Dissertations / Theses on the topic 'Digital forensic analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Digital forensic analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Hales, Gavin. "Assisting digital forensic analysis via exploratory information visualisation." Thesis, Abertay University, 2016. https://rke.abertay.ac.uk/en/studentTheses/774128b9-957e-4a05-aa74-dbeefebb8113.
Full textNelson, Alexander J. "Software signature derivation from sequential digital forensic analysis." Thesis, University of California, Santa Cruz, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10140317.
Full textHierarchical storage system namespaces are notorious for their immense size, which is a significant hindrance for any computer inspection. File systems for computers start with tens of thousands of files, and the Registries of Windows computers start with hundreds of thousands of cells. An analysis of a storage system, whether for digital forensics or locating old data, depends on being able to reduce the namespaces down to the features of interest. Typically, having such large volumes to analyze is seen as a challenge to identifying relevant content. However, if the origins of files can be identified—particularly dividing between software and human origins—large counts of files become a boon to profiling how a computer has been used. It becomes possible to identify software that has influenced the computer's state, which gives an important overview of storage system contents not available to date.
In this work, I apply document search to observed changes in a class of forensic artifact, cell names of the Windows Registry, to identify effects of software on storage systems. Using the search model, a system's Registry becomes a query for matching software signatures. To derive signatures, file system differential analysis is extended from between two storage system states to many sequences of states. The workflow that creates these signatures is an example of analytics on data lineage, from branching data histories. The signatures independently indicate past presence or usage of software, based on consistent creation of measurably distinct artifacts. A signature search engine is demonstrated against a machine with a selected set of applications installed and executed. The optimal search engine according to that machine is then turned against a separate corpus of machines with a set of present applications identified by several non-Registry forensic artifact sources, including the file systems, memory, and network captures. The signature search engine corroborates those findings, using only the Windows Registry.
Ovens, Kenneth Martin. "Digital forensic analysis of communication applications on Apple iOS devices." Thesis, Glasgow Caledonian University, 2017. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.743916.
Full textNaru, Amar Singh. "Digital image analysis of the human bite mark." Thesis, University of Hertfordshire, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.338566.
Full textNecaise, Nathan Joseph. "Empirical analysis of disk sector prefixes for digital forensics." Master's thesis, Mississippi State : Mississippi State University, 2007. http://library.msstate.edu/etd/show.asp?etd=etd-03282007-151218.
Full textLidström, Robbin, and Elfving Elfving. "An exploratory forensic analysis of the Xbox One S All Digital." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42511.
Full textChabot, Yoan. "Construction, enrichment and semantic analysis of timelines : application to digital forensics." Thesis, Dijon, 2015. http://www.theses.fr/2015DIJOS037/document.
Full textHaving a clear view of events that occurred over time is a difficult objective to achieve in digital investigations (DI). Event reconstruction, which allows investigators to build and to understand the timeline of an incident, is one of the most important steps of a DI process. The complete understanding of an incident and its circumstances requires on the one hand to associate each piece of information to its meaning, and on the other hand to identify semantic relationships between these fragments. This complex task requires the exploration of a large and heterogeneous amount of information found on the crime scene. Therefore, investigators encounter cognitive overload problems when processing this data, causing them to make mistakes or omit information that could have a high added value for the progress of the investigation. In addition, any result produced by the reconstruction process must meet several legal requirements to be admissible at trial, including the ability to explain how the results were produced. To help the investigators to deal with these problems, this thesis introduces a semantic-based approach called SADFC. The main objective of this approach is to provide investigators with tools to help them find the meaning of the entities composing the crime scene and understand the relationships linking these entities, while respecting the legal requirements. To achieve this goal, SADFC is composed of two elements. First, SADFC is based on theoretical foundations, ensuring the credibility of the results produced by the tools via a formal and rigorous definition of the processes used. This approach then proposes an architecture centered on an ontology to model and structure the knowledge inherent to an incident and to assist the investigator in the analysis of this knowledge. The relevance and the effectiveness of this architecture are demonstrated through a case study describing a fictitious investigation
Wang, Mengmeng, and 王萌萌. "Temporal analysis on HFS+ and across file systems in digital forensic investigation." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hub.hku.hk/bib/B50900122.
Full textpublished_or_final_version
Computer Science
Master
Master of Philosophy
Shakir, Amer, Muhammad Hammad, and Muhammad Kamran. "Comparative Analysis & Study of Android/iOS MobileForensics Tools." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44797.
Full textThompson, Marcus A. "An exploratory forensic acquisition and analysis of digital evidence on the Amazon Kindle." Thesis, Purdue University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=1565358.
Full textThe Amazon Kindle is becoming a popular e-book reader. This popularity will lead criminals to use the Kindle as an accessory to their crime. Very few Kindle publications in the digital forensics domain exist at the time of this writing. Various blogs on the Internet currently provide some of the foundation for Kindle forensics. For this research each fifth generation Kindle was populated with various types of files a typical user may introduce using one method, the USB interface. The Kindle was forensically imaged with AccessData's Forensic Toolkit Imager before and after each Kindle was populated. Each file was deleted through the USB interface. Files were retrieved and recovered through the USB interface before and after file deletion. These two sets of files were compared to the original set of files. All files retrieved before deletion matched their original counterpart. Not all files recovered after deletion matched their original counterpart. These steps and procedures followed a similar methodology developed by Leshney (2008) for virtual machines.
Brooks, Elizabeth M., and na. "An appraisal of the use of numerical features in the forensic examination of hair." University of Canberra. School of Health Sciences, 2007. http://erl.canberra.edu.au./public/adt-AUC20080624.144159.
