Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Cybercrime (4)
- Attacks (2)
- Cryptocurrency (2)
- Distributed storage attacks (2)
- Forensics (2)
-
- Frameup (2)
- Security (2)
- 1 (1)
- 2 indanedione (1)
- Adhesive (1)
- Analytical Chemistry (1)
- Applications (1)
- Approximate matching (1)
- Artifact lookup (1)
- Artifacts (1)
- Artificial Intelligence Forensics (1)
- Artificial Intelligence Safety (1)
- Artificial intelligence (1)
- Awareness (1)
- Birefringence (1)
- Blockchain (1)
- Carving (1)
- Child sexual abuse material (1)
- Children's Temporary Tattoos (1)
- Clandestine Organ Transplants (1)
- Cloud (1)
- Cloud storage (1)
- Cloud storage. (1)
- Co-extraction (1)
- Communication (1)
- Publication
- Publication Type
Articles 1 - 28 of 28
Full-Text Articles in Physical Sciences and Mathematics
Founding The Domain Of Ai Forensics, Ibrahim Baggili, Vahid Behzadan
Founding The Domain Of Ai Forensics, Ibrahim Baggili, Vahid Behzadan
Electrical & Computer Engineering and Computer Science Faculty Publications
With the widespread integration of AI in everyday and critical technologies, it seems inevitable to witness increasing instances of failure in AI systems. In such cases, there arises a need for technical investigations that produce legally acceptable and scientifically indisputable findings and conclusions on the causes of such failures. Inspired by the domain of cyber forensics, this paper introduces the need for the establishment of AI Forensics as a new discipline under AI safety. Furthermore, we propose a taxonomy of the subfields under this discipline, and present a discussion on the foundational challenges that lay ahead of this new research …
A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier
A University-Based Forensics Training Center As A Regional Outreach, Education, And Research Activity, Rayford B. Vaughn, David A. Dampier
David Dampier
This paper describes a university-based Forensics Training Center (FTC) established by a Department of Justice grant for the purpose of improving the ability of state and local law enforcement in the Southeastern part of the United States to address the rising incidence of computer based crime. The FTC effort is described along with supporting evidence of its need. The program is not only a service activity, but also contributes to the Mississippi State University (MSU) security program pedagogy, and research effort.
An Exploratory Perception Analysis Of Consensual And Nonconsensual Image Sharing, Jin Ree Lee, Steven Downing
An Exploratory Perception Analysis Of Consensual And Nonconsensual Image Sharing, Jin Ree Lee, Steven Downing
International Journal of Cybersecurity Intelligence & Cybercrime
Limited research has considered individual perceptions of moral distinctions between consensual and nonconsensual intimate image sharing, as well as decision making parameters around why others might engage in such behavior. The current study conducted a perception analysis using mixed-methods online surveys administered to 63 participants, inquiring into their perceptions of why individuals engage in certain behaviors surrounding the sending of intimate images from friends and partners. The study found that respondents favored the concepts of (1) sharing images with romantic partners over peers; (2) sharing non-intimate images over intimate images; and (3) sharing images with consent rather than without it. …
The Future Of Cybercrime Prevention Strategies: Human Factors And A Holistic Approach To Cyber Intelligence, Sinchul Back, Jennifer Laprade
The Future Of Cybercrime Prevention Strategies: Human Factors And A Holistic Approach To Cyber Intelligence, Sinchul Back, Jennifer Laprade
International Journal of Cybersecurity Intelligence & Cybercrime
New technology is rapidly emerging to fight increasing cybercrime threats, however, there is one important component of a cybercrime that technology cannot always impact and that is human behavior. Unfortunately, humans can be vulnerable and easily deceived making technological advances alone inadequate in the cybercrime fight. Instead, we must take a more holistic approach by using technology and better understanding the human factors that make cybercrime possible. In this issue of the International Journal of Cybersecurity Intelligence and Cybercrime, three studies contribute to our knowledge of human factors and emerging cybercrime technology so that more effective comprehensive cybercrime prevention strategies …
Blockchain Security: Situational Crime Prevention Theory And Distributed Cyber Systems, Nicholas J. Blasco, Nicholas A. Fett
