Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Social and Behavioral Sciences

I Know What You Did Last Summer: Your Smart Home Internet Of Things And Your Iphone Forensically Ratting You Out, Gokila Dorai, Shiva Houshmand, Ibrahim Baggili Aug 2018

I Know What You Did Last Summer: Your Smart Home Internet Of Things And Your Iphone Forensically Ratting You Out, Gokila Dorai, Shiva Houshmand, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The adoption of smart home Internet of Things (IoT) devices continues to grow. What if your devices can snitch on you and let us know where you are at any given point in time? In this work we examined the forensic artifacts produced by Nest devices, and in specific, we examined the logical backup structure of an iPhone used to control a Nest thermostat, Nest Indoor Camera and a Nest Outdoor Camera. We also integrated the Google Home Mini as another method of controlling the studied Smart Home devices. Our work is the primary account for the examination of Nest …


Digital Forensics In The Next Five Years, Laoise Luciano, Ibrahim Baggili, Mateusz Topor, Peter Casey, Frank Breitinger Aug 2018

Digital Forensics In The Next Five Years, Laoise Luciano, Ibrahim Baggili, Mateusz Topor, Peter Casey, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

Cyber forensics has encountered major obstacles over the last decade and is at a crossroads. This paper presents data that was obtained during the National Workshop on Redefining Cyber Forensics (NWRCF) on May 23-24, 2017 supported by the National Science Foundation and organized by the University of New Haven. Qualitative and quantitative data were analyzed from twenty-four cyber forensics expert panel members. This work identified important themes that need to be addressed by the community, focusing on (1) where the domain currently is; (2) where it needs to go and; (3) steps needed to improve it. Furthermore, based on the …


Beyond The Local: Places, People, And Brands In New England Beer Marketing, Jeffrey S. Debies-Carl Aug 2018

Beyond The Local: Places, People, And Brands In New England Beer Marketing, Jeffrey S. Debies-Carl

Sociology Faculty Publications

Despite decades of domination by a few large companies, the American beer market has seen a dramatic resurgence of microbreweries. Contrary to conventional oligopolistic market theories, small firms have consistently gained market share from their entrenched competitors. Researchers have attributed this success to ‘neolocalism.’ Through their marketing, microbreweries appeal to consumers’ desire for connections to real people and distinctive products from local places. However, no study has verified whether this pattern is most characteristic of microbreweries. With newer firms threatening their market share, larger firms might adopt neolocal claims, but little empirical attention has been directed at large brewers, and …


Forensic Analysis Of Immersive Virtual Reality Social Applications: A Primary Account, Ananya Yarramreddy, Peter Gromkowski, Ibrahim Baggili Aug 2018

Forensic Analysis Of Immersive Virtual Reality Social Applications: A Primary Account, Ananya Yarramreddy, Peter Gromkowski, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Our work presents the primary account for exploring the forensics of immersive Virtual Reality (VR) systems and their social applications. The Social VR applications studied in this work include Bigscreen, Altspace VR, Rec Room and Facebook Spaces. We explored the two most widely adopted consumer VR systems: the HTC Vive and the Oculus Rift. Our tests examined the efficacy of reconstructing evidence from network traffic as well as the systems themselves. The results showed that a significant amount of forensically relevant data such as user names, user profile pictures, events, and system details may be recovered. We anticipate that this …


Survey Results On Adults And Cybersecurity Education, Frank Breitinger, Joseph Ricci, Ibrahim Baggili Jul 2018

Survey Results On Adults And Cybersecurity Education, Frank Breitinger, Joseph Ricci, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Cyberattacks and identity theft are common problems nowadays where researchers often say that humans are the weakest link in the security chain. Therefore, this survey focused on analyzing the interest for adults for ‘cyber threat education seminars’, e.g., how to project themselves and their loved ones. Specifically, we asked questions to understand a possible audience, willingness for paying / time commitment, or fields of interest as well as background and previous training experience. The survey was conducted in late 2016 and taken by 233 participants. The results show that many are worried about cyber threats and about their children exploring …


Experience Constructing The Artifact Genome Project (Agp): Managing The Domain's Knowledge One Artifact At A Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, Frank Breitinger Jul 2018

Experience Constructing The Artifact Genome Project (Agp): Managing The Domain's Knowledge One Artifact At A Time, Cinthya Grajeda, Laura Sanchez, Ibrahim Baggili, Devon R. Clark, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

While various tools have been created to assist the digital forensics community with acquiring, processing, and organizing evidence and indicating the existence of artifacts, very few attempts have been made to establish a centralized system for archiving artifacts. The Artifact Genome Project (AGP) has aimed to create the largest vetted and freely available digital forensics repository for Curated Forensic Artifacts (CuFAs). This paper details the experience of building, implementing, and maintaining such a system by sharing design decisions, lessons learned, and future work. We also discuss the impact of AGP in both the professional and academic realms of digital forensics. …


An Overview Of The Usage Of Default Passwords, Brandon Knierem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim Baggili Jan 2018

An Overview Of The Usage Of Default Passwords, Brandon Knierem, Xiaolu Zhang, Philip Levine, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

The recent Mirai botnet attack demonstrated the danger of using default passwords and showed it is still a major problem. In this study we investigated several common applications and their password policies. Specifically, we analyzed if these applications: (1) have default passwords or (2) allow the user to set a weak password (i.e., they do not properly enforce a password policy). Our study shows that default passwords are still a significant problem: 61% of applications inspected initially used a default or blank password. When changing the password, 58% allowed a blank password, 35% allowed a weak password of 1 character.


