Dissertations / Theses on the topic 'Memory forensics'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Memory forensics.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Pagani, Fabio. "Advances in memory forensics." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS299.
Full textThe adoption of memory forensics - the art of extracting artifacts from the volatile memory of a compromised system - is spreading in cyber-security investigations. The main reason of this enthusiasm comes from the fact that many artifacts can not be found elsewhere. In this way, the forensics analysts can gain the big picture over a malicious behavior. Nevertheless, memory forensics is less than two decades old: many challenges are unsolved and many questions are unanswered. This thesis gives a new perspective over three of these problems. The first contribution studies the effects non-atomic acquisition methods. The root cause of this problem is quite straightforward to explain: while the memory is acquired, user and kernel processes are running and therefore modifying the content of the memory. For this reason, the resulting memory dump does not represent the state of the memory in a given point in time, but rather a mix of multiple points. The second contribution focus on automatically extracting a forensics profile from a memory dump. Having a valid profile is a strong requirement for memory analysis because without one any structured memory forensics technique can be applied. Therefore, this problem effectively prevents memory forensics to be applied in those scenarios where creating a profile is harder -- if not impossible. The third and last contribution of this thesis aims to change how forensics rules, better known as plugins, are created. Nowadays, these rules are manually written by kernel experts and forensics practitioners. Unfortunately, this manual approach does not have any guarantee on the quality or on the uniqueness of these rules
Ayers, Amy L. "Windows hibernation and memory forensics." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1586690.
Full textABSTRACT The purpose of this capstone project was to research the hibernation file, its role in memory forensics and to explore current technology, techniques and concepts for analysis. This study includes an in-depth look at the Windows hibernation feature, file format, potential evidence saved to the file and its impacts in digital forensic investigations. This research was performed to demonstrate the importance of the hibernation file and to generate awareness for this forensic artifact. The research questions presented were designed to identify the properties of Windows hibernation and its significance in digital forensics. Additionally, these research questions were aimed at identifying the important concepts analysts should understand in selecting forensic software and in hibernation analysis. Through the literature review process, the hibernation file was identified as an essential part of digital forensics which provides analysts with snapshots of system memory from various points in the past. This data includes web, email and chat sessions in addition to running processes, login credentials, encryption keys, program data and much more. Beyond forensics, the hibernation file is useful in the fields of data recovery and incident response. A review of current hibernation file publications revealed incomplete and conflicting works culminating in the acknowledgment that more research is needed in order to close these research gaps. More awareness for hibernation forensics through its inclusion in future published works and in computer forensic educational courses is recommended. These inclusions will assist to arm practitioners with the ability to accurately utilize the hibernation file in order to obtain the highest quality forensic evidence. Keywords: Cybersecurity, hiberfil.sys, hybrid sleep, malware, slack space, Albert Orbinati.
Veca, Matthew. "Extracting Windows event logs using memory forensics." ScholarWorks@UNO, 2015. http://scholarworks.uno.edu/td/2119.
Full textCase, Andrew. "Detecting Objective-C Malware through Memory Forensics." ScholarWorks@UNO, 2016. http://scholarworks.uno.edu/td/2132.
Full textOliveri, Andrea. "A Zero-Knowledge Approach to Memory Forensics." Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS312.
Full textThe rapid increase of embedded devices and IoT objects is leading to a multiplication of operating systems and processor architectures, which are generally not supported by current forensic tools and require considerable effort to adapt. To overcome this problem, we introduce the concept of zero-knowledge memory forensics: performing a memory forensic analysis without any knowledge of the underlying operating system. Assuming that we have performed a memory dump of the unknown operating system, using only information derived from the machine's hardware configuration, we claim that it is possible to reconstruct the kernel address space independently of the operating system. From these, it is possible to reconstruct kernel data structures in memory using only their topology
Saltaformaggio, Brendan D. "Forensic Carving of Wireless Network Information from the Android Linux Kernel." ScholarWorks@UNO, 2012. http://scholarworks.uno.edu/honors_theses/20.
Full textWhite, Andrew J. "Identifying the unknown in user space memory." Thesis, Queensland University of Technology, 2013. https://eprints.qut.edu.au/64181/1/Andrew_White_Thesis.pdf.
Full textSylve, Joseph T. "Towards Real-Time Volatile Memory Forensics: Frameworks, Methods, and Analysis." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2359.
Full textSylve, Joseph T. "Android Memory Capture and Applications for Security and Privacy." ScholarWorks@UNO, 2011. http://scholarworks.uno.edu/td/1400.
