scispace - formally typeset
Search or ask a question
Topic

Digital evidence

About: Digital evidence is a research topic. Over the lifetime, 1621 publications have been published within this topic receiving 18476 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: The development of a new Cybercrime Investigation Framework that uniquely integrates and consolidates the technical complexity of investigating the Internet and networked technology with the investigation principles and procedures of mainstream law enforcement is presented.
Abstract: As the Internet continues to evolve and present the motivated cybercriminal with a vast range of opportunities to commit both crime and other undesirable behaviours, then mainstream law enforcement must equally have the capability to react. This paper identifies that cybercrime investigation is much more than just low-level technology examination or digital evidence recovery and requires the specific inclusion of a wide range of technical and non-technical professional disciplines and investigative skills. This paper draws on the author’s earlier research alongside the current challenges and issues of cybercrime and examines the many cybercrime investigation models and frameworks found throughout the literature to identify six guiding research objectives. This paper then presents the development of a new Cybercrime Investigation Framework that uniquely integrates and consolidates the technical complexity of investigating the Internet and networked technology with the investigation principles and procedures of mainstream law enforcement.

16 citations

Journal ArticleDOI
TL;DR: Basic guidelines for report writing are looked at to make sure the evidence is protected and that notes made at the time are professional.

16 citations

Proceedings ArticleDOI
18 Mar 2012
TL;DR: A novel method to create an image of the iDevice (iPhone, iPad, iPod) in a secure and fast manner within 30 minutes or less without jailbreaking compared to the fastest current method which takes up to 20 hours.
Abstract: With boom in mobility technology sector, a new generation of computing devices such as iPhone/iPad/iPod have emerged and immersed itself in the lives of millions and millions of people. With its widespread its fair to say that the use of these devices has created a new source of digital evidence and a need for a fast and trusted method to image and analyze the data has emerged. In this paper we will discuss a novel method that we have developed to create an image of the iDevice (iPhone, iPad, iPod) in a secure and fast manner within 30 minutes or less without jailbreaking compared to the fastest current method which takes up to 20 hours.

16 citations

Journal ArticleDOI
TL;DR: A traceability index is derived as a useful indicator in measuring the accuracy and completeness of discovering the evidence in digital forensic investigation process to present the level of tracing ability, mapping ability and identifying the offender ability.
Abstract: Digital crime inflicts immense damage to users and systems and now it has reached a level of sophistication that makes it difficult to track its sources or origins especially with the advancements in modern computers, networks and the availability of diverse digital devices. Forensic has an important role to facilitate investigations of illegal activities and inappropriate behaviors using scientific methodologies, techniques and investigation frameworks. Digital forensic is developed to investigate any digital devices in the detection of crime. This paper emphasized on the research of traceability aspects in digital forensic investigation process. This includes discovering of complex and huge volume of evidence and connecting meaningful relationships between them. The aim of this paper is to derive a traceability index as a useful indicator in measuring the accuracy and completeness of discovering the evidence. This index is demonstrated through a model (TraceMap) to facilitate the investigator in tracing and mapping the evidence in order to identify the origin of the crime or incident. In this paper, tracing rate, mapping rate and offender identification rate are used to present the level of tracing ability, mapping ability and identifying the offender ability respectively. This research has a high potential of being expanded into other research areas such as in digital evidence presentation.

16 citations

Journal ArticleDOI
TL;DR: An alternative to the current solution at the Bundeskriminalamt (BKA) to reveal the secret key is proposed, based on Power Analysis Attack (PAA), which is non-invasive and presents results obtained in several cases.

16 citations


Network Information
Related Topics (5)
Information privacy
25.4K papers, 579.6K citations
78% related
Cloud computing security
27.1K papers, 511.8K citations
77% related
Authentication
74.7K papers, 867.1K citations
77% related
Intrusion detection system
28.4K papers, 509.5K citations
76% related
Public-key cryptography
27.2K papers, 547.7K citations
75% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20241
202387
2022206
202187
2020116
2019111