Full textLiljekvist, Erika, and Oscar Hedlund. "Uncovering Signal : Simplifying Forensic Investigations of the Signal Application." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44835.
Full textSvenblad, Tobias. "An Analysis of Using Blockchains for Processing and Storing Digital Evidence." Thesis, Högskolan Dalarna, Datateknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:du-27855.
Full textCarvalho, Tiago José de 1985. "Illumination inconsistency sleuthing for exposing fauxtography and uncovering composition telltales in digital images." [s.n.], 2014. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275519.
Full textTese (doutorado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-25T12:33:40Z (GMT). No. of bitstreams: 1 Carvalho_TiagoJosede_D.pdf: 74759719 bytes, checksum: dc371f3262b700f91afa5e0269df1e05 (MD5) Previous issue date: 2014
Resumo: Antes tomadas como naturalmente genuínas, fotografias não mais podem ser consideradas como sinônimo de verdade. Com os avanços nas técnicas de processamento de imagens e computação gráfica, manipular imagens tornou-se mais fácil do que nunca, permitindo que pessoas sejam capazes de criar novas realidades em minutos. Infelizmente, tais modificações, na maioria das vezes, têm como objetivo enganar os observadores, mudar opiniões ou ainda, afetar como as pessoas enxergam a realidade. Assim, torna-se imprescindível o desenvolvimento de técnicas de detecção de falsificações eficientes e eficazes. De todos os tipos de falsificações de imagens, composições são de especial interesse. Esse tipo de falsificação usa partes de duas ou mais imagens para construir uma nova realidade exibindo para o observador situações que nunca aconteceram. Entre todos os diferentes tipos de pistas investigadas para detecção de composições, as abordagens baseadas em inconsistências de iluminação são consideradas as mais promissoras uma vez que um ajuste perfeito de iluminação em uma imagem falsificada é extremamente difícil de ser alcançado. Neste contexto, esta tese, a qual é fundamentada na hipótese de que inconsistências de iluminação encontradas em uma imagem são fortes evidências de que a mesma é produto de uma composição, apresenta abordagens originais e eficazes para detecção de imagens falsificadas. O primeiro método apresentado explora o reflexo da luz nos olhos para estimar as posições da fonte de luz e do observador da cena. A segunda e a terceira abordagens apresentadas exploram um fenômeno, que ocorre com as cores, denominado metamerismo, o qual descreve o fato de que duas cores podem aparentar similaridade quando iluminadas por uma fonte de luz mas podem parecer totalmente diferentes quando iluminadas por outra fonte de luz. Por fim, nossa última abordagem baseia-se na interação com o usuário que deve inserir normais 3-D em objetos suspeitos da imagem de modo a permitir um cálculo mais preciso da posição 3-D da fonte de luz na imagem. Juntas, essas quatro abordagens trazem importantes contribuições para a comunidade forense e certamente serão uma poderosa ferramenta contra falsificações de imagens
Abstract: Once taken for granted as genuine, photographs are no longer considered as a piece of truth. With the advance of digital image processing and computer graphics techniques, it has been easier than ever to manipulate images and forge new realities within minutes. Unfortunately, most of the times, these modifications seek to deceive viewers, change opinions or even affect how people perceive reality. Therefore, it is paramount to devise and deploy efficient and effective detection techniques. From all types of image forgeries, composition images are specially interesting. This type of forgery uses parts of two or more images to construct a new reality from scenes that never happened. Among all different telltales investigated for detecting image compositions, image-illumination inconsistencies are considered the most promising since a perfect light matching in a forged image is still difficult to achieve. This thesis builds upon the hypothesis that image illumination inconsistencies are strong and powerful evidence of image composition and presents four original and effective approaches to detect image forgeries. The first method explores eye specular highlight telltales to estimate the light source and viewer positions in an image. The second and third approaches explore metamerism, when the colors of two objects may appear to match under one light source but appear completely different under another one. Finally, the last approach relies on user¿s interaction to specify 3-D normals of suspect objects in an image from which the 3-D light source position can be estimated. Together, these approaches bring to the forensic community important contributions which certainly will be a strong tool against image forgeries
Doutorado
Ciência da Computação
Doutor em Ciência da Computação
Bača, Michal. "Forenzní analýza webového prohlížeče." Master's thesis, Vysoké učení technické v Brně. Ústav soudního inženýrství, 2015. http://www.nusl.cz/ntk/nusl-233196.
Full textJones, Eric Douglas. "Forensic Investigation of Stamped Markings Using a Large-Chamber Scanning Electron Microscope and Computer Analysis for Depth Determination." TopSCHOLAR®, 2013. http://digitalcommons.wku.edu/theses/1237.
Full textNordin, Anton, and Felix Liffner. "Forensiska Artefakter hos Mobila Applikationer : Utvinning och Analys av Applikationen Snapchat." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40207.
Full textMartinka, Jan. "Digitální forenzní věda a její aplikace při forenzním auditu účetnictví." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-193055.
Full textLara, Alexandre Guilherme de. "Metodologia para análise na perícia criminal de microvestígios forenses: fios de cabelo." Universidade Tecnológica Federal do Paraná, 2016. http://repositorio.utfpr.edu.br/jspui/handle/1/2006.