Full textSansurooah, Krishnun. "A forensics framework and method in the acquisition and extraction of data from NAND Flash memory storage chip." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2015. https://ro.ecu.edu.au/theses/1725.
Full textTagesson, Samuel. "Anti-forensik mot minnesforensik : En litteraturstudie om anti-forensiska metoder mot minnesdumpning och minnesanalys." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17818.
Full textIT forensics face many difficulties in their work of obtaining and analyzing data. Criminals are using more and more anti-forensic methods to hide evidence that can be used against them. One common anti-forensic method is encryption. In order for IT forensics to access the encrypted information, the encryption key can be found in the memory of the computer. This makes the computer's memory valuable to retrieved and analyze. However, there are several anti-forensic methods that a criminal can use to prevent the memory from being retrieved or analyzed. This study performs a systematic literature study to identify the current anti-forensic methods against memory analysis and memory dumping on Windows system. Several methods are addressed where, among other things, the operating system is modified or built-in security functions on the CPU are used to prevent information being retrieved or analyzed from memory.
Hjerpe, David, and Henrik Bengtsson. "Digital forensics - Performing virtual primary memory extraction in cloud environments using VMI." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16735.
Full textMarkanovic, Michel, and Simeon Persson. "Trusted memory acquisition using UEFI." Thesis, Blekinge Tekniska Högskola, Institutionen för kreativa teknologier, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3582.
Full textStuettgen, Johannes [Verfasser], and Felix [Akademischer Betreuer] Freiling. "On the Viability of Memory Forensics in Compromised Environments / Johannes Stuettgen. Gutachter: Felix Freiling." Erlangen : Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2015. http://d-nb.info/1076120490/34.
Full textMaystorovich, Chulio Natalie Rebecca. "The Materiality of Human Remains in Unearthing Spain’s Repressed Past: What Exhumations Tell Us About Law, Forensics, Human Rights and Memory." Thesis, The University of Sydney, 2019. http://hdl.handle.net/2123/20904.
Full textMaclennan, Maria. "Forensic jewellery : a design-led approach to exploring jewellery in forensic human identification." Thesis, University of Dundee, 2018. https://discovery.dundee.ac.uk/en/studentTheses/58ace496-6d42-4ea1-966e-a89080e69d6f.
Full textOskarsson, Tim. "Digital incursion: Breaching the android lock screen and liberating data." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44939.
Full textBond, Elyse. "Creating Volatility Support for FreeBSD." ScholarWorks@UNO, 2015. http://scholarworks.uno.edu/td/2033.
Full textGeier, Florian. "The differences between SSD and HDD technology regarding forensic investigations." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-44921.
Full textThakur, Neha S. "Forensic Analysis of WhatsApp on Android Smartphones." ScholarWorks@UNO, 2013. http://scholarworks.uno.edu/td/1706.
Full textRegan, James E. "The forensic potential of flash memory." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FRegan.pdf.
Full textThesis Advisor(s): Garfinkel, Simson. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Flash Memory, Forensics, Flash File Systems, Flash Transition Layer, YAFFS, JFFS2. Includes bibliographical references (p. 73-75). Also available in print.
Schultz, John S. "Offline forensic analysis of Microsoft Windows XP physical memory." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FSchultz.pdf.
Full textThesis Advisor(s): Chris Eagle. "September 2006." Includes bibliographical references (p. 73-74). Also available in print.
Wiley, Stephen K. (Stephen Kenneth). "Forensic Hypnosis and Memory Enhancement: Recall, Recognition, and Confidence." Thesis, University of North Texas, 1989. https://digital.library.unt.edu/ark:/67531/metadc331238/.
Full textMaartmann-Moe, Carsten. "Forensic Key Discovery and Identification : Finding Cryptographic Keys in Physical Memory." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8895.
