IFIP TC6 Open Digital Library

Digital Forensics 2005: Orlando, Florida, USA

Advances in Digital Forensics, IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13-16, 2005

Mark Pollitt, Sujeet Shenoi

Springer, IFIP 194, ISBN: 0-387-30012-0



Contents

Themes and Issues

Dealing with Terabyte Datasets in Digital Investigations.

Nicole Beebe, Jan Guynes Clark

 3-16

Forensics and Privacy-Enhancing Technologies - Logging and Collecting Evidence in Flocks.

Martin S. Olivier

 17-31

A Network-Based Architecture for Storing Digital Evidence.

Mark Davis, Gavin Manes, Sujeet Shenoi

 33-42

Digital Forensics: Meeting the Challenges of Scientific Evidence.

Matthew Meyers, Marcus K. Rogers

 43-50

Non-Technical Manipulation of Digital Data - Legal, Ethical and Social Issues.

Michael Losavio

 51-63

Investigative Techniques

Detecting Social Engineering.

Michael D. Hoeschele, Marcus K. Rogers

 67-77

A Framework for Email Investigation - Automated Information Extraction and Linkage Discovery.

Anthony G. Persaud, Yong Guan

 79-90

The Mitnick Case: How Bayes Could Have Helped.

Thomas Duval, Bernard Jouga, Laurent Roger

 91-104

Applying Computer Forensic Principles in Evidence Collection and Analysis for a Computer-Based Programming Assessment.

Rut Laubscher, Cobus Rabe, Martin S. Olivier, Jan H. P. Eloff, H. S. Venter

 105-112

Exploring Forensic Data with Self-Organizing Maps.

Bennie Fei, Jan H. P. Eloff, H. S. Venter, Martin S. Olivier

 113-123

Network Forensics

Integrating Digital Forensics in Network Infrastructures.

Kulesh Shanmugasundaram, Hervé Brönnimann, Nasir D. Memon

 127-140

Using Peer-to-Peer Technology for Network Forensics.

Scott Redding

 141-152

Forensic Profiling System.

Pallavi Kahai, Mannivannan Srinivasan, Kameswara Rao Namuduri

 153-164

Global Internet Routing Forensics: Validation of BGP Paths Using ICMP Traceback.

Eunjong Kim, Daniel Massey, Indrajit Ray

 165-176

Using Signaling Information in Telecom Network Forensics.

Tyler Moore, Anthony Meehan 0002, Gavin Manes, Sujeet Shenoi

 177-188

Portable Electronic Device Forensics

Forensic Analysis of Mobile Phone Internal Memory.

Svein Yngvar Willassen

 191-204

Imaging and Analysis of GSM SIM Cards.

Christopher Swenson, Gavin Manes, Sujeet Shenoi

 205-216

Extracting Concealed Data from BIOS Chips.

Pavel Gershteyn, Mark Davis, Gavin Manes, Sujeet Shenoi

 217-230

Linux and File System Forensics

Recovering Digital Evidence from Linux Systems.

Philip Craiger

 233-244

Detecting Hidden Data in Ext2/Ext3 File Systems.

Scott Piper, Mark Davis, Gavin Manes, Sujeet Shenoi

 245-256

Applications and Techniques

Forensic Analysis of Digital Image Tampering.

Gilbert L. Peterson

 259-270

Content-Based Image Retrieval for Digital Forensics.

Yixin Chen, Vassil Roussev, Golden G. Richard III, Yun Gao

 271-282

Making Decisions about Legal Responses to Cyber Attacks.

Leisheng Peng, Thomas C. Wingfield, Duminda Wijesekera, Emily Frye, Randall Jackson, James Bret Michael

 283-294

Applying Filter Clusters to Reduce Search State Space.

Jill Slay, Kris Jorgensen

 295-301

In-Kernel Cryptographic Executable Verification.

Yusuf Motara, Barry Irwin

 303-313