Blockchain Security: Situational Crime Prevention Theory And Distributed Cyber Systems, Nicholas J. Blasco, Nicholas A. Fett
International Journal of Cybersecurity Intelligence & Cybercrime
The authors laid the groundwork for analyzing the crypto-economic incentives of interconnected blockchain networks and utilize situational crime prevention theory to explain how more secure systems can be developed. Blockchain networks utilize smaller blockchains (often called sidechains) to increase throughput in larger networks. Identified are several disadvantages to using sidechains that create critical exposures to the assets locked on them. Without security being provided by the mainchain in the form of validated exits, sidechains or statechannels which have a bridge or mainchain asset representations are at significant risk of attack. The inability to have a sufficiently high cost to attack …
A Test Of Structural Model For Fear Of Crime In Social Networking Sites, Seong-Sik Lee, Kyung-Shick Choi, Sinyong Choi, Elizabeth Englander
A Test Of Structural Model For Fear Of Crime In Social Networking Sites, Seong-Sik Lee, Kyung-Shick Choi, Sinyong Choi, Elizabeth Englander
International Journal of Cybersecurity Intelligence & Cybercrime
This study constructed a structural model which consists of social demographic factors, experience of victimization, opportunity factors, and social context factors to explain the public’s fear of crime on social networking sites (SNS). The model is based on the risk interpretation model, which predicts that these factors influence users’ fear of crime victimization. Using data from 486 university students in South Korea, an empirically-tested model suggests that sex and age have direct and significant effects on fear of victimization, supporting the vulnerability hypothesis. Among opportunity factors, the level of personal information and the number of offending peers have significant effects …
Dna Recovery From Handwritten Documents Using A Novel Vacuum Technique, Patrick M. Mclaughlin
Dna Recovery From Handwritten Documents Using A Novel Vacuum Technique, Patrick M. Mclaughlin
Student Theses
Investigations of many crimes such as robberies, kidnappings, and terrorism are often associated with the recovery of a paper document which has been written by the perpetrator. Paper can provide a variety of forensic evidence such as DNA, latent fingermarks, and indented writing. The focus of this study was the collection of probative DNA profiles from the text region of a handwritten note through a vacuum suction device without altering or destroying the document. Collection of DNA evidence was carried out in two separate groups. The first group involved 11 volunteers providing a handwritten note sample with unwashed hands. The …
An Exploration Of Protein And Dna Components In Fingerprint Residue, Ashley Borrego
An Exploration Of Protein And Dna Components In Fingerprint Residue, Ashley Borrego
Student Theses
The main focus of this project was to investigate the protein and DNA components in both sebaceous and eccrine fingerprints. This study investigated the relative content of DNA and proteins in eccrine fingerprints to sebaceous fingerprints. All volunteers were instructed to wash and dry their hands prior to depositing parallel thumbprints. Twenty volunteers were instructed to touch their face to produce sebaceous prints, and 5 volunteers were instructed to wear gloves over a heat source to produce sweaty or eccrine prints. Microscopy was used to score the cellular debris of the right fingerprint on a scale of 1-4 based on …
Map My Murder: A Digital Forensic Study Of Mobile Health And Fitness Applications, Courtney Hassenfeldt, Shabana Baig, Ibrahim Baggili, Xiaolu Zhang
Map My Murder: A Digital Forensic Study Of Mobile Health And Fitness Applications, Courtney Hassenfeldt, Shabana Baig, Ibrahim Baggili, Xiaolu Zhang
Electrical & Computer Engineering and Computer Science Faculty Publications
The ongoing popularity of health and fitness applications catalyzes
the need for exploring forensic artifacts produced by them. Sensitive
Personal Identifiable Information (PII) is requested by the applications
during account creation. Augmenting that with ongoing
user activities, such as the user’s walking paths, could potentially
create exculpatory or inculpatory digital evidence. We conducted
extensive manual analysis and explored forensic artifacts produced
by (n = 13) popular Android mobile health and fitness applications.