Full textThis monographic dissertation aimed to develop standards of microscopic forensic hair analysis. A very common trace to be found in certain crimes (DOREA, 2010), hair can be helpful to provide information regarding the perpetrator or the way that the crime was committed (ROBERTSON, 1999). Once hair is a low degradation fiber (ROBBINS, 2012), it can be analyzed long after the fact, becoming even more relevant in crime scenes processed after elapse time. The equipment’s used for this study are commonly found in forensic labs, allowing broad use. The study was restricted to literature review and further elaboration of preparation and analysis by optical microscopy of hairs methods, identifying the characteristics of forensic interest that can be studied. Samples of hair for cross section and longitudinal sections analysis had been used. Destructive and non-destructive methods in permanent and non-permanent blades where tested. As a result a low cost methodology was obtained for forensic applications in traces collected from crime scenes, weapons used in crimes or suspects, in order to combat crime by using the probative power of physical evidence.
Al, Mutawa Noora Ahmad Khurshid. "Integrating behavioural analysis within the digital forensics investigation process." Thesis, University of Central Lancashire, 2018. http://clok.uclan.ac.uk/25412/.
Full textBelvisi, Nicole Mariah Sharon. "Document Forensics Through Textual Analysis." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40157.
Full textStelly, Christopher D. "A Domain Specific Language for Digital Forensics and Incident Response Analysis." ScholarWorks@UNO, 2019. https://scholarworks.uno.edu/td/2706.
Full textAlMarri, Saeed. "A structured approach to malware detection and analysis in digital forensics investigation." Thesis, University of Bedfordshire, 2017. http://hdl.handle.net/10547/622529.
Full textHomem, Irvin. "Towards Automation in Digital Investigations : Seeking Efficiency in Digital Forensics in Mobile and Cloud Environments." Licentiate thesis, Stockholms universitet, Institutionen för data- och systemvetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-130742.
Full textSylve, Joseph T. "Towards Real-Time Volatile Memory Forensics: Frameworks, Methods, and Analysis." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2359.
Full textSilva, Ewerton Almeida 1988. "Identificação de manipulações de cópia-colagem em imagens digitais." [s.n.], 2012. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275632.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-23T03:37:08Z (GMT). No. of bitstreams: 1 Silva_EwertonAlmeida_M.pdf: 20654769 bytes, checksum: cd66fa66dedc48d34c5feb0fa0311759 (MD5) Previous issue date: 2012
Resumo: Neste trabalho, nós investigamos duas abordagens para detecção de manipulações de Cópia-colagem (Copy-move Forgery) em imagens digitais. A primeira abordagem é baseada no algoritmo PatchMatch Generalizado [4], cuja proposta é encontrar correspondências de patches (blocos de pixels de tamanho definido) em uma ou mais imagens. A nossa abordagem consiste na aplicação do PatchMatch Generalizado em uma dada imagem com o propósito de encontrar, para cada patch desta, um conjunto de patches similares com base nas distâncias de seus histogramas. Em seguida, nós verificamos as correspondências de cada patch para decidir se eles são segmentos de uma região duplicada. A segunda abordagem, que consiste em nossa principal contribuição, é baseada em um processo de Votação e Análise Multiescala da imagem. Dada uma imagem suspeita, extraímos pontos de interesse robustos a operações de escala e rotação, encontramos correspondências entre eles e os agrupamos em regiões com base em certas restrições geométricas, tais como a distância física e a inclinação da reta que os liga. Após a aplicação das restrições geométricas, criamos uma pirâmide multiescala que representará o espaço de escalas da imagem. Nós examinamos, em cada imagem, os grupos criados usando um descritor robusto a rotações, redimensionamentos e compressões. Este processo diminui o domínio de busca de regiões duplicadas e gera um mapa de detecção para cada escala. A decisão final é dada a partir de uma votação entre todos os mapas, na qual um segmento é considerado duplicado se este assim o é na maioria das escalas. Nós validamos ambos os métodos em uma base de imagens que construímos. A base _e composta por 108 clonagens originais e com elevado grau de realismo. Comparamos os métodos propostos com outros do estado da arte nessa mesma base de imagens
Abstract: In this work, we investigate two approaches toward Copy-move Forgery detection in digital images. The first approach relies on the Generalized PatchMatch algorithm [4], which aims at finding patch correspondences in one or more images. Our approach consists in applying the Generalized PatchMatch algorithm in a certain image in order to obtain, for each of its patches, a set of similar patches based on their histogram distances. Next, we check the correspondences of each patch to decide whether or not they are portions of a duplicated region. Our second approach is based on a Voting and Multiscale Analysis process of an image. Given a suspicious image, we extract its interest points robust to scale and rotation transformations and we find possible correspondences among them. Next, we group the correspondent points into regions considering some geometric constraints, such as physical distance and inclination of the line between points of interest. After that, we construct a multiscale pyramid to represent the image scale-space. In each image, we examine the created groups using a descriptor robust to rotation, scaling and compression. This process decreases the search space of duplicated regions and yields a detection map. The final decision depends on a voting among all the detected maps, in which a pixel is considered as part of a manipulation if it is marked as so in the majority of the pyramid scales. We validate both methods using a dataset we have built comprising 108 original and realistic clonings. We compare the proposed methods to others from the state-of-the-art using such cloning dataset
Mestrado
Ciência da Computação
Mestre em Ciência da Computação
Bonomi, Mattia. "Facial-based Analysis Tools: Engagement Measurements and Forensics Applications." Doctoral thesis, Università degli studi di Trento, 2020. http://hdl.handle.net/11572/271342.
Full textFuruseth, Andreas Grytting. "Digital Forensics: Methods and tools for retrieval and analysis of security credentials and hidden data." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2005. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9264.
