The report also illustrates that The United states of America and the United Kingdom are major contributors towards the massive increase in TOR usage. Similarly, other countries like India and Brazil have increased usage to 32,000 and …


Sellers Continue To Give Away Confidential Information On Second Hand Memory Cards Sold In Australia, Patryk Szewczyk, Nikki Robins, Krishnun Sansurooah Jan 2013

Sellers Continue To Give Away Confidential Information On Second Hand Memory Cards Sold In Australia, Patryk Szewczyk, Nikki Robins, Krishnun Sansurooah

Australian Digital Forensics Conference

Second hand storage devices can be treasure troves of confidential data. This study investigated the remnant data on second hand memory cards that were purchased through Australian second hand auction websites throughout 2013. Memory cards continue to increase in capacity and are used in both smart phones and tablet computers as persistent storage. During this study a total of 140 second hand memory cards were purchased throughout 2013. Each memory card had its data recovered and subsequently analysed. The results show that sellers are sending memory cards with no evidence of erasure; poor attempts to erase data; or simply asking …


Developing An Explanatory Model For The Process Of Online Radicalisation And Terrorism, Robyn Torok Jan 2013

Developing An Explanatory Model For The Process Of Online Radicalisation And Terrorism, Robyn Torok

Research outputs 2013

While the use of the internet and social media as a tool for extremists and terrorists has been well documented, understanding the mechanisms at work has been much more elusive. This paper begins with a grounded theory approach guided by a new theoretical approach to power that utilizes both terrorism cases and extremist social media groups to develop an explanatory model of radicalization. Preliminary hypotheses are developed, explored and refined in order to develop a comprehensive model which is then presented. This model utilizes and applies concepts from social theorist Michel Foucault, including the use of discourse and networked power …


Removal Of Turbidity From Water By Dissolved Air Flotation And Conventional Sedimentation Systems Using Poly Aluminum Chloride As Coagulant, Mehdi Khiadani, Reza Kolivand, Matin Ahooghalandari, Maral Mohajer Jan 2013

Removal Of Turbidity From Water By Dissolved Air Flotation And Conventional Sedimentation Systems Using Poly Aluminum Chloride As Coagulant, Mehdi Khiadani, Reza Kolivand, Matin Ahooghalandari, Maral Mohajer

Research outputs 2013

Flotation is a method in which particles in liquid phase are transported to the surface by air bubbles. In this experimental study, a comparison has been made between conventional sedimentation and dissolved air flotation (DAF) systems to remove turbidity from water. Initially, optimal operational conditions for each system utilized using water artificially turbid with Kaolin. For each system, samples were taken at 20-min interval after the system reached its optimal operational conditions. Parameters, such as turbidity, alkalinity, temperature, pH, and total suspended solids, were measured. For 20, 30–50 and 90–110 NTU, turbidity average removal efficiencies in DAF system were 14.7, …


Testing A Distributed Denial Of Service Defence Mechanism Using Red Teaming, Samaneh Rastegari, Philip Hingston, Chiou-Peng Lam, Murray Brand Jan 2013

Testing A Distributed Denial Of Service Defence Mechanism Using Red Teaming, Samaneh Rastegari, Philip Hingston, Chiou-Peng Lam, Murray Brand

Research outputs 2013

The increased number of security threats against the Internet has made communications more vulnerable to attacks. Despite much research and improvement in network security, the number of denial of service (DoS) attacks has rapidly grown in frequency, severity, and sophistication in recent years. Thus, serious attention needs to be paid to network security. However, to create a secure network that can stay ahead of all threats, detection and response features are real challenges. In this paper, we look at the the interaction between the attacker and the defender in a Red Team/Blue Team exercise. We also propose a quantitative decision …