We also developed and implemented a tool that aided in the timely
acquisition and identification of artifacts from the examined applications.
Additionally, our work explored the type of …
Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili
Iot Ignorance Is Digital Forensics Research Bliss: A Survey To Understand Iot Forensics Definitions, Challenges And Future Research Directions, Tina Wu, Frank Breitinger, Ibrahim Baggili
Electrical & Computer Engineering and Computer Science Faculty Publications
Interactions with IoT devices generates vast amounts of personal data that can be used as a source of evidence in digital investigations. Currently, there are many challenges in IoT forensics such as the difficulty in acquiring and analysing IoT data/devices and the lack IoT forensic tools. Besides technical challenges, there are many concepts in IoT forensics that have yet to be explored such as definitions, experience and capability in the analysis of IoT data/devices and current/future challenges. A deeper understanding of these various concepts will help progress the field. To achieve this goal, we conducted a survey which received 70 …
The Forensic Analysis Of Adult Temporary Tattoos, Paige Cooper
The Forensic Analysis Of Adult Temporary Tattoos, Paige Cooper
Student Theses
Adult temporary tattoos have become more popular, yet there is very little research on them, especially regarding their use in forensics. This poses a problem because forensic investigators may not be able to distinguish a temporary tattoo from a real tattoo, possibly hindering their investigation. In this study, various types of adult temporary tattoos were examined and analyzed in attempts to identify and distinguish them, both from each other and from permanent tattoos. Infrared spectroscopy, specifically attenuated total reflection (ATR), proved to be more useful than ultra-violet visible light spectroscopy in terms of analyzing the samples. The natural adult temporary …
The Forensic Analysis Of Children's Temporary Tattoos, Erika Bravo
The Forensic Analysis Of Children's Temporary Tattoos, Erika Bravo
Student Theses
While children’s temporary tattoos have been produced since the 20th century, there are few scientific studies that have evaluated their physical and chemical characteristics. Therefore, this thesis is a preliminary study done to evaluate the composition of children’s temporary tattoos and consider the importance of such traces in a forensic content.
Colored regions in children’s temporary tattoos, such as red, pink, yellow and orange, were found to fluoresce with the use of an alternative light source while the use of microscopy led to the identification of different printing patterns between temporary tattoos. However, limitations in the ability to determine the …
Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik
Forensic Analysis Of Spy Applications In Android Devices, Shinelle Hutchinson, Umit Karabiyik
Annual ADFSL Conference on Digital Forensics, Security and Law
Smartphones with Google's Android operating system are becoming more and more popular each year, and with this increased user base, comes increased opportunities to collect more of these users' private data. There have been several instances of malware being made available via the Google Play Store, which is one of the predominant means for users to download applications. One effective way of collecting users' private data is by using Android Spyware. In this paper, we conduct a forensic analysis of a malicious Android spyware application and present our findings. We also highlight what information the application accesses and what it …
Methodological Improvements In The Mrna Profiling Assays For Incorporation Into Dna Casework Workflows, Paris Volk
Methodological Improvements In The Mrna Profiling Assays For Incorporation Into Dna Casework Workflows, Paris Volk
Electronic Theses and Dissertations
Currently, DNA profiling is the gold standard to identify an individual. However, determining body fluid origin is important in criminal investigations, offering additional information surrounding the circumstances of a crime. However, crime labs can only definitively identify blood and semen and presumptively saliva using techniques that consume time and sample and do not simultaneously identify all forensically relevant body fluids. This causes many crime labs to want to bypass body fluid identification altogether. Therefore, advances into more definitive molecular-based body fluid methods are necessary. One such technique is mRNA profiling because it provides a highly sensitive and specific approach to …
