Difference between revisions of "Main Page"

From ForensicsWiki
Jump to: navigation, search
m
m
Line 4: Line 4:
 
Much of [[computer forensics]] is focused on the [[tools]] and [[techniques]] used by [[investigator]]s, but there are also a number of important [[papers]], [[people]], and [[organizations]] involved. Many of those organizations sponsor [[conferences]] throughout the year and around the world. You may also wish to examine the popular [[journals]] and some special [[reports]].
 
Much of [[computer forensics]] is focused on the [[tools]] and [[techniques]] used by [[investigator]]s, but there are also a number of important [[papers]], [[people]], and [[organizations]] involved. Many of those organizations sponsor [[conferences]] throughout the year and around the world. You may also wish to examine the popular [[journals]] and some special [[reports]].
 
</div>   
 
</div>   
 
<b>WIKI MAINTENANCE NOTE: We have re-installed mediawiki. New anti-spam measures and account re-confirmation software is in effect. Please let us know if you have problems on the [[Contact Form]]</b>
 
  
  
Line 15: Line 13:
 
<h2 style="margin:0; background-color:#ffff33; font-size:120%; font-weight:bold; border:1px solid #afa3bf; text-align:left; color:#000; padding-left:0.4em; padding-top:0.2em; padding-bottom:0.2em;"> Featured Forensic Research </h2>
 
<h2 style="margin:0; background-color:#ffff33; font-size:120%; font-weight:bold; border:1px solid #afa3bf; text-align:left; color:#000; padding-left:0.4em; padding-top:0.2em; padding-bottom:0.2em;"> Featured Forensic Research </h2>
  
<small>Dec 2011</small>
+
<small>JAN 2012</small>
 
    
 
    
 
<bibtex>
 
<bibtex>
@INPROCEEDINGS{5931110,  
+
@article{10.1109/CIS.2011.180,
author={Baier, H. and Breitinger, F.},
+
author = {Vrizlynn L.L. Thing and Tong-Wei Chua and Ming-Lee Cheong},
booktitle={IT Security Incident Management and IT Forensics (IMF), 2011 Sixth International Conference on},  
+
title = {Design of a Digital Forensics Evidence Reconstruction System for Complex and Obscure Fragmented File Carving},
title={Security Aspects of Piecewise Hashing in Computer Forensics},  
+
journal ={Computational Intelligence and Security, International Conference on},
year={2011},  
+
volume = {0},
month={may},  
+
isbn = {978-0-7695-4584-4},
volume={},  
+
year = {2011},
number={},  
+
pages = {793-797},
pages={21 -36},  
+
doi = {http://doi.ieeecomputersociety.org/10.1109/CIS.2011.180},
keywords={MD5 hash function;SHA-1 hash function;computer forensics;cryptographic hash function;piecewise hashing security aspect;pseudorandom number generator;security analysis;computer forensics;cryptography;random number generation;},  
+
publisher = {IEEE Computer Society},
doi={10.1109/IMF.2011.16},  
+
address = {Los Alamitos, CA, USA},
abstract="Although hash functions are a well-known method in computer science to map arbitrary large data to bit strings of a fixed length, their use in computer forensics is currently very limited. As of today, in a pre-step process hash values of files are generated and stored in a database, typically a cryptographic hash function like MD5 or SHA-1 is used. Later the investigator computes hash values of files, which he finds on a storage medium, and performs look ups in his database. This approach has several drawbacks, which have been sketched in the community, and some alternative approaches have been proposed. The most popular one is due to Jesse Kornblum, who transferred ideas from spam detection to computer forensics in order to identify similar files. However, his proposal lacks a thorough security analysis. It is therefore one aim of the paper at hand to present some possible attack vectors of an active adversary to bypass Kornblum's approach. Furthermore, we present a pseudo random number generator being both more efficient and more random compared to Kornblum's pseudo random number generator."
+
}
ISSN={},}
+
 
