scispace - formally typeset
Search or ask a question
Topic

Digital evidence

About: Digital evidence is a research topic. Over the lifetime, 1621 publications have been published within this topic receiving 18476 citations.


Papers
More filters
Book ChapterDOI
14 Aug 2009
TL;DR: This paper devises an ontology that structures forensic disciplines by their primary domain of evidence, and concludes that while perfect concealment of traces is possible for computer forensics, this level of certainty cannot be expected for manipulations of sensor data.
Abstract: The recent popularity of research on topics of multimedia forensics justifies reflections on the definition of the field. This paper devises an ontology that structures forensic disciplines by their primary domain of evidence. In this sense, both multimedia forensics and computer forensics belong to the class of digital forensics, but they differ notably in the underlying observer model that defines the forensic investigator's view on (parts of) reality, which itself is not fully cognizable. Important consequences on the reliability of probative facts emerge with regard to available counter-forensic techniques: while perfect concealment of traces is possible for computer forensics, this level of certainty cannot be expected for manipulations of sensor data. We cite concrete examples and refer to established techniques to support our arguments.

48 citations

Journal Article
TL;DR: An informal introduction into the finite state machine approach to analysis of digital evidence and its use as a defence tool – for finding weaknesses in the forensic analysis performed by the opposing party is explored.
Abstract: This paper gives informal introduction into the finite state machine approach to analysis of digital evidence and explores its use as a defence tool – for finding weaknesses in the forensic analysis performed by the opposing party. The key concepts of the finite state machine approach are reviewed, and an example analysis of a published case study is performed. It is shown how the described approach can be used to generate alternative scenarios of the incident.

45 citations

20 Apr 2015
TL;DR: In this article, the authors describe results of a research effort to identify and prioritize criminal justice needs related to digital evidence collection, management, analysis, and use, and present the results of such an effort.
Abstract: With digital devices becoming ubiquitous, digital evidence is increasingly important to the investigation and prosecution of many types of crimes. This report describes results of a research effort to identify and prioritize criminal justice needs related to digital evidence collection, management, analysis, and use.

44 citations

Journal ArticleDOI
TL;DR: The suggested model is supposed to provide guidance for thorough and secure implementation of digital forensic procedures at a crime scene, which is not possible to cover every aspect of crime scene digital forensics, but the proposed procedure model was supposed to be a general guideline for practitioners.

44 citations

Journal ArticleDOI
TL;DR: This paper presents the first iOS cloud app security taxonomy that could be used in the investigation of an APT incident and demonstrates the utility of the circumvention techniques using 18 popular iOS cloud apps as case studies.

44 citations


Network Information
Related Topics (5)
Information privacy
25.4K papers, 579.6K citations
78% related
Cloud computing security
27.1K papers, 511.8K citations
77% related
Authentication
74.7K papers, 867.1K citations
77% related
Intrusion detection system
28.4K papers, 509.5K citations
76% related
Public-key cryptography
27.2K papers, 547.7K citations
75% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202387
2022206
202187
2020116
2019111