Determining The Interference Of Lactate And Lactate Dehydrogenase In An Ethanol Enzyme Assay, Julia Liebl
Determining The Interference Of Lactate And Lactate Dehydrogenase In An Ethanol Enzyme Assay, Julia Liebl
Master's Theses
Enzymatic ethanol assays are widely used to determine blood alcohol content for individuals admitted to a hospital. In some instances, this hospital data is later used as evidence in a court of law, most commonly in DUI cases. As the enzymatic assay targets, but does not exclusively measure ethanol, it is theoretically possible that interference could occur and produce a falsely elevated result, leading to wrongful convictions or other consequences. This project examined the potential of clinically relevant levels of one potential interferant, lactate and the hepatic enzyme lactate dehydrogenase (LDH) to cause significant and falsely elevated results. Threshold levels …
The Forensic Analysis Of Skin-Safe Stamp Pad Inks, Swetha Rajagopal
The Forensic Analysis Of Skin-Safe Stamp Pad Inks, Swetha Rajagopal
Student Theses
Skin-safe stamp pad inks are currently being used at locations such as clubs, zoos and other events with the purpose of stamping individuals that visit the location. This is done in an attempt to monitor the number and activity of visitors. Ink manufacturing companies generally tend to experiment with a number of different combinations of the different components of ink, in order to obtain desirable properties. The combinations are usually proprietary and that very nature of the inks ends up making them, possibly unique and individual. The analysis, identification and possible individualization of the chemical composition of these inks could …
On Efficiency Of Artifact Lookup Strategies In Digital Forensics, Lorenz Liebler, Patrick Schmitt, Harald Baier, Frank Breitinger
On Efficiency Of Artifact Lookup Strategies In Digital Forensics, Lorenz Liebler, Patrick Schmitt, Harald Baier, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
In recent years different strategies have been proposed to handle the problem of ever-growing digital forensic databases. One concept to deal with this data overload is data reduction, which essentially means to separate the wheat from the chaff, e.g., to filter in forensically relevant data. A prominent technique in the context of data reduction are hash-based solutions. Data reduction is achieved because hash values (of possibly large data input) are much smaller than the original input. Today's approaches of storing hash-based data fragments reach from large scale multithreaded databases to simple Bloom filter representations. One main focus was put on …
A Framework To Reveal Clandestine Organ Trafficking In The Dark Web And Beyond, Michael P. Heinl, Bo Yu, Duminda Wijesekera
A Framework To Reveal Clandestine Organ Trafficking In The Dark Web And Beyond, Michael P. Heinl, Bo Yu, Duminda Wijesekera
Journal of Digital Forensics, Security and Law
Due to the scarcity of transplantable organs, patients have to wait on long lists for many years to get a matching kidney. This scarcity has created an illicit market place for wealthy recipients to avoid long waiting times. Brokers arrange such organ transplants and collect most of the payment that is sometimes channeled to fund other illicit activities. In order to collect and disburse payments, they often resort to money laundering-like schemes of money transfers. As the low-cost Internet arrives in some of the affected countries, social media and the dark web are used to illegally trade human organs. This …
Immersive Virtual Reality Attacks And The Human Joystick, Peter Casey, Ibrahim Baggili, Ananya Yarramreddy
Immersive Virtual Reality Attacks And The Human Joystick, Peter Casey, Ibrahim Baggili, Ananya Yarramreddy
Electrical & Computer Engineering and Computer Science Faculty Publications
