scispace - formally typeset
Search or ask a question
Topic

Digital forensics

About: Digital forensics is a research topic. Over the lifetime, 4270 publications have been published within this topic receiving 49676 citations. The topic is also known as: digital forensic science & Digital forensics.


Papers
More filters
Journal ArticleDOI
TL;DR: The Xbox One was found to have increased security measures over its predecessor (Xbox 360), and it was able to determine that various applications had different levels of security and that game traffic was encrypted.

21 citations

Journal ArticleDOI
TL;DR: The controversial question is debated, could the authors be facing an era where digital crime can no longer be effectively policed?

21 citations

Book ChapterDOI
01 Jan 2013
TL;DR: Legal problems in the United States for electronic discovery and digital forensics arising from cloud computing are illuminated and it is argued that cloud computing challenges the process and product of electronic discovery.
Abstract: Despite a growing adoption of cloud computing, law enforcement and the judicial system are unprepared to prosecute cloud-based crimes. This chapter illuminates legal problems in the United States for electronic discovery and digital forensics arising from cloud computing and argues that cloud computing challenges the process and product of electronic discovery. The researchers investigate how to obtain forensic evidence from cloud computing using the legal process by surveying the existing statues and recent cases applicable to cloud forensics. A hypothetical case study of child pornography being hosted in the Cloud illustrates the difficulty in acquiring evidence for cloud-related crimes. For the first time, a sample search warrant is presented that could be used in this case study, and which provides sample language for agents and prosecutors who wish to obtain a warrant authorizing the search and seizure of data from cloud computing environments. The chapter concludes by taking a contrasting view and discusses how defense attorneys might be able to challenge cloud-derived evidence in court.

21 citations

Book ChapterDOI
01 Jan 2019
TL;DR: This paper provides the users and researchers some information regarding forensics and its different domains, anti-forensic techniques, and also an analysis of current status of forensics.
Abstract: Digital forensics also called as computer forensics is a major field that incorporates people regardless of their professions. Digital forensics includes various forensic domains like network forensics, database forensics, mobile forensics, cloud forensics, memory forensics, and data/disk forensics. Recent statistics and analytics show the exponential growth of cyber threats and attacks and thus necessitate the need for forensic experts and forensic researchers for automation process in the cyber world. As digital forensics is directly related to data recovery and data carving, this field struggles with the rapid increase in volume of data. In addition to that, day-to-day increase of malware makes forensic field slacking. This paper provides the users and researchers some information regarding forensics and its different domains, anti-forensic techniques, and also an analysis of current status of forensics.

21 citations

Proceedings ArticleDOI
TL;DR: In this paper, the authors introduce the idea of building proofs of past data possession in the context of a cloud storage service and present a scheme for creating such proofs and evaluate its performance in a real cloud provider.
Abstract: Cloud computing has emerged as a popular computing paradigm in recent years. However, today's cloud computing architectures often lack support for computer forensic investigations. A key task of digital forensics is to prove the presence of a particular file in a given storage system. Unfortunately, it is very hard to do so in a cloud given the black-box nature of clouds and the multi-tenant cloud models. In clouds, analyzing the data from a virtual machine instance or data stored in a cloud storage only allows us to investigate the current content of the cloud storage, but not the previous contents. In this paper, we introduce the idea of building proofs of past data possession in the context of a cloud storage service. We present a scheme for creating such proofs and evaluate its performance in a real cloud provider. We also discuss how this proof of past data possession can be used effectively in cloud forensics.

21 citations


Network Information
Related Topics (5)
Authentication
74.7K papers, 867.1K citations
84% related
Encryption
98.3K papers, 1.4M citations
81% related
Cryptography
37.3K papers, 854.5K citations
81% related
Server
79.5K papers, 1.4M citations
77% related
Mobile computing
51.3K papers, 1M citations
76% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20243
2023205
2022552
2021267
2020339
2019343