首页 > 最新文献

2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering最新文献

英文 中文
Automating Disk Forensic Processing with SleuthKit, XML and Python 自动磁盘取证处理与SleuthKit, XML和Python
S. Garfinkel
We have developed a program called |fiwalk| which produces detailedXML describing all of the partitions and files on a hard drive or diskimage, as well as any extractable metadata from the document filesthemselves. We show how it is relatively simple to create automateddisk forensic applications using a Python module we have written thatreads |fiwalk|'s XML files. Finally, we present threeapplications using this system: a program to generate maps ofdisk images; an image redaction program; and a data transfer kioskwhich uses forensic tools to allow the migration of data from portablestorage devices without risk of infection from hostile software thatthe portable device may contain.
我们开发了一个名为fiwalk的程序,它生成详细的xml,描述硬盘驱动器或磁盘映像上的所有分区和文件,以及从文档文件本身提取的任何元数据。我们将展示如何使用我们编写的读取fiwalk XML文件的Python模块相对简单地创建自动磁盘取证应用程序。最后,我们介绍了使用该系统的三个应用程序:一个生成磁盘映像映射的程序;一个图像编辑程序;以及一种数据传输亭,该数据传输亭使用取证工具允许从便携式存储设备中迁移数据,而不会有被便携式设备可能包含的恶意软件感染的风险。
{"title":"Automating Disk Forensic Processing with SleuthKit, XML and Python","authors":"S. Garfinkel","doi":"10.1109/SADFE.2009.12","DOIUrl":"https://doi.org/10.1109/SADFE.2009.12","url":null,"abstract":"We have developed a program called |fiwalk| which produces detailedXML describing all of the partitions and files on a hard drive or diskimage, as well as any extractable metadata from the document filesthemselves. We show how it is relatively simple to create automateddisk forensic applications using a Python module we have written thatreads |fiwalk|'s XML files. Finally, we present threeapplications using this system: a program to generate maps ofdisk images; an image redaction program; and a data transfer kioskwhich uses forensic tools to allow the migration of data from portablestorage devices without risk of infection from hostile software thatthe portable device may contain.","PeriodicalId":101922,"journal":{"name":"2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132488570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 122
Analysing Access Control Specifications 访问控制规范分析
Christian W. Probst, René Rydhof Hansen
When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most common tool to answer this question, analysis of log files, faces the problem that the amount of logged data may be overwhelming. This problems gets even worse in the case of insider attacks, where the attacker's actions usually will be logged as permissible, standard actions---if they are logged at all. Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set of credentials needed to reach a certain location in a system. This knowledge allows to identify a set of (inside) actors who have the possibility to commit an insider attack at that location. This has immediate applications in analysing log files, but also non-technical applications such as identifying possible suspects, or, beyond cyber crimes, picking the "best" actor for a certain task. We also sketch an online analysis that identifies where an actor can be located based on observed actions.
在起诉犯罪时,要回答的主要问题往往是谁有犯罪动机和犯罪的可能性。在调查网络犯罪时,可能性的问题往往很难回答,因为在一个网络系统中,几乎任何位置都可以从几乎任何地方访问。回答这个问题的最常用工具是日志文件分析,它面临的问题是记录的数据量可能太大。在内部攻击的情况下,这个问题变得更糟,攻击者的行为通常会被记录为允许的标准行为——如果它们被记录的话。最近的事件揭示了攻击者对监视和控制系统的深入了解,这使得从记录数据中推断内部攻击者的身份通常是不可能的。在这项工作中,我们提出了一种分析访问控制配置的方法,以识别到达系统中某个位置所需的凭据集。这种知识允许识别一组(内部)参与者,他们有可能在该位置实施内部攻击。这在分析日志文件方面有直接的应用,但也有非技术应用,例如识别可能的嫌疑人,或者在网络犯罪之外,为特定任务选择“最佳”参与者。我们还概述了一个在线分析,该分析可以根据观察到的动作确定参与者的位置。
{"title":"Analysing Access Control Specifications","authors":"Christian W. Probst, René Rydhof Hansen","doi":"10.1109/SADFE.2009.13","DOIUrl":"https://doi.org/10.1109/SADFE.2009.13","url":null,"abstract":"When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most common tool to answer this question, analysis of log files, faces the problem that the amount of logged data may be overwhelming. This problems gets even worse in the case of insider attacks, where the attacker's actions usually will be logged as permissible, standard actions---if they are logged at all. Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set of credentials needed to reach a certain location in a system. This knowledge allows to identify a set of (inside) actors who have the possibility to commit an insider attack at that location. This has immediate applications in analysing log files, but also non-technical applications such as identifying possible suspects, or, beyond cyber crimes, picking the \"best\" actor for a certain task. We also sketch an online analysis that identifies where an actor can be located based on observed actions.","PeriodicalId":101922,"journal":{"name":"2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"2152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127467853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
File Fragment Classification-The Case for Specialized Approaches 文件片段分类——专门方法的案例
Vassil Roussev, S. Garfinkel
Increasingly advances in file carving, memory analysis and network forensics requires the ability to identify the underlying type of a file given only a file fragment. Work to date on this problem has relied on identification of specific byte sequences in file headers and footers, and the use of statistical analysis and machine learning algorithms taken from the middle of the file. We argue that these approaches are fundamentally flawed because they fail to consider the inherent internal structure in widely used file types such as PDF, DOC, and ZIP. We support our argument with a bottom-up examination of some popular formats and an analysis of TK PDF files. Based on our analysis, we argue that specialized methods targeted to each specific file type will be necessary to make progress in this area.
在文件雕刻、内存分析和网络取证方面的日益进步要求能够识别给定文件片段的文件的底层类型。迄今为止,解决这个问题的工作依赖于识别文件头和页脚中的特定字节序列,以及使用从文件中间提取的统计分析和机器学习算法。我们认为这些方法从根本上是有缺陷的,因为它们没有考虑到广泛使用的文件类型(如PDF、DOC和ZIP)中固有的内部结构。我们通过对一些流行格式的自下而上的检查和对TK PDF文件的分析来支持我们的论点。根据我们的分析,我们认为针对每种特定文件类型的专门方法对于在这一领域取得进展是必要的。
{"title":"File Fragment Classification-The Case for Specialized Approaches","authors":"Vassil Roussev, S. Garfinkel","doi":"10.1109/SADFE.2009.21","DOIUrl":"https://doi.org/10.1109/SADFE.2009.21","url":null,"abstract":"Increasingly advances in file carving, memory analysis and network forensics requires the ability to identify the underlying type of a file given only a file fragment. Work to date on this problem has relied on identification of specific byte sequences in file headers and footers, and the use of statistical analysis and machine learning algorithms taken from the