Quantcast
Channel: Digital Forensics – Forensic Focus – Articles
Browsing all 196 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Internet Of Things Mobility Forensics

by K M Sabidur Rahman & Matt Bishop (University of California Davis) and Albert Holt (NSA) Abstract The Internet of Things (IoT) comes with great possibilities as well as major security and privacy...

View Article


Image may be NSFW.
Clik here to view.

Classifying Illegal Activities On Tor Network Based On Web Textual Contents

by Mhd Wesam Al Nabki, Eduardo Fidalgo, Enrique Alegre & Ivan de Paz; Department of Electrical, Systems and Automation, University of Leon, Spain & INCIBE Spanish National Cybersecurity...

View Article


Image may be NSFW.
Clik here to view.

Enfuse 2017 – Recap

by Mattia Epifani, Forensic Focus The Enfuse Conference, organized by Guidance Software, took place between 21st and 24th May at Caesar Palace Conference Center in Las Vegas. More than 1,500 attendees...

View Article

Image may be NSFW.
Clik here to view.

Challenges Of ISO 17025 Accreditation – Survey Results

A group of forensic practitioners has recently conducted a survey into the ISO 17025 scheme – its effectiveness, and its relevance for digital forensics. The survey was conducted using Google Forms and...

View Article

Image may be NSFW.
Clik here to view.

An Introduction To Theft Of Trade Secrets Investigations

by Larry Lieb, Managing Director, HaystackID. The subjects we will be covering include: Defining When One Should Reasonably Panic Reasonable Triage Steps to Take in Order to Identify if There is Only...

View Article


Image may be NSFW.
Clik here to view.

Remote Forensics Of Windows 10 Mobile Devices

by Oleg Afonin, Elcomsoft Microsoft has developed Windows 10 as the one OS for all types of devices from servers to wearables. Desktops, laptops, two-in-ones, tablets and smartphones can (and do) run a...

View Article

Image may be NSFW.
Clik here to view.

RAM Forensic Analysis

by Eliézer Pereira 1 Goal The purpose of this article is show how to perform a RAM memory forensic analysis, presenting some examples of information that can be retrieved and analyzed to help identify...

View Article

Image may be NSFW.
Clik here to view.

An Introduction To Challenges In Digital Forensics

by W.Chirath De Alwis Digital forensics is a technique in the identification of computer based crimes. But digital forensics faces a few major challenges when it comes to conducting investigations....

View Article


Image may be NSFW.
Clik here to view.

The Future Of ENF Systems

by James Zjalic The subject of authentication is important across the entire digital forensic field and we as examiners have various weapons at our disposal in which to defend against the onslaught of...

View Article


Image may be NSFW.
Clik here to view.

Techno Security 2017 – San Antonio September 18th-20th

From the 18th to the 20th of September, the Techno Security & Digital Forensics Conference will be taking place in San Antonio, Texas, USA. If there are any topics you’d particularly like to see...

View Article

Image may be NSFW.
Clik here to view.

Physical Imaging Of A Samsung Galaxy S7 Smartphone Running Android 7.0

by Oleg Skulkin & Igor Shorokhov The release of Android Nougat has brought new challenges to mobile forensic examiners: the smartphones running this version most likely have encrypted partitions...

View Article

Image may be NSFW.
Clik here to view.

When No Conclusion Can Be A Conclusion

by James Zjalic Before CCTV systems were conceived, eye-witness accounts were the only method of identifying a suspect based on their facial features. The pitfalls of this type of identification have...

View Article

Image may be NSFW.
Clik here to view.

Cellular GPS Evidence: Waze + Cellebrite + CellHawk

by Patrick Siewert, Principal Consultant, Pro Digital Forensic Consulting It’s becoming common knowledge that location evidence on cellular devices can provide a wealth of evidence in any number of...

View Article


Image may be NSFW.
Clik here to view.

Digital Forensics: Iron Bars, Cement And Superglue

by James Zjalic When most people think of digital forensics they think of CSI Miami: hackers in hoodies and Mission Impossible type biometrics. But under the superficial exterior, there is a framework...

View Article

Image may be NSFW.
Clik here to view.

Imm2Virtual: A Windows GUI To Virtualize Directly From Disk Image File

by Nanni Bassetti Sometimes during a computer forensic investigation, we need to virtualize our image disk, because it could be useful for checking or finding something of interest. If we need to...

View Article


Image may be NSFW.
Clik here to view.

Focused Digital Forensic Methodology

by Haider H. Khaleel Abstract Since the end of the 19th Century until the current time, law enforcement has been facing a rapid increase in computer-related crimes. In the present time, digital...

View Article

Image may be NSFW.
Clik here to view.

Linux Memory Forensics: Dissecting the User Space Process Heap

by Frank Block and Andreas Dewald Abstract The analysis of memory during a forensic investigation is often an important step to reconstruct events. While prior work in this field has mostly...

View Article


Image may be NSFW.
Clik here to view.

Windows Drive Acquisition

by Oleg Skulkin & Scar de Courcier Before you can begin analysing evidence from a source, it first of all needs to be imaged. This describes a forensic process in which an exact copy of a drive is...

View Article

Image may be NSFW.
Clik here to view.

The CSI Effect – Expectations Vs Limitations

by James Zjalic Much has been written about the CSI phenomenon within digital forensics circles, but is there a way we as experts can reduce this effect, maybe not globally but at least amongst our own...

View Article

Image may be NSFW.
Clik here to view.

Imaging Locked Motorola Devices Via Bootloader Exploit

Last-generation Android devices are gradually getting more secure, even approaching iOS-grade security in some usage scenarios. Equipped with fingerprint readers and compulsory encryption of the data...

View Article
Browsing all 196 articles
Browse latest View live