Full textCommunication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protection of data, both in corporate laptops and private computing equipment. While encryption is a useful tool, it also present new problems for forensic investigators, as clues to their investigation may be undecipherable. However, contrary to popular belief, these systems are not impenetrable. Forensic memory dumping and analysis can pose as ways to recover cryptographic keys that are present in memory due to bad coding practice, operation system quirks or hardware hacks. The volatile nature of physical memory does however challenge the classical principles of digital forensics as its transitory state may disappear at the flick of a switch. In this thesis, we analyze existing and present new cryptographic key search algorithms, together with different confiscation and analysis methods for images of volatile memory. We provide a new proof of concept tool that can analyze memory images and recover cryptographic keys, and use this tool together with a virtualized testbed to simulate and examine the different states of platforms with several separate cryptosystems. Making use of this testbed, we provide experiments to point out how modern day encryption in general are vulnerable to memory disclosure attacks. We show that memory management procedures, coding practice and the overall state of the system has great impact on the amount and quality of data that can be extracted, and present simple statistics of our findings. The discoveries have significant implications for most software encryption vendors and the businesses relying on these for data security. Using our results, we suggest best practices that can help investigators build a more comprehensive data foundation for analysis, by reconstructing virtual memory from RAM images. We also discuss how investigators may reduce the haystack by leveraging memory and process structure on Windows computers. Finally we tie this to current digital forensic procedures, and suggest an optimized way of handling live analysis based on the latest development in the field.
Stimson, Jared M. "Forensic analysis of Windows' virtual memory incorporating the system's page-file." Thesis, Monterey, California. Naval Postgraduate School, 2008. http://hdl.handle.net/10945/3714.
Full textStimson, Jared M. "Forensic analysis of Window's® virtual memory incorporating the system's page-file." Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FStimson.pdf.
Full textThesis Advisor(s): Eagle, Chris S. "December 2008." Description based on title screen as viewed on February 2, 2009. Includes bibliographical references (p. 89-90). Also available in print.
Ryan, Rebecca G. "Assessment of a novel interview technique for improving young children's forensic reports." Morgantown, W. Va. : [West Virginia University Libraries], 2004. https://etd.wvu.edu/etd/controller.jsp?moduleName=documentdata&jsp%5FetdId=3607.
Full textTitle from document title page. Document formatted into pages; contains viii, 76 p. : ill. Includes abstract. Includes bibliographical references (p. 40-43).
Sarwar, Farhan. "Eyewitness testimonies : The memory and meta-memory effects of retellings and discussions with non-witnesses." Doctoral thesis, Lund university. Department of psychology, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-16643.
Full textDet är vanligt att ögonvittnen återger och diskuterar en upplevd brottshändelse med sin familj och vänner. Syftet med dessa diskussioner är att uppdatera familj och vänner om vad som är nytt. Dessa diskussioner har konsekvenser för ögonvittnets senare minnesrapportering och meta-minnesbedömningar. Med minnesrapportering menas här vad ett ögonvittne kan återerinra sig om den bevittnade händelsen och med meta-minnesbedömningar menas ögonvittnets känslor av säkerhet på att hans/hennes minnen av händelsen är korrekta. Vittnens meta-minnesbedömningar kallas nedan konfidensbedömningar. Med uttrycket ”god realism” i meta-minnesbedömningarna menas att nivån på vittnets konfidensbedömningar matchar nivån på korrektheten i vittnets minnesrapportering av den upplevda händelsen. Vittnets minnesrapportering och konfidensbedömningar av sina rapporterade minnen är viktig information i kriminaltekniska sammanhang. Minnet hjälper oss att förstå detaljerna i brottshändelsen och vittnets konfidensbedömningar ger hjälp att förstå korrektheten av dessa minnen. Denna avhandling har undersökt effekterna av att ögonvittnen återberättar och diskuterar (en filminspelning av) en upplevd brottshändelse med icke-vittnen (personer som inte upplevt händelsen) på ögonvittnens minnesrapportering och på deras konfidensbedömningar av de rapporterade minnena. I Studie I fick deltagarna först se en kort film (c:a 4 minuter) och därefter fem gånger över en tre-veckorsperiod uppdelade i tre betingelser antingen enbart fick återberätta händelsen eller både återberätta och diskutera händelsen med icke-vittnen (antingen i en laboratoriemiljö eller med familjemedlemmar och vänner). Lyssnarna var nya personer