Is Forensic Science In Danger Of Extinction?, David San Pietro, Brooke Weinger Kammrath, Peter R. De Forest Jan 2018

Is Forensic Science In Danger Of Extinction?, David San Pietro, Brooke Weinger Kammrath, Peter R. De Forest

Forensic Science Publications

Observations of modern day forensic science has prompted asking the question of whether this field is in danger of extinction. Although there have undoubtedly been meaningful advancements in analytical capabilities, we have overlooked several unintended practical and philosophical consequences. This article addresses three main areas of concern: the declining role of the generalist in an era of increased specialization, the role of education in preparing the next generation of forensic scientists, and the implementation of advanced instrumentation with a focus on statistical significance and field deployable instrumentation.


Investigating The Isolation And Amplification Of Micrornas For Forensic Body Fluid Identification, Kelsie R. O'Leary, Claire L. Glynn Jan 2018

Investigating The Isolation And Amplification Of Micrornas For Forensic Body Fluid Identification, Kelsie R. O'Leary, Claire L. Glynn

Forensic Science Publications

Background: The discovery of forensic DNA typing evolved molecular biology far beyond what could have been expected in terms of its forensic application, and now there exists other developments in molecular biology which are ready for application to forensic challenges. One such challenge is the identification of the body fluid source of stains recovered from evidence items and crime scenes. Currently there are significant efforts in the research field to develop novel methods for the molecular identification of body fluids, with microRNAs (miRNAs) revealing great potential. MiRNAs have been shown to have high tissue specificity and are less susceptible to …


Illicit And Counterfeit Drug Analysis By Morphologically Directed Raman Spectroscopy, Andrew Koutrakos, Pauline E. Leary, Brooke Weinger Kammrath Jan 2018

Illicit And Counterfeit Drug Analysis By Morphologically Directed Raman Spectroscopy, Andrew Koutrakos, Pauline E. Leary, Brooke Weinger Kammrath

Forensic Science Publications

Morphologically directed Raman spectroscopy (MDRS) is a novel tool for the forensic analysis of illicit and counterfeit drug samples. MDRS combines Raman microspectroscopy with automated particle imaging so that physical and chemical information about the components of a mixture sample can be obtained. Results of automated particle imaging are used to determine samples for Raman analysis. The use of MDRS for these types of samples can be employed for both forensic investigations and adjudications of cases. The method provides insight about the physical and chemical composition of the sample, as well as about manufacturing and sample history. Here, MDRS was …


Morphologically Directed Raman Spectroscopic Analysis Of Forensic Samples, Brooke Weinger Kammrath, Andrew Koutrakos, Pauline E. Leary, Josemar A. Castillo, Joe Wolfgang, Deborah Huck-Jones Jan 2018

Morphologically Directed Raman Spectroscopic Analysis Of Forensic Samples, Brooke Weinger Kammrath, Andrew Koutrakos, Pauline E. Leary, Josemar A. Castillo, Joe Wolfgang, Deborah Huck-Jones

Forensic Science Publications

Morphologically directed Raman spectroscopy (MDRS) is a novel and reliable tool that would enable criminalists to obtain more discriminatory information from forensic samples than their current capabilities. MDRS combines automated particle imaging and Raman spectroscopy into one instrument. Particle imaging is performed to determine particle size and shape distributions of components in a blended sample. Particle size is an important physical property of particulate samples and can be used in conjunction with Raman spectroscopy in the analysis of a range of samples of forensic interest, including illicit and counterfeit drugs, soils, gunshot residue (GSR), and white powders. Although measurement of …


If I Had A Million Cryptos: Cryptowallet Application Analysis And A Trojan Proof-Of-Concept, Trevor Haigh, Frank Breitinger, Ibrahim Baggili Jan 2018

If I Had A Million Cryptos: Cryptowallet Application Analysis And A Trojan Proof-Of-Concept, Trevor Haigh, Frank Breitinger, Ibrahim Baggili

Electrical & Computer Engineering and Computer Science Faculty Publications

Cryptocurrencies have gained wide adoption by enthusiasts and investors. In this work, we examine seven different Android cryptowallet applications for forensic artifacts, but we also assess their security against tampering and reverse engineering. Some of the biggest benefits of cryptocurrency is its security and relative anonymity. For this reason it is vital that wallet applications share the same properties. Our work, however, indicates that this is not the case. Five of the seven applications we tested do not implement basic security measures against reverse engineering. Three of the applications stored sensitive information, like wallet private keys, insecurely and one was …