Full textThis master thesis proposes digital forensic methods for retrieval and analysis of steganography during a digital investigation. These proposed methods are examined using scenarios. From the examination of steganography and these cases, it is concluded that the recommended methods can be automated and increase the chances for an investigator to detect steganography.
Cunha, Lucas Marques da. "Reconhecimento de adulterações em imagens digitais: uma abordagem passiva." Universidade Federal da Paraíba, 2016. http://tede.biblioteca.ufpb.br:8080/handle/tede/9270.
Full textMade available in DSpace on 2017-08-16T13:37:17Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 3482689 bytes, checksum: 32f617e5ecce7581c6cf74bc8c431049 (MD5) Previous issue date: 2016-06-22
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
The creation and marketing of image editing software allowed ordinary people to perform any kind of manipulation in digital images. In a judicial context, where authenticity and data integrity are crucial, the development of techniques to ensure such attributes are needed. Forensic analysis of digital image aims to use computational scientific methods, such as analysis of a sensor device and JPEG (Joint Photographic Experts Group) artifacts, in order to recognize the presence or absence of such attributes. This paper presents a passive approach to Tampering Recognition in Digital Images with and without JPEG compression using two approaches. The first approach is based on analysis of the 4-pixel neighborhood that may be classified as interpolated or not. Based on such analysis, we obtain information about the standard CFA (Color Filter Array) pattern to investigate the authenticity and integrity of images with low or no compression according to misclassification of pixels. The second approach is based on inconsistency analysis of BAG (Block Grid Artifact) pattern in images with high compression created under tampering techniques like composition and cloning. The image's BAG is the distinction of JPEG blocks. Furthermore, segmentation techniques have been defined for precise location of the tampered area. The method selects one of the approaches according to the image compression ratio. The analysis is performed in agreement with the values of accuracy, sensitivity, specificity, and accuracy. The accuracy rates ranged from 85.1% to 95.4% and precision rates between 41.7% to 74.3%. Values from 32.3% to 82.2% were obtained for sensitivity rates and between 85.9% to 99.2% for specificity in an image database composed by 960 images interpolated by different algorithms and tampered by composition and cloning. The methods described in the literature have a limited scope related to the formats of the images tested and how they gauge their effectiveness. The approach proposed differs from these techniques presenting a most wide scope in the mentioned questions, covering images with and without compression, and assessing the efficiency from metrics able to prove the assumptions during the research.
A criação e comercialização de softwares de edição de imagens permitiram que pessoas leigas pudessem realizar qualquer tipo de manipulação em imagens digitais. Em um cenário judicial em que autenticidade e integridade dos dados são cruciais, há necessidade de técnicas que permitam promover tais atributos. A análise forense em imagens digitais busca por meio de métodos científicos computacionais, como a análise do sensor do dispositivo e artefatos JPEG (Joint Photographic Experts Group), reconhecer a presença ou ausência desses atributos. O presente trabalho apresenta uma Abordagem Passiva para o Reconhecimento de adulterações em imagens digitais com e sem compressão JPEG utilizando duas abordagens. A primeira abordagem baseia-se na técnica de análise da vizinhança-4 de um pixel que pode ser classificado como interpolado ou não interpolado. A partir dessa análise, obtêm-se as informações sobre o padrão CFA (Color Filter Array) de modo a investigar a autenticidade e integridade de imagens com baixa ou nenhuma compressão, de acordo com a classificação incorreta dos pixels. A segunda abordagem baseia-se na Análise da Inconsistência do BAG (Block Artifact Grid) de imagens com alta compressão gerado a partir de técnicas de adulteração, tais como composição e clonagem. O BAG da imagem trata-se da demarcação dos blocos JPEG. Além disso, foram definidas técnicas de segmentação para localização precisa da região adulterada. O método seleciona uma das abordagens, a partir do valor da taxa de compressão da imagem. A análise dos resultados é feita a partir dos valores de acurácia, sensibilidade, especificidade e precisão. As taxas de acurácia variaram de 85,1% a 95,4%, e com taxas de precisão entre 41,7% a 74,3%. Para as taxas de sensibilidade, obteve-se valores entre 32,3% a 82,2% e para especificidade valores entre 85,9% a 99,2%, para uma base de dados composta por 960 imagens interpoladas por algoritmos distintos e adulteradas por técnicas de composição e clonagem. Os métodos descritos na literatura apresentam um escopo limitado referente aos formatos das imagens que foram testadas e ao modo como aferem a eficiência de suas técnicas. A abordagem proposta distingue-se dessas técnicas apresentando um escopo com maior abrangência nos quesitos mencionados, englobando imagens com e sem compressão, além de aferir a eficiência a partir de métricas capazes de comprovar as hipóteses levantadas ao longo da pesquisa.
Lucente, Leonardo. "Progettazione e Sviluppo di una Web Application per l’Analisi di Reti Sociali in ambito Forense." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/22981/.
Full textCanovas, Thorsell Roberto. "Integritet av IT-forensiska verktyg för automatisk analys." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20166.
Full textCybercrime is on the rise in society and the Swedish Police is facing new challenges in identifying criminals. More tools and services are becoming automated, and this also applies to the tools that the Swedish Police uses. One of the challenges is the enormous amount of data that must be processed and analyzed during investigations. The tools used are always third-party programs and IT-forensics needs to rely on the organization that makes the software. This study aims to evaluate two different tools in how they identify and present artifacts. The study is conducted in collaboration with the Police Authority at the Regional IT Crime Center West - Skövde and hopes to bring new insights and knowledge into the tools on which the comparison is based on and with the help of the knowledge be able to value the integrity of the tools. The result that the study presents is that the tools are presenting data with preserved integrity.
