Ebook: Digital Forensics and Cyber Crime: Third International ICST Conference, ICDF2C 2011, Dublin, Ireland, October 26-28, 2011, Revised Selected Papers
- Tags: Systems and Data Security, e-Commerce/e-business, Computers and Society, Management of Computing and Information Systems, Computer System Implementation, Files
- Series: Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering 88
- Year: 2012
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices.
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices.
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices.
Content:
Front Matter....Pages -
The Role of Perception in Age Estimation....Pages 1-16
Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers....Pages 17-32
Law Enforcement 2.0: Regulating the Lawful Interception of Social Media....Pages 33-35
All Bot Net: A Need for Smartphone P2P Awareness....Pages 36-46
Results of Field Testing Mobile Phone Shielding Devices....Pages 47-61
Windows Phone 7 from a Digital Forensics’ Perspective....Pages 62-76
An Agent Based Tool for Windows Mobile Forensics....Pages 77-88
Forensic Extractions of Data from the Nokia N900....Pages 89-103
A Strategy for Testing Metadata Based Deleted File Recovery Tools....Pages 104-114
Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus....Pages 115-130
A Novel Methodology for Malware Intrusion Attack Path Reconstruction....Pages 131-140
Performance Issues About Context-Triggered Piecewise Hashing....Pages 141-155
Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment....Pages 156-171
Yahoo! Messenger Forensics on Windows Vista and Windows 7....Pages 172-179
Robust Hashing for Efficient Forensic Analysis of Image Sets....Pages 180-187
Tracking User Activity on Personal Computers....Pages 188-196
The Forensic Value of the Windows 7 Jump List....Pages 197-210
Finding Forensic Information on Creating a Folder in $LogFile of NTFS....Pages 211-225
Rescuing Digital Data from Submerged HDD....Pages 226-237
Evaluating the Forensic Image Generator Generator....Pages 238-252
Forensic Extractions of Data from the Nokia N900....Pages 253-267
A Forensic Framework for Incident Analysis Applied to the Insider Threat....Pages 268-281
Reasoning About a Simulated Printer Case Investigation with Forensic Lucid....Pages 282-296
Back Matter....Pages -
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, Ireland. The field of digital forensics is becoming increasingly important for law enforcement, network security, and information assurance. It is a multidisciplinary area that encompasses a number of fields, including law, computer science, finance, networking, data mining, and criminal justice. The 24 papers in this volume cover a variety of topics ranging from tactics of cyber crime investigations to digital forensic education, network forensics, and the use of formal methods in digital investigations. There is a large section addressing forensics of mobile digital devices.
Content:
Front Matter....Pages -
The Role of Perception in Age Estimation....Pages 1-16
Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers....Pages 17-32
Law Enforcement 2.0: Regulating the Lawful Interception of Social Media....Pages 33-35
All Bot Net: A Need for Smartphone P2P Awareness....Pages 36-46
Results of Field Testing Mobile Phone Shielding Devices....Pages 47-61
Windows Phone 7 from a Digital Forensics’ Perspective....Pages 62-76
An Agent Based Tool for Windows Mobile Forensics....Pages 77-88
Forensic Extractions of Data from the Nokia N900....Pages 89-103
A Strategy for Testing Metadata Based Deleted File Recovery Tools....Pages 104-114
Finding Anomalous and Suspicious Files from Directory Metadata on a Large Corpus....Pages 115-130
A Novel Methodology for Malware Intrusion Attack Path Reconstruction....Pages 131-140
Performance Issues About Context-Triggered Piecewise Hashing....Pages 141-155
Formal Parameterization of Log Synchronization Events within a Distributed Forensic Compute Cloud Database Environment....Pages 156-171
Yahoo! Messenger Forensics on Windows Vista and Windows 7....Pages 172-179
Robust Hashing for Efficient Forensic Analysis of Image Sets....Pages 180-187
Tracking User Activity on Personal Computers....Pages 188-196
The Forensic Value of the Windows 7 Jump List....Pages 197-210
Finding Forensic Information on Creating a Folder in $LogFile of NTFS....Pages 211-225
Rescuing Digital Data from Submerged HDD....Pages 226-237
Evaluating the Forensic Image Generator Generator....Pages 238-252
Forensic Extractions of Data from the Nokia N900....Pages 253-267
A Forensic Framework for Incident Analysis Applied to the Insider Threat....Pages 268-281
Reasoning About a Simulated Printer Case Investigation with Forensic Lucid....Pages 282-296
Back Matter....Pages -
....