</bibtex>
 
</bibtex>
Although hash functions are a well-known method in computer science to map arbitrary large data to bit strings of a fixed length, their use in computer forensics is currently very limited. As of today, in a pre-step process hash values of files are generated and stored in a database, typically a cryptographic hash function like MD5 or SHA-1 is used. Later the investigator computes hash values of files, which he finds on a storage medium, and performs look ups in his database. This approach has several drawbacks, which have been sketched in the community, and some alternative approaches have been proposed. The most popular one is due to Jesse Kornblum, who transferred ideas from spam detection to computer forensics in order to identify similar files. However, his proposal lacks a thorough security analysis. It is therefore one aim of the paper at hand to present some possible attack vectors of an active adversary to bypass Kornblum's approach. Furthermore, we present a pseudo random number generator being both more efficient and more random compared to Kornblum's pseudo random number generator.
+
Fragmented file carving is an important technique in Digital Forensics to recover files from their fragments in the absence of the file system allocation information. In this paper, we proposed a system design for solving the fragmented file carving problem taking into consideration, conditions of real-life fragmentation scenarios. We developed our evidence reconstruction and recovery system, and carried out experiments, to evaluate the capability in detecting and recovering obscured evidence. The results showed that our system is able to achieve a higher efficiency and accuracy (e.g. 1.5 minutes for the reconstruction of each highly fragmented and deleted (obscured) image in its entirety or 100% recovery), when compared with the commercial recovery system, Adroit Photo Forensics (e.g. 2.8 minutes and 6.3 minutes for a partial image recovery or failure in recovery, respectively).
 
+
 
(See also [[Past Selected Articles]])
 
(See also [[Past Selected Articles]])
  

Revision as of 02:57, 24 January 2012

This is the Forensics Wiki, a Creative Commons-licensed wiki devoted to information about digital forensics (also known as computer forensics). We currently list a total of 707 pages.

Much of computer forensics is focused on the tools and techniques used by investigators, but there are also a number of important papers, people, and organizations involved. Many of those organizations sponsor conferences throughout the year and around the world. You may also wish to examine the popular journals and some special reports.


Featured Forensic Research

JAN 2012

Vrizlynn L.L. Thing, Tong-Wei Chua, Ming-Lee Cheong - Design of a Digital Forensics Evidence Reconstruction System for Complex and Obscure Fragmented File Carving
Computational Intelligence and Security, International Conference on 0:793-797, Los Alamitos, CA, USA,2011
Bibtex
Author : Vrizlynn L.L. Thing, Tong-Wei Chua, Ming-Lee Cheong
Title : Design of a Digital Forensics Evidence Reconstruction System for Complex and Obscure Fragmented File Carving
In : Computational Intelligence and Security, International Conference on -
Address : Los Alamitos, CA, USA
Date : 2011

Fragmented file carving is an important technique in Digital Forensics to recover files from their fragments in the absence of the file system allocation information. In this paper, we proposed a system design for solving the fragmented file carving problem taking into consideration, conditions of real-life fragmentation scenarios. We developed our evidence reconstruction and recovery system, and carried out experiments, to evaluate the capability in detecting and recovering obscured evidence. The results showed that our system is able to achieve a higher efficiency and accuracy (e.g. 1.5 minutes for the reconstruction of each highly fragmented and deleted (obscured) image in its entirety or 100% recovery), when compared with the commercial recovery system, Adroit Photo Forensics (e.g. 2.8 minutes and 6.3 minutes for a partial image recovery or failure in recovery, respectively). (See also Past Selected Articles)

Featured Article

Forensic Linux Live CD issues
Forensic Linux Live CD distributions are widely used during computer forensic investigations. Currently, many vendors of such Live CD distributions state that their Linux do not modify the contents of hard drives or employ "write protection." Testing indicates that this may not always be the case. Read More...


Topics



You can help! We have a list of articles that need to be expanded. If you know anything about any of these topics, please feel free to chip in.