i var och en av de fem sessionerna. Dessa tre försöksbetingelser jämfördes mot en kontrollbetingelse där dessa aktiviteter inte skedde. Alla deltagarna genomförde en avslutande sjätte testsession där vittnena fick instruktionen att återberätta allt vad de kan minnas av den upplevda händelsen (dvs öppen fri framtagning) och tre dagar senare ge konfidensbedömningar av de olika ingående elementära minneutsagorna i de rapporterade minnena. Av intresse i studien var alltså effekten av upprepat återberättande och diskussioner av en upplevd händelse på ögonvittnens minnesrapportering och på realismen i vittnenas konfidensbedömningar i den avslutande sjätte testsessionen. Resultaten tyder på att diskussioner om en upplevd händelse kan minska några av de positiva effekterna på kvalitén i minnesrapporteringen och på realismen i meta-minne som orsakas av enbart återberättande, men att diskussionerna inte får stora negativa effekter jämfört med en kontrollbetingelse där återberättande och diskussioner av händelsen inte skett. Analys av vilken typ av frågor lyssnarna ställde visade att man frågade mer om de perifera detaljerna i händelsen, jämfört med händelsens centrala detaljer (i första hand handlingar). En uppföljande studie till studie I genomfördes ett år senare. Denna studie visade inga kvarstående tecken på de fördelar på minnesrapportering och meta-minne som deltagarna i den betingelse som enbart återberättat händelsen fem gånger uppvisade i slutsessionen i Studie I efter c:a 24 dagar. Däremot hade deltagarna, i den betingelse som enbart återberättat händelsen, efter ett år ett högre antal korrekta minnesrapporterade utsagor jämfört med deltagarna i kontrollbetingelsen. Studie II utgick delvis från samma data som i Studie I. Här undersöktes effekten av ögonvittnens diskussioner med icke-vittnen på ögonvittnens minne och meta-minne realism för olika typer av information. De olika typer av information som analyserades var Forensiskt central, Forensiskt perifer och Icke-forensiskt relevant information. De två Forensiskt relevanta informationstyperna är sådan information som det är troligt att polisen kan vilja ha i början av en brottsutredning. Resultaten från de två experimenten i Studie II visade att deltagarna hade bättre minne och meta-minne realism för Forensiskt central och för Icke-forensiskt relevant information än för Forensiskt perifer information. Dessutom var deltagarna i de fyra betingelserna i Experiment I (samma fyra betingelser som i Studie I) lika kapabla att skilja mellan korrekt och inkorrekt objekt med hjälp av nivån på sina konfidensbedömningar för alla tre informationstyperna. Experiment 1 i Studie II visade också att deltagarna i de betingelser där deltagarna återberättade och diskuterade händelsen rapporterade ett högre antal korrekta Forensiskt centrala minnesutsagor jämfört med kontrollbetingelsen. Studie III gällde data från två av betingelserna i Studie I, närmare bestämt inspelade data från de fem återgivningsomgångarna i den betingelse där deltagarna enbart återberättat händelsen och inspelade data från den betingelse där deltagarna både återberättade och diskuterade händelsen i laboratoriet. Studien visade att deltagarna i den betingelse där deltagarna både återgav och diskuterade händelsen uppvisade mer reminiscens (fler minnesutsagor, både korrekta och inkorrekta över de fem sessionerna) och mer hypermnesi (tillskott av mer korrekta minnesutsagor över de fem sessionerna) än deltagarna i den betingelse där de bara återberättade händelsen fem gånger över tre veckor. Resultaten visade också att antalet gånger en minnesutsaga upprepades under sessionerna var förenat med en högre sannolikhet för att minnesutsagan skulle återges vid den slutliga återgivningen. Däremot hade det, intressant nog, ingen effekt om minnesutsagorna hade återberättats eller diskuterats i en tidigare eller senare session (av de 5 sessionerna) på om minnesutsagan skulle redovisas i den sjätte testsession eller inte. Slutligen visade resultatet i Studie III att de Forensiskt perifera minnesutsagorna, men inte de Forensiskt centrala utsagorna, uppvisade en så kallad reitereringseffekt vilken innebär att säkerhetskänslan (dvs upplevd konfidens att utsagan är korrekt) höjs som en effekt av att utsagan upprepas fler gånger. Detta kan bero på att den Forensiskt perifera informationen är mindre välintegrerad än den Forensiskt centrala informationen.
Gurney, D. J. "The misleading potential of communicative hand gestures in a forensic interview." Thesis, University of Hertfordshire, 2011. http://hdl.handle.net/2299/6003.
Full textCaiola, Marisa Anna Lucia. "Effects of alcohol intoxication and encoding conditions on eyewitness memory." FIU Digital Commons, 1993. http://digitalcommons.fiu.edu/etd/1969.
Full textVömel, Stefan [Verfasser], and Felix C. [Akademischer Betreuer] Freiling. "Forensic Acquisition and Analysis of Volatile Data in Memory / Stefan Vömel. Gutachter: Felix C. Freiling." Erlangen : Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2014. http://d-nb.info/1075475597/34.
