scispace - formally typeset
Search or ask a question
Topic

Digital evidence

About: Digital evidence is a research topic. Over the lifetime, 1621 publications have been published within this topic receiving 18476 citations.


Papers
More filters
Proceedings ArticleDOI
01 Dec 2010
TL;DR: This paper presents the need to adopt agile methodology of project management in the development of Cyber Forensic Tools through a sample case study and shows how this can help to ensure quick release and efficient change management.
Abstract: Cyber forensics is the process of seizure, acquisition and analysis of digital evidence. Development of cyber forensics tools is often challenging as more and more variations of digital devices are marketed rapidly and new cyber crime scenarios are reported frequently. If the team follows a traditional development method with a long planning phase, the product will be obsolete by the time it is released. So the product development teams should follow agile development methods that can ensure quick release and efficient change management. In this paper, we present the need to adopt agile methodology of project management in the development of Cyber Forensic Tools through a sample case study.

4 citations

Journal ArticleDOI
28 Feb 2013
TL;DR: This study suggested a digital forensic framework considering cloud environments by investigating collection and analysis techniques for each cloud service.
Abstract: Recently, companies seek a way to overcome their financial crisis by reducing costs in the field of IT. In such a circumstance, cloud computing is rapidly emerging as an optimal solution to the crisis. Even in a digital forensic investigation, whether users of an investigated system have used a cloud service is a very important factor in selecting additional investigated subjects. When a user has used cloud services, such as Daum Cloud and Google Docs, it is possible to connect to the could service from a remote place by acquiring the user`s log-in information. In such a case, evidence data should be collected from the remote place for an efficient digital forensic investigation, and it is needed to conduct research on the collection and analysis of data from various kinds of cloud services. Thus, this study suggested a digital forensic framework considering cloud environments by investigating collection and analysis techniques for each cloud service.

4 citations

Journal ArticleDOI
TL;DR: The use of the attributes of Extensible Markup Language document transformation to map the computer forensics ontology and the representations in the National Institute of Standards and Technology’s “Computer Forensics Tool Catalog” are used for aligning one form with the other.
Abstract: The creation of an ontology makes it possible to form common information structures, to reuse knowledge, to make assumptions within a domain and to analyse every piece of knowledge. In this paper, we aim to create an ontology-based transformation model and a framework to develop an ontology-based transformation system in the digital forensics domain. We describe the architecture of the ontology-based transformation system and its components for assisting computer forensics experts in the appropriate selection of tools for digital evidence investigation. We consider the use of the attributes of Extensible Markup Language document transformation to map the computer forensics ontology and we use the representations in the National Institute of Standards and Technology’s “Computer Forensics Tool Catalog” for aligning one form with the other.DOI: http://dx.doi.org/10.5755/j01.eie.23.3.18337

4 citations

Book ChapterDOI
01 Jan 2013
TL;DR: The latest techniques and methods of evidence collection and comparison methods from dental remains are beneficial to crime scene investigations.
Abstract: The latest techniques and methods of evidence collection and comparison methods from dental remains are beneficial to crime scene investigations. This chapter focuses on new technology in forensic odontology.

4 citations

Journal ArticleDOI
TL;DR: An attempt was made to recover digital evidence from a system’s RAM in the form of information about the most recent browsing session of the user, and it was found that crucial Information about the target user such as, user name, passwords, etc., was recoverable.
Abstract: Advanced internet technologies providing services like e-mail, social networking, online banking, online shopping etc., have made day-to-day activities simple and convenient. Increasing dependency on the internet, convenience, and decreasing cost of electronic devices have resulted in frequent use of online services. However, increased indulgence over the internet has also accelerated the pace of digital crimes. The increase in number and complexity of digital crimes has caught the attention of forensic investigators. The Digital Investigators are faced with the challenge of gathering accurate digital evidence from as many sources as possible. In this paper, an attempt was made to recover digital evidence from a system's RAM in the form of information about the most recent browsing session of the user. Four different applications were chosen and the experiment was conducted across two browsers. It was found that crucial information about the target user such as, user name, passwords, etc., was recoverable.

4 citations


Network Information
Related Topics (5)
Information privacy
25.4K papers, 579.6K citations
78% related
Cloud computing security
27.1K papers, 511.8K citations
77% related
Authentication
74.7K papers, 867.1K citations
77% related
Intrusion detection system
28.4K papers, 509.5K citations
76% related
Public-key cryptography
27.2K papers, 547.7K citations
75% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202387
2022206
202187
2020116
2019111