Federici, Corrado <1965>. "The twofold role of Cloud Computing in Digital Forensics: target of investigations and helping hand to evidence analysis." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amsdottorato.unibo.it/6694/.
Full textQaisi, Ahmed Abdulrheem Jerribi. "Network Forensics and Log Files Analysis : A Novel Approach to Building a Digital Evidence Bag and Its Own Processing Tool." Thesis, University of Canterbury. Computer Science and Software Engineering, 2011. http://hdl.handle.net/10092/5999.
Full textTaubmann, Benjamin [Verfasser], Hans P. [Akademischer Betreuer] Reiser, and Nuno [Akademischer Betreuer] Santos. "Improving Digital Forensics and Incident Analysis in Production Environments by Using Virtual Machine Introspection / Benjamin Taubmann ; Hans P. Reiser, Nuno Santos." Passau : Universität Passau, 2020. http://d-nb.info/1216330506/34.
Full textgorbov, sergey. "Practical Application of Fast Disk Analysis for Selective Data Acquisition." ScholarWorks@UNO, 2016. http://scholarworks.uno.edu/td/2230.
Full textEkfeldt, Jonas. "Om informationstekniskt bevis." Doctoral thesis, Stockholms universitet, Juridiska institutionen, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-125286.
Full textBouchaud, François. "Analyse forensique des écosystèmes intelligents communicants de l'internet des objets." Thesis, Lille, 2021. http://www.theses.fr/2021LILUI014.
Full textWith the development of the Internet of Things, searching for data in a digital environment is an increasingly difficult task for the forensic investigator. It is a real challenge, especially given the heterogeneity of the connected objects. There is a lack of standardization in communication architectures and data management policies. It is accompanied by dependencies between connected ecosystems, especially through hidden links and fragmented information. In this thesis, we suggest adjusting the traditional approach of digital investigation to the constraints of the Internet of Things. We develop methodologies and tools to understand and analyze the connected environment. We assume that the crime scene is a connected whole and not an aggregate of independent digital objects. It contains key data for understanding and contextualizing a past event or phenomenon as evidence for the criminal trial. Digital forensics is considered to be the og extit{application of science to the identification, collection, examination, and analysis, of data while preserving the integrity of the information and maintaining a strict chain of custody for the data fg~ (National Institute of Standards and Technology). Faced with a crime scene, the investigator seeks to understand the criminal event. He examines the data stored in the physical medium and/or in a remote part of the cloud. Our work develops a process of rapid identification of the phenomenon according to four phases: detection, localization, object recognition and information crosschecking. It is enriched with radio signature search tools~: single-sensor and multi-sensor mesh network. This approach is built around the problem of apprehending a multiform connected environment, containing devices that are not always visible or identifiable during a field approach. We integrate in our study the strategy of equipment collection. The challenge lies in the ability to extract one or more connected objects, without compromising the stored data, to place them in a controlled and secure environment. The object is maintained in a state that guarantees the non-alteration or loss of data. The study includes a first phase of understanding the physical environment and dependencies. It seeks to determine the mechanisms of information migration to online platforms and to isolate groups of objects by intelligently breaking the connections. Devices are extracted, then packaged and sealed according to their technical characteristics and the connected infrastructure. We then deepen the exploitation of the information collected using forensic methods. The data is then analyzed according to temporal, spatial and contextual axes. We also propose a classification and a prioritization of the connected structure according to the characteristics of the desired data. The work gives a reading of the life cycle of the data within the Internet of Things infrastructure. In a prospective approach, we deepen the questions of the fine identification of the connected object according to these hardware and software characteristics. The acoustic signature of electronics appears as a relevant physical property in the study of equipment. This feature completes our range of tools in the identification of connected objects
(11218029), Herschel R. Bowling. "A Forensic Analysis of Microsoft Teams." Thesis, 2021.
Find full text(11205891), Tanvi Milind Gandhi. "Forensic Analysis of GroupMe on Android and iOS Smartphones." Thesis, 2021.
Find full textAdedayo, Oluwasola Mary. "Reconstruction in Database Forensics." Thesis, 2015. http://hdl.handle.net/2263/43777.
Full textThesis (PhD)--University of Pretoria, 2015.
Computer Science
PhD
Unrestricted
Wu, Bo-Lin, and 吳柏霖. "A Study on VoIP Attack Analysis and Digital Evidence Forensic Mechanism." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/48828100897889091952.
Full text佛光大學
資訊學系
98
From the ancient beacon fire communication, pigeon mail to the present mobile communication, different risks come up with the developments of each communication technology. In the case of pigeon mail, the most critical risk is that the pigeons may be shot by the hunters during the delivery. And the ways of eavesdropping on telephone is undoubtedly numerous. People nowadays benefit from the popularization of communication, the choices of communication tools become various – from the common fixed-line telephone to mobile phone which is invented for the need of convenience in movability. Also, the VoIP has been developed in order to lower down the cost of communication; nevertheless, the new technology becomes the best crime tool for the evildoers and damages the public security because of its high anonymous characteristic, movability and low-cost characteristic. Thus, we should put much emphasis on information communication security (ICT); otherwise it may cause great damage to ourselves and even national security. Research, Development and Evaluation Commission once hold an internet election of “Top Ten Complaints”, the result showed that the overabundance of phone and internet fraud was included. This result represents that the phone and internet fraud trouble people a lot. Thus, this research will first discuss the analysis of the crime mode of phone and internet fraud and the collect the security threats of VoIP. Then this paper will analyze the threats one-by-one and comes up with different reacting policies. Furthermore, this research also brings up the VoIP Digital Evidence Forensics Standard Operating Procedures in order to help the police organizations and sets up an experimenting platform which is able to operate phone calls, attacks and forensics to test and verify the research. Consequently, this paper will discuss how the evildoers use communication technology to commit the crime such as the crime facts, crime techniques and investigation methods of internet phone fraud. Next, the analysis will be focused on the security of internet phone and organize a prevention method of internet phone call attack and the attention points of setting up a internet phone; at the same time, the importance of digital evidence and digital forensics will be pointed out. At last, this research will combine the discussion of the digital evidence mechanism and internet phone call in order to integrate the VoIP DEFSOP for the crime investigators and people who are interested in digital evidence forensics to consult to.