This is one of the first accounts for the security analysis of consumer immersive Virtual Reality (VR) systems. This work breaks new ground, coins new terms, and constructs proof of concept implementations of attacks related to immersive VR. Our work used the two most widely adopted immersive VR systems, the HTC Vive, and the Oculus Rift. More specifically, we were able to create attacks that can potentially disorient users, turn their Head Mounted Display (HMD) camera on without their knowledge, overlay images in their field of vision, and modify VR environmental factors that force them into hitting physical objects and …
Frameup: An Incriminatory Attack On Storj: A Peer To Peer Blockchain Enabled Distributed Storage System, Xiaolu Zhang, Justin Grannis, Ibrahim Baggili, Nicole Lang Beebe
Frameup: An Incriminatory Attack On Storj: A Peer To Peer Blockchain Enabled Distributed Storage System, Xiaolu Zhang, Justin Grannis, Ibrahim Baggili, Nicole Lang Beebe
Electrical & Computer Engineering and Computer Science Faculty Publications
In this work we present a primary account of frameup, an incriminatory attack made possible because of existing implementations in distributed peer to peer storage. The frameup attack shows that an adversary has the ability to store unencrypted data on the hard drives of people renting out their hard drive space. This is important to forensic examiners as it opens the door for possibly framing an innocent victim. Our work employs Storj as an example technology, due to its popularity and market size. Storj is a blockchain enabled system that allows people to rent out their hard drive space …
Cybercrime And Digital Forensics: Bridging The Gap In Legislation, Investigation And Prosecution Of Cybercrime In Nigeria, Kabiru H. Mohammed, Yusuf D. Mohammed, Abiodun A. Solanke
Cybercrime And Digital Forensics: Bridging The Gap In Legislation, Investigation And Prosecution Of Cybercrime In Nigeria, Kabiru H. Mohammed, Yusuf D. Mohammed, Abiodun A. Solanke
International Journal of Cybersecurity Intelligence & Cybercrime
The advancement of Information and Communication Technologies (ICT) opens new avenues and ways for cybercriminals to commit crime. The primary goal of this paper is to raise awareness regarding gaps that exist with regards to Nigeria’s capabilities to adequately legislate, investigate and prosecute cases of cybercrimes. The major source of cybercrime legislation in Nigeria is an act of the National Assembly which is majorly a symbolic legislation rather than a full and active legislation. In perusing these avenues of inquiry, the authors seek to identify systemic impediments which hinder law enforcement agencies, prosecutors, and investigators from properly carrying out their …
Examining Perceptions Of Online Harassment Among Constables In England And Wales, Thomas J. Holt, Jin R. Lee, Roberta Liggett, Karen M. Holt, Adam Bossler
Examining Perceptions Of Online Harassment Among Constables In England And Wales, Thomas J. Holt, Jin R. Lee, Roberta Liggett, Karen M. Holt, Adam Bossler
International Journal of Cybersecurity Intelligence & Cybercrime
The ubiquity of the Internet and computer technology has enabled individuals to engage in bullying, threats, and harassing communications online. Limited research has found that local line officers may not view these offenses as serious compared to real world crimes despite their negative physical and emotional impact on victims. The perceptions of officers can produce poor interactions with victims during calls for service, particularly victim blaming, which can reduce citizens’ confidence in police agencies generally. However, local law enforcement agencies are increasingly mandated to respond to these cases, calling to question how their views may impact the community. This study …
Awareness And Perception Of Cybercrimes And Cybercriminals, Hannarae Lee, Hyeyoung Lim
Awareness And Perception Of Cybercrimes And Cybercriminals, Hannarae Lee, Hyeyoung Lim
International Journal of Cybersecurity Intelligence & Cybercrime
Awareness is a starting point to recognize, understand, or know a situation or fact, and the perception makes a difference in how to deal with it. Although the term cybercrime may not be new to the most public and the police, not all of them are well aware of the nature and extent of cybercrimes, cybercriminals, and cyber-victims, which in turn affects their perceptions of matters. The four papers in this issue of the International Journal of Cybersecurity Intelligence and Cybercrime empirically examine these important topics and discuss policy implications.
