Update cookies preferences

E-book: Advances in Digital Forensics IX: 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers

Edited by , Edited by
  • Format - PDF+DRM
  • Price: 110,53 €*
  • * the price is final i.e. no additional discount will apply
  • Add to basket
  • Add to Wishlist
  • This ebook is for personal use only. E-Books are non-refundable.

DRM restrictions

  • Copying (copy/paste):

    not allowed

  • Printing:

    not allowed

  • Usage:

    Digital Rights Management (DRM)
    The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.  To read this e-book you have to create Adobe ID More info here. Ebook can be read and downloaded up to 6 devices (single user with the same Adobe ID).

    Required software
    To read this ebook on a mobile device (phone or tablet) you'll need to install this free app: PocketBook Reader (iOS / Android)

    To download and read this eBook on a PC or Mac you need Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)

    You can't read this ebook with Amazon Kindle

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance - investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics IX describe original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Models, Forensic Techniques, File system Forensics, Network Forensics, Cloud Forensics, Forensic Tools, and Advanced Forensic Techniques. This book is the ninth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in Orlando, Florida, USA in the winter of 2013. Advances in Digital Forensics IX is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.
Contributing Authors ix
Preface xix
PART I THEMES AND ISSUES
1 History, Historiography and the Hermeneutics of the Hard Drive
3(16)
Mark Pollitt
2 Protecting Third Party Privacy in Digital Forensic Investigations
19(14)
Wynand van Staden
3 On the Scientific Maturity of Digital Forensics Research
33(20)
Martin Olivier
Stefan Gruner
PART II FORENSIC MODELS
4 Cognitive Approaches for Digital Forensic Readiness Planning
53(14)
Antonio Pooe
Les Labuschagne
5 A Harmonized Process Model for Digital Forensic Investigation Readiness
67(16)
Aleksandar Valjarevic
Hein Venter
6 Evaluation of the Semi-Automated Crime-Specific Digital Triage Process Model
83(18)
Gary Cantrell
David Dampier
PART III FORENSIC TECHNIQUES
7 Reducing the Time Required for Hashing Operations
101(18)
Frank Breitinger
Kaloyan Petrov
8 Hash-Based File Content Identification Using Distributed Systems
119(16)
York Yannikos
Jonathan Schluessler
Martin Steinebach
Christian Winter
Kalman Graffi
9 Creating Super Timelines in Windows Investigations
135(10)
Stephen Esposito
Gilbert Peterson
10 Log File Analysis with Context-Free Grammars
145(8)
Gregory Bosman
Stefan Gruner
11 Using a Goal-Driven Approach in the Investigation of a Questioned Contract
153(18)
Clive Blackwell
Shareeful Islam
Benjamin Aziz
PART IV FILESYSTEM FORENSICS
12 File Fragment Analysis Using Normalized Compression Distance
171(12)
Stefan Axelsson
Kamran Ali Bajwa
Mandhapati Venkata Srikanth
13 Quantifying Windows File Slack Size and Stability
183(12)
Martin Mulazzani
Sebastian Neuner
Peter Kieseberg
Markus Huber
Sebastian Schrittwieser
Edgar Weippl
14 Automating Video File Carving and Content Identification
195(18)
York Yannikos
Nadeem Ashraf
Martin Steinebach
Christian Winter
15 Data Recovery from Proprietary-Formatted CCTV Hard Disks
213(14)
Aswami Ariffin
Jill Slay
Kim-Kwang Choo
PART V NETWORK FORENSICS
16 Creating Integrated Evidence Graphs for Network Forensics
227(16)
Changwei Liu
Anoop Singhal
Duminda Wijesekera
17 A Generic Bayesian Belief Model for Similar Cyber Crimes
243(14)
Hayson Tse
Kam-Pui Chow
Michael Kwan
18 An Empirical Study Profiling Internet Pirates
257(16)
Pierre Lai
Kam-Pui Chow
Xiao-Xi Fan
Vivien Chan
19 Real-Time Covert Timing Channel Detection in Networked Virtual Environments
273(18)
Anyi Liu
Jim Chen
Harry Wechsler
PART VI CLOUD FORENSICS
20 Impact of Cloud Computing on Digital Forensic Investigations
291(14)
Stephen O'Shaughnessy
Anthony Keane
21 Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments
305(26)
Irfan Ahmed
Aleksandar Zoranic
Salman Javaid
Golden Richard
Vassil Roussev
PART VII FORENSIC TOOLS
22 Comparison of the Data Recovery Function of Forensic Tools
331(18)
Joe Buchanan-Wollaston
Tim Storer
William Glisson
23 Security Analysis and Decryption of File Vault 2
349(18)
Omar Choudary
Felix Grobert
Joachim Metz
PART VIII ADVANCED FORENSIC TECHNIQUES
24 Detecting Counterfeit Currency and Identifying its Source
367(18)
Ankit Sarkar
Robin Verma
Gaurav Gupta
25 Towards Active Linguistic Authentication
385
Patrick Juola
John Noecker Jr.
Ariel Stolerman
Michael Ryan
Patrick Brennan
Rachel Greenstadt