Yi, Jun. "User Interface Design And Forensic Analysis For DIORAMA, Decision Support System For Mass Casualty Incidents." 2015. https://scholarworks.umass.edu/masters_theses_2/308.
Full textKellerman, Lizan. "Evaluating the effectiveness of Benford's law as an investigative tool for forensic accountants / Lizan Kellerman." Thesis, 2014. http://hdl.handle.net/10394/11729.
Full textMCom (Forensic Accountancy), North-West University, Potchefstroom Campus, 2014
Fei, B. K. L. (Bennie Kar Leung). "Data visualisation in digital forensics." Diss., 2007. http://hdl.handle.net/2263/22996.
Full textDissertation (MSc (Computer Science))--University of Pretoria, 2007.
Computer Science
unrestricted
WANG, PO-KAI, and 王柏凱. "Research on Correlation Analysis of Logs from Digital Forensics Tools." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/jk77zx.
Full text中國文化大學
資訊管理學系
106
Digital forensics encompasses the investigation to computer crime in order to trace criminals.Digital authentication has many phases. The difficulty of digital identification lies in the fact that identifiers would have to use distinct tools depending on different purposes. Therefore, identification often results of logs in requiring a number of tools to implement and the execution of tools are complicated. Furthermore, these forensics tools often necessary to interpret the results generated by each tool as a basis for the next step. The current tools, however, are lack of integration and the outputs from which are hard to comprehend as well. In the face of increasingly complex cyber attacks, the demand in Digital Forensics for business organization has been increasing rapidly. Digital Forensics needs experiences from experts and a great deal of time, therefore, it becomes a challenge for Digital Forensics when it comes to how to collect logs information and analyze suspicious computers. This study had collected information from victim's computer through various perspective and tools. This system will perform five-oriented analysis for feasible systems: abnormal network connections, abnormal browsing records, abnormal changes of system, abnormal file checking, and abnormal program checking. Finally, in this research, we will provide an integrated forensic tool: The digital-forensic-system, it analyzes victim’s computer, and looks forward to executing the digital forensic work in a quick and correct way. Key Words: digital forensics, incident investigation tools, information security
Calé, Joana Cardoso. "Human fingerprint dating in forensic analysis." Master's thesis, 2020. http://hdl.handle.net/10451/47632.
Full textAs impressões digitais, constituídas por cristas e vales, formam um determinado padrão que é único a cada indivíduo. Metabolitos do suor e outras secreções, bem como resíduos químicos presentes na ponta de um dedo deixam não só um padrão específico para o indivíduo, uma impressão digital latente, como também vasta informação que pode ser explorada para propósitos forenses. As impressões digitais la tentes fornecem um forte valor probatório no que diz respeito a investigações forenses há mais de meio século, particularmente através da comparação de padrões como meio de identificação. Do progresso da ciência e da tecnologia, adveio a progressão no que diz respeito à aquisição e interpretação de provas e evidências associadas a impressões digitais latentes [1]. Os mais recentes desenvolvimentos estão asso ciados à determinação da informação química e bioquímica contida numa impressão digital, sendo que vários estudos foram já iniciados no sentido de avaliar a composição química de uma impressão digital [2]. A simples visualização de uma impressão digital e o processamento da mesma numa base de dados em busca de uma correspondência pode terminar sem que qualquer correspondência tenha sido efetivamente encontrada. Desta forma, cessa qualquer uso futuro da impressão digital como meio de identificação ou de investigação [3]. No entanto, o processo de análise da impressão digital não tem de terminar obrigatoriamente com a pesquisa numa base de dados; e é isso que é proposto e investigado ao longo deste trabalho – amplificar as informações que podem ser recuperadas a partir de impressões digitais latentes. O trabalho aqui descrito concentra-se em explorar e aprofundar o conhecimento que pode ser adquirido a partir da informação química de uma impressão digital. Particularmente, a composição de uma im pressão digital no momento em que esta é depositada, bem como as alterações químicas que ocorrem nos compostos que a constituem ao longo do tempo. Tal é de extrema importância, uma vez que a datação das impressões digitais pode ter um impacto significativo na área das ciências forenses, visto que tem o potencial de auxiliar o processo judicial ao avaliar a relevância e o valor de uma impressão digital encontrada na cena do crime. Assim, permitiria aos investigadores não só identificar as pessoas com acesso à cena do crime, mas também criar uma cronologia dos eventos sucedidos a fim de perceber se um dado indivíduo teve ou não acesso a esse local na altura em que o crime ocorreu [2]. É ainda de salientar que não existe atualmente um método que seja capaz de prever a idade de uma impressão digital com rigor e exatidão, não sendo por isso possível determinar quando é que ocorreu a deposição da mesma [4]. Porém, a espetrometria de massa tem-se revelado uma metodologia analítica de crescente interesse no que diz respeito ao estudo de impressões digitais. Este interesse crescente está associado à elevada quantidade de informação que pode ser extraída de uma impressão