Full textHedlund, Niklas. "IT-Forensisk undersökning av flyktigt minne : På Linux och Android enheter." Thesis, Högskolan Dalarna, Datateknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:du-13124.
Full textThe ability to be able to make a efficient investigation of volatile memory is something that getsmore and more important in IT forensic investigations. Partially for Linux and Windows based PCsystems but also for mobile devices in the form of the Android or devices based on other mobileoperative systems.Android uses a modified Linux kernel where the modifications exclusively are to adapt it to thedemands that exists in a operative system targeting mobile devices. These modifications containsmessage passing systems between processes as well as changes to the memory subsystems in theaspect of handling and monitoring.Since these two kernels are so closely related it is possible to use the same basic principles for dum-ping and analysing of the memory. The actual memory dumping is done by a kernel module whichin this report is done by the software called LiME which handles both kernels very well.Tools used to analyse the memory needs to understand the memory layout used on the systemin question, depending on the type of analyse method used it might also need information aboutthe different symbols involved. The tool used in this project is called Volatility which in theory iscapable of extracting all the information needed in order to make a correct investigation.The purpose was to expand on existing methods for analysing volatile memory on Linux-basedsystems, in the form of PC machines as well as embedded systems like Android. Difficulties arisedwhen the analysing of volatile memory for Android could not be completed according to existinggoals. The final result came to show that memory analysis targeting the PC platform is bothsimpler and more straight forward then what it is if Android is involved.
Woolnough, Penny S. "Victimisation and eyewitness memory : exploring the effects of physiological and psychological factors." Thesis, University of St Andrews, 2002. http://hdl.handle.net/10023/13121.
Full textOgeskär, Tobias. "Forensisk analys av volatilt minne från operativsystemet OS X." Thesis, Högskolan Dalarna, Datateknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:du-17319.
Full textThe need to analyze volatile memory on Macintosh computers with OS X has become increasingly important due to the fact that their computers have become more popular and volatile memory analysis has become a more important part of an IT-forensics work. The reason volatile memory analysis has become more important is that it's possible to find information that’s not stored permanently on the computer’s hard drive. The problem that formed the basis for this thesis was that it was obvious there was a lack of methods of investigation of the volatile memory for Macs running OS X.The aim of this work was therefore to investigate the possibility of extracting information from a volatile memory from a Mac computer with OS X by identifying and assessing different methods of investigation. To do this investigation, literature studies, informal interviews, own knowledge and practical attempts have been conducted.It was concluded that the ability to extract information from the volatile memory from a Mac-computer with OS X is relatively limited. The biggest problem is the dumping of the memory. Many of the available dumping methods require administrative rights. When analyzing a memory dump you should never rely on one analyze method since different analyze methods give different results that can be useful for further investigation of a Mac-computer.
Dilevski, Natali. "Adult Memory for Instances of Repeated Emotionally Stressful Events: Forensic Implications for Victims’ Testimony Regarding Repeated Abuse." Thesis, The University of Sydney, 2021. https://hdl.handle.net/2123/26859.
Full textLatzo, Tobias [Verfasser], Felix [Akademischer Betreuer] Freiling, and Felix [Gutachter] Freiling. "All your System Memory are belong to us: From Low-Level Memory Acquisition to High-Level Forensic Event Reconstruction / Tobias Latzo ; Gutachter: Felix Freiling ; Betreuer: Felix Freiling." Erlangen : Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2021. http://d-nb.info/1239419090/34.
Full textFrench, Tricia A. "The effect of a weapon's presence on witnesses' memory for auditory information." Virtual Press, 2001. http://liblink.bsu.edu/uhtbin/catkey/1221315.
Full textDepartment of Psychological Science
Varnaseri, Helena. "Specificity of autobiographical memory : a mediator in the relationship between interpersonal experience and functioning." Thesis, Canterbury Christ Church University, 2014. http://create.canterbury.ac.uk/12790/.
Full textMcIntyre, A. H. "Applying psychology to forensic facial identification : perception and identification of facial composite images and facial image comparison." Thesis, University of Stirling, 2012. http://hdl.handle.net/1893/9077.
Full textCameron, Lynsey. "An exploration of self-awareness of autobiographical memory deficits in forensic mental health service users with psychosis and its impact on service engagement." Thesis, University of Glasgow, 2015. http://theses.gla.ac.uk/6710/.
Full textGültekin, Raver. "Testifying through another tongue:Examining the effects of language barriers on accuracy and suggestibility in eyewitness testimonies." Thesis, Stockholms universitet, Psykologiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-160651.