A Practitioner Survey Exploring The Value Of Forensic Tools, Ai, Filtering, & Safer Presentation For Investigating Child Sexual Abuse Material, Laura Sanchez, Cinthya Grajeda, Ibrahim Baggili, Cory Hall
A Practitioner Survey Exploring The Value Of Forensic Tools, Ai, Filtering, & Safer Presentation For Investigating Child Sexual Abuse Material, Laura Sanchez, Cinthya Grajeda, Ibrahim Baggili, Cory Hall
Electrical & Computer Engineering and Computer Science Faculty Publications
For those investigating cases of Child Sexual Abuse Material (CSAM), there is the potential harm of experiencing trauma after illicit content exposure over a period of time. Research has shown that those working on such cases can experience psychological distress. As a result, there has been a greater effort to create and implement technologies that reduce exposure to CSAM. However, not much work has explored gathering insight regarding the functionality, effectiveness, accuracy, and importance of digital forensic tools and data science technologies from practitioners who use them. This study focused specifically on examining the value practitioners give to the tools …
Inception: Virtual Space In Memory Space In Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, Frank Breitinger
Inception: Virtual Space In Memory Space In Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, Frank Breitinger
Electrical & Computer Engineering and Computer Science Faculty Publications
Virtual Reality (VR) has become a reality. With the technology's increased use cases, comes its misuse. Malware affecting the Virtual Environment (VE) may prevent an investigator from ascertaining virtual information from a physical scene, or from traditional “dead” analysis. Following the trend of antiforensics, evidence of an attack may only be found in memory, along with many other volatile data points. Our work provides the primary account for the memory forensics of Immersive VR systems, and in specific the HTC Vive. Our approach is capable of reconstituting artifacts from memory that are relevant to the VE, and is also capable …
Quantitative Analysis Of Xylene Mixtures Using A Handheld Raman Spectrometer, Lauren Reilly
Quantitative Analysis Of Xylene Mixtures Using A Handheld Raman Spectrometer, Lauren Reilly
Honors College Theses
No abstract provided.
An Investigation Of Textile Fibers By Means Of Rgb Analysis Of Birefringence, Olivia F. Feild
An Investigation Of Textile Fibers By Means Of Rgb Analysis Of Birefringence, Olivia F. Feild
Honors Undergraduate Theses
Fiber analysis using birefringence has been around for years but has only recently been looked at more closely under a microscope. Recent scientists have proposed methods to correct issues found with fiber analysis using birefringence, yet there has not be a defined perfect method. This research will focus on correcting previously found issues with works by Michel-Lévy and Sorensen's, as well as other scientists involved and perfecting the analysis of fiber through birefringence. The goal will be to take this research one step further into the analysis of textile fibers by RGB value analysis and birefringence. The RGB values will …
Compound-Specific Isotope Analysis Of Amino Acids In Biological Tissues: Applications In Forensic Entomology, Food Authentication And Soft-Biometrics In Humans, Mayara Patricia Viana De Matos
Compound-Specific Isotope Analysis Of Amino Acids In Biological Tissues: Applications In Forensic Entomology, Food Authentication And Soft-Biometrics In Humans, Mayara Patricia Viana De Matos
Graduate Theses, Dissertations, and Problem Reports
In this work we demonstrate the power of compound-specific isotope analysis (CSIA) to analyze proteinaceous biological materials in three distinct forensic applications, including: 1) linking necrophagous blow flies in different life stages to their primary carrion diet; 2) identifying the harvesting area of oysters for food authentication purposes; and 3) the ability to predict biometric traits about humans from their hair.
In the first application, we measured the amino-acid-level fractionation that occurs at each major life stage of Calliphora vicina (Robineau-Desvoidy) (Diptera: Calliphoridae) blow flies. Adult blow flies oviposited on raw pork muscle, beef muscle, or chicken liver. Larvae, pupae …