digital, tanto no que diz respeito à própria impressão digital, como no que concerne ao dador da mesma [4]. Relativamente à investigação, a análise foi realizada num número variável de voluntários – dois voluntários para a análise de uma gama de solventes, nove voluntários para a análise de amostras incubadas durante um mês e oito voluntários para amostras incubadas durante uma semana. Os voluntários fazem parte do grupo de investigação do Laboratório de FT-ICR e Espectrometria de Massa Estrutural (FTICR-MS-Lisboa) da Faculdade de Ciências da Universidade de Lisboa, abrangendo elementos de diferentes faixas etárias e sexos. Deste modo, os resultados obtidos e as conclusões alcançadas apenas refletem uma tendência média da amostra em estudo. Adicionalmente, não houve qualquer tipo de controlo relativamente à dieta de cada voluntário nem sobre a força exercida pelos dedos dos mesmos nas lâminas de vidro, uma vez que se procurou reproduzir o mais próximo possível o cenário encontrado numa cena do crime. A espetrometria de massa de ressonância ciclotrónica de ião com transformada de Fourier (FT-ICR MS) foi a metodologia analítica escolhida, uma vez que permite a determinação precisa da fórmula química de uma molécula a partir da massa medida, facilitando também a pesquisa numa base de dados, devido à sua extrema precisão de massa. Neste caso, ao conhecer a composição elementar das pequenas moléculas encontradas numa impressão digital é possível identifica-las. A extração de compostos químicos de superfícies não porosas e inertes foi otimizada. Para tal, foi analisada uma gama de solventes de modo a determinar qual o melhor para a análise de impressões digitais. Esta determinação teve por base não só o risco químico associado a cada solvente, como a sua disponibilidade e o número de compostos cujo solvente permitia identificar por espetrometria de massa. Deste modo, tendo permitido a identificação de 19 compostos, tratando-se do mais seguro e do mais adequado para o método de ionização utilizado (ESI), o solvente constituído por acetonitrilo : metanol : água foi considerado o mais adequado para prosseguir com o estudo do envelhecimento de impressões digitais. A aplicação da espetrometria de massa permitiu a identificação e confirmação da presença de vários compostos previamente descritos na literatura como presentes em impressões digitais. Contudo, permitiu também a identificação de novos compostos, presentes habitualmente no suor, que aparentam variar com o envelhecimento dos resíduos da impressão digital. No que diz respeito ao aparecimento de compostos após a incubação, foi possível identificar compostos associados à decomposição de colesterol, ácidos carboxílicos e derivados, ácidos gordos saturados e insaturados e aminoácidos. Para além destas classes de compostos, que já haviam sido descritas como aparecendo em impressões digitais com o passar do tempo, foram identificados compostos como o esqualeno e lactapiperanol D. Relativamente aos compostos descritos como desaparecendo após um determinado período de incubação, alguns dos mencionados são ácidos gordos insaturados, esqualeno e derivados do esqualeno. Neste caso, para além da identificação de ácidos gordos insaturados, foi detetada a presença de novos com postos como o ácido esteárico e lactapiperanol D, cujo desaparecimento ainda não foi descrito na literatura. O aumento da quantidade de um dado composto foi medido pelo aumento da intensidade do mesmo. Ácidos gordos saturados de cadeia curta têm tendência a sofrer um aumento, uma vez que podem derivar de ácidos gordos de cadeia longa. Epóxidos de esqualeno e derivados do esqualeno foram também previamente descritos como aumentando ao longo do tempo. Para amostras incubadas durante um mês, verificou-se o aumento da quantidade de alguns ácidos gordos saturados de cadeia média, nomeada mente os ácidos azelaico e láurico. O ácido adípico, uma forma oxidada que deriva do esqualeno, foi também identificado. Por outro lado, a diminuição da quantidade de um determinado composto foi medida através da diminuição da intensidade do mesmo. Ácidos gordos insaturados, triglicéridos, colesterol e esqualeno são compostos cuja quantidade tende a diminuir com o passar do tempo. Neste caso, nenhum composto foi identificado para amostras incubadas durante o período de um mês. Porém, tanto o ácido colnelénico como o metilgingerol foram identificados como tendo diminuído após uma semana de incubação, sendo que o ácido colnelénico se trata de um ácido gordo insaturado Assim sendo, foi possível confirmar não só variações de compostos previamente descritos na literatura, como também identificar novos compostos que aparentam variar similarmente com o envelhecimento dos resíduos deixados pela impressão digital. Embora os resultados apresentados e as conclusões alcançadas sejam preliminares, é possível mostrar que uma técnica de alta resolução como a espectrometria de massa FT-ICR pode vir a ter um papel fulcral na análise forense e na datação de impressões digitais humanas num futuro próximo. Em suma, pretende-se que as conclusões tiradas ao longo desta dissertação potencializem um estudo futuro e mais aprofundado de como as pequenas moléculas e os compostos encontrados em impressões digitais variam com o tempo. Apesar do interesse pelas impressões digitais ter surgido há várias décadas, o seu estudo constitui ainda uma área consideravelmente inexplorada que requer mais tempo, dedicação e investigação. Deste modo, pretende-se que esta dissertação contribua para o que pode constituir o futuro da análise de impressões digitais numa perspetiva forense.