Full textSjöberg, Rickard L. "Children's testimony /." Stockholm, 2002. http://diss.kib.ki.se/2002/91-7349-124-1/.
Full textRoth, Jessica A. Roth. "The Politics of Victimization and Search for the Disappeared in Post-Conflict Peru." Ohio University Honors Tutorial College / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ouhonors1524844642964494.
Full textScheuermann, Melina. "Animated Memories : A case study of the animated documentary 'Saydnaya – Inside a Syrian Torture Prison' (2016) and its potential within social memory." Thesis, Stockholms universitet, Filmvetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-185061.
Full textBrown, Sarah. "The course of cognition in mentally ill offenders and the implications for risk of violence : a 10-12-year follow-up study." Thesis, University of Edinburgh, 2017. http://hdl.handle.net/1842/22913.
Full textClack, Maureen. "Returning to the scene of the crime the Brothers Grimm and the yearning for home /." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20080807.150418/index.html.
Full textPina, Ríos Rocío. "Recordando un suceso de violencia de género. El caso del recuerdo de la información lingüística con contenido emocionalmente negativo en función del esquema, el contexto de presentación y las características de recuperación." Doctoral thesis, Universitat Autònoma de Barcelona, 2016. http://hdl.handle.net/10803/370113.
Full textIf there is little research about memories and the accuracy of conversations in hearing witnesses, there is even less analysis of linguistic information with emotionally negative in the forensic context. In the present study we examine this particular type of recall from the presentation, in a natural context, of statements that included verbal and psychological violence on a typical scene of gender-based violence. We manipulate the presentation format (audiovisual and aural) and the recovery format as well (with and without mental reinstatement of context), and we evaluate the possible predictor effect of stereotyped knowledge to the remembered event of gender-based violence through the Domestic Violenc eAcceptance Mith Scale (DVMAS). There were used different measures as analysis. On the one hand, we perform a recognition task in which both true and false actions were included, all of them typical for the violence presented, which content referred to visual or aural actions. On the other hand, we proceeded to an analysis of the free memory, evaluating the number of memory units, distortions and intrusions, referred to people, objects, environment, actions and conversations. Regarding the latter, the literal of general recall was measured. The results showed virtually no relationship between the measurement of the evaluated stereotyped knowledge and memories and false memories scores obtained. High scores on the DVMAS only predicted higher rates of recognition and omission in compliance with the stereotyped scheme of the sequence presented. The visual presentation of the defamation, as expected, just favored the memory of visual content information, but not the memory of linguistic information. Regarding the mental reinstatement of context, this was only effective in improving the memory of visual information in those who did not have perceptual information about it. Analysis of conversations confirmed the primacy of general recall over literal. Finally, with regard to false memories generated, it is noted the lack of association in creating study variables, except for an increase in production by those who received only aural information. These results are interpreted under the high importance and burden of interactive of verbal and emotionally negative information that is encoded, whose significance in the scene would have redirected the memory and masked the potential effects that analysis factors could have triggered. It is encouraged, therefore, to continue the research on how the memory of verbal and psychological violence occurs, what characterizes them, how they are remembered and transmitted, in order to understand the effect that his memory has in the forensic context in which we find ourselves.
Baghyari, Roza, and Carolina Nykvist. "Händelsekonstruktion genom säkrande och analys av data från ett hemautomationssystem." Thesis, Linköpings universitet, Datorteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-157619.
Full textThe purpose of this bachelor thesis was to extract timestamps from a home automation system with a control unit named Homey in a forensic perspective. The first step was to create a course of event regarding a burglar breaking into an apartment with home automation. The home automation system consisted of some peripheral units using different types of wireless network protocols. All these units were triggered during the break in. Thereafter different types of methods were tested in an attempt to extract the timestamps for each unit. These methods included rest-API, UART and chip-off on a flash memory. The method using JTAG were not tested due to lack of time. Rest-API was the method that provided most information about the units and time stamps. The flash memory also contained every timestamp, however it did not provide any information about which timestamp belonged to which unit. Even though the rest-API was the best method to extract data, it was also the method with most requirements such as credentials or a rooted smartphone. With the extracted timestamps it was possible to reconstruct the course of events of the break-in.
CHANG-YUNG-CHUN and 張詠竣. "Evidence Investigations against Anti-forensics in Memory Analysis." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/2668j7.
Full text(8083268), Rohit Bhatia. "On Cyber-Physical Forensics, Attacks, and Defenses." Thesis, 2019.
Find full text