scispace - formally typeset
Open AccessBookDOI

Advances in Digital Forensics VI

Reads0
Chats0
About
The article was published on 2010-01-01 and is currently open access. It has received 18 citations till now. The article focuses on the topics: Digital forensics.

read more

Content maybe subject to copyright    Report

IFIP Advances in Information
and Communication Technology 337
Editor-in-Chief
A. Joe Turner, Seneca, SC, USA
Editorial Board
Foundations of Computer Science
Mike Hinchey, Lero, Limerick, Ireland
Software: Theory and Practice
Bertrand Meyer, ETH Zurich, Switzerland
Education
Bernard Cornu, CNED-EIFAD, Poitiers, France
Information Technology Applications
Ronald Waxman, EDA Standards Consulting, Beachwood, OH, USA
Communication Systems
Guy Leduc, Université de Liège, Belgium
System Modeling and Optimization
Jacques Henry, Université de Bordeaux, France
Information Systems
Barbara Pernici, Politecnico di Milano, Italy
Relationship between Computers and Society
Chrisanthi Avgerou, London School of Economics, UK
Computer Systems Technology
Paolo Prinetto, Politecnico di Torino, Italy
Security and Privacy Protection in Information Processing Systems
Kai Rannenberg, Goethe University Frankfurt, Germany
Articial Intelligence
Max A. Bramer, University of Portsmouth, UK
Human-Computer Interaction
Annelise Mark Pejtersen, Center of Cognitive Systems Engineering, Denmark
Entertainment Computing
Ryohei Nakatsu, National University of Singapore

IFIP The International Federation for Information Processing
IFIP was founded in 1960 under the auspices of UNESCO, following the First
World Computer Congress held in Paris the previous year. An umbrella organi-
zation for societies working in information processing, IFIP’s aim is two-fold:
to support information processing within its member countries and to encourage
technology transfer to developing nations.As its mission statement clearly states,
IFIP’s mission is to be the leading, truly international, apolitical
organization which encourages and assists in the development, ex-
ploitation and application of information technology for the benefit
of all people.
IFIP is a non-protmaking organization, run almost solely by 2500 volunteers. It
operates through a number of technical committees, which organize events and
publications. IFIP’s events range from an international congress to local seminars,
but the most important are:
The IFIP World Computer Congress, held every second year;
Open conferences;
Working conferences.
The agship event is the IFIP World Computer Congress, at which both invited
and contributed papers are presented. Contributed papers are rigorously refereed
and the rejection rate is high.
As with the Congress, participation in the open conferences is open to all and
papers may be invited or submitted. Again, submitted papers are stringently ref-
ereed.
The working conferences are structured differently. They are usually run by a
working group and attendance is small and by invitation only. Their purpose is
to create an atmosphere conducive to innovation and development. Refereeing is
less rigorous and papers are subjected to extensive group discussion.
Publications arising from IFIP events vary. The papers presented at the IFIP
World Computer Congress and at open conferences are published as conference
proceedings, while the results of the working conferences are often published as
collections of selected and edited papers.
Any national society whose primary activity is in information may apply to be-
come a full member of IFIP, although full membership is restricted to one society
per country. Full members are entitled to vote at the annual General Assembly,
National societies preferring a less committed involvement may apply for asso-
ciate or corresponding membership. Associate members enjoy the same benets
as full members, but without voting rights. Corresponding members are not rep-
resented in IFIP bodies. Afliated membership is open to non-national societies,
and individual and honorary membership schemes are also offered.

Kam-Pui Chow Sujeet Shenoi (Eds.)
Advances in
Digital Forensics VI
Sixth IFIP WG 11.9 International Conference
on Digital Forensics
Hong Kong, China, January 4-6, 2010
Revised Selected Papers
13

Volume Editors
Kam-Pui Chow
University of Hong Kong, Department of Computer Science
Hong Kong, China
E-mail: chow@cs.hku.hk
Sujeet Shenoi
University of Tulsa, Department of Computer Science
Tulsa, OK 74104, USA
E-mail: sujeet@utulsa.edu
Library of Congress Control Number: 2010934317
CR Subject Classication (1998): H.3, C.2, K.6.5, D.4.6, F.2, E.3
ISSN
1868-4238
ISBN-10
3-642-15505-7 Springer Berlin Heidelberg New York
ISBN-13
978-3-642-15505-5 Springer Berlin Heidelberg New York
This work is subject to copyright. All rights are reserved, whether the whole or part of the material is
concerned, specically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting,
reproduction on microlms or in any other way, and storage in data banks. Duplication of this publication
or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965,
in its current version, and permission for use must always be obtained from Springer. Violations are liable
to prosecution under the German Copyright Law.
springer.com
© International Federation for Information Processing 2010
Printed in Germany
Typesetting: Camera-ready by author, data conversion by Scientic Publishing Services, Chennai, India
Printed on acid-free paper 219/3180

Contents
Contributing Authors ix
Preface xvii
PART I THEMES AND ISSUES
1
A History of Digital Forensics
3
Mark Pollitt
2
Toward a Science of Digital Forensic Evidence Examination
17
Fred Cohen
3
Using a Local Search Warrant to Acquire Evidence Stored Overseas
via the Internet
37
Kenny Wang
4
An Analysis of the Green Dam Youth Escort Software
49
Frankie Li, Hilton Chan, Kam-Pui Chow and Pierre Lai
PART II FORENSIC TECHNIQUES
5
Forensic Analysis of a PlayStation 3 Console
65
Scott Conrad, Greg Dorn and Philip Craiger
6
A Consistency Study of the Windows Registry
77
Yuandong Zhu, Joshua James and Pavel Gladyshev

Citations
More filters
Book ChapterDOI

Similarity Preserving Hashing: Eligible Properties and a New Algorithm MRSH-v2

TL;DR: Similarity Preserving Hashing (SPH) as mentioned in this paper is one of the most widely used hash functions in computer science and used in several applications, e.g. in computer forensics to identify known files.
Journal ArticleDOI

Hunting in the enterprise: Forensic triage and incident response

TL;DR: This work examines the use of GRR Rapid Response - an advanced open source distributed enterprise forensics system - in the triaging stage of common incident response investigations and shows how this system can be leveraged for automated prioritization of evidence across the whole enterprise fleet.
Book ChapterDOI

Using Randomization to Attack Similarity Digests

TL;DR: This work examines how well three similarity digest schemes (Ssdeep, Sdhash and TLSH) work when exposed to random change and suggests that the TLSH scheme is more robust to the attacks and random changes considered.
Book ChapterDOI

Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations

TL;DR: Bayesian sensitivity analysis techniques are applied to a Bayesian network model for the well-known Yahoo! case and it is demonstrated that the conclusions drawn are statistically reliable and stable for small changes in evidence likelihood values.
Book ChapterDOI

Managing Terabyte-Scale Investigations with Similarity Digests

TL;DR: The results show that digests can be generated at rates exceeding those of cryptographic hashes on commodity multi-core computing systems and querying of the digest of a large target for the presence of a small file can be completed in less than one second with very high precision and recall rates.