Fingerprints consist of ridges and valleys that form a pattern that is unique to the individual. Metabolites from sweat and other secretions as well as chemical residues that are present on a fingertip leave behind not only an individual specific pattern, a latent fingerprint, but also a wealth of information that may be exploited for forensic purposes [1]. Latent fingerprints have provided evidentiary value in forensic investigations for over a century, mainly through pattern comparison, as a means of identification. As science and technology have progressed, so has the collection and interpretation of evidence associated with latent fingerprints [1]. The latest developments focus on the assessment of the chemical and bio chemical information contained in a fingerprint with several studies being initiated into the chemical composition of a fingerprint [2]. Simply visualizing the fingerprint and running the image through a database in search of a match may lead to no match being actually found, ending any further use of the fingerprint as a means of identifcation [3]. However, the fingerprint analysis procedure does not have to end with a database search, and that is what we are proposing in this work, to extend information retrieval from these latent fingerprints. The work described here focuses on exploring the knowledge which can be obtained from the chemical information provided by a fingerprint, particularly the composition of a fingerprint at the time of deposition as well as the chemical changes that occur over time. This is of very high relevance as age dating of fingerprints could have a significant impact in forensic science, as it has the potential to facilitate the judicial process by assessing the relevance of a fingerprint found at a crime scene. Moreover, there is presently no current method that is capable of reliably predicting the age of a fingerprint [4]. However, mass spectrometry has become an area of increasing interest when it comes to the study of fingerprints due to the massive amount of chemical information that can be extracted regarding both the fingerprint and the donor [4]. Fourier transform ion cyclotron resonance mass spectrometry (FT-ICR MS) was the chosen analytical method for it allows the precise determination of a molecule’s chemical formula from its measured mass as well as greatly facilitating database search due to its extreme mass accuracy. Regarding our work, by knowing the elementary composition of small molecules found in fingerprints, it is possible to identify them. Chemical compound extraction from non-porous, inert surfaces was optimized and used to identify the compounds present in fingermark residue before and after an incubation period of either a week or a month. Besides confirming variations in classes of compounds that had previously been described in the literature, it was also possible to specifically identify not only those compounds but compounds that had not been described in former research studies. These compounds’ time variations should be further analysed to confirm their consistency and their potential as target compounds for fingerprint dating. Although the results presented and the conclusions reached are preliminary, it is possible to show that a high-resolution technique such as FT-ICR mass spectrometry may come to play a pivotal role in forensic analysis and dating of human fingerprints in the near future. It is intended that these results will potentiate a further study into how small molecules found in finger prints change with time, as well as contributing to what could be the future of fingerprint analysis in a forensic perspective
Baril, David-Emmanuel. "La transformation des enquêtes policières due à l’influence des technologies : perspective d’une unité policière spécialisée en analyse judiciaire informatique." Thèse, 2014. http://hdl.handle.net/1866/11888.
Full textLouis, Anita Lily. "Unsupervised discovery of relations for analysis of textual data in digital forensics." Diss., 2010. http://hdl.handle.net/2263/27479.
Full textDissertation (MSc)--University of Pretoria, 2010.
Computer Science
unrestricted
(6630773), Emily R. Bartusiak. "An Adversarial Approach to Spliced Forgery Detection and Localization in Satellite Imagery." Thesis, 2019.
Find full textFang, Yen-Fei, and 方彥霏. "Study on Constructing Digital Evidence Forensics Standard Operating Procedures for Mobile Device - Extraction and Analysis of Digital Evidence on Smartphone." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/qrh62j.
Full text國立宜蘭大學
多媒體網路通訊數位學習碩士在職專班
104
As Internet technology improves, mobile communications protocols mature and intelligent diversification and the popularity of mobile phones, change the habits of people using their cell phones, cell phone is no longer a traditional phone, smart phone, you can use communications software to communicate, surf the Web page associated with the transaction and storage of personal information ( Such as photos, notes, etc ), It's like computer action. Convenience of mobile phones, making it dependent on deepening, even those tools of crime, smart phone as the computer there are a lot of electromagnetic records, these records are digital evidence forensic value. In view of this, traditional methods of forensic equipment and will not be enough to gather digital evidence in the mobile phone. About digital evidence, and selection and use of forensic tools, is the main professional and examiner must have basic knowledge. Digital evidence collection, analysis, extraction process, you must use the standard digital forensics process in order to enhance its credibility and effectiveness. According to the scholars of this study by Professor I-Lon Lin 's Digital Evidence Forensics Standard Operating Procedure (DEFSOP), To constructing Digital Evidence Forensics Standard Operating Procedure for Mobile Device (DEFSOP For Mobile Device ). With the ISO 27037:2012 and ISO 27041:2015 analysis than to verify DEFSOP Rigorous and availability through the example DEFSOP For Mobile Device integrity and effectiveness. Mobile phone forensics operations, data extraction has some software tools can be used, under the multiple tools of interaction uses, extract the necessary evidence is not a problem, more difficult question is how to properly manage all these digital evidence, its maximum effectiveness. This study selected forensics tool for Android provides the ADB and the Cellebrite UFED through digital evidence forensics software extraction, classification and identification of data availability and validity of cross-analysis, comparison of reducing crime facts. The results of this study contribute: First, this study suggests that the Digital Evidence Forensics Standard Operating Procedure for Mobile Device (DEFSOP For Mobile Device) prototype, and three real cases to prove the four stages theory concepts, phases of preparation, action and reporting, provides event investigation and forensics officers followed standard operating procedures. Second, this study used forensic tools ADB and UFED , Through the comparative analysis of the advantages and disadvantages, operation and presentation of results, provide event investigation forensic tools reference you can follow. Three, an event-handling standards, this paper studies the international funding ISO 27041:2015 and use Cellebrite UFED Forensic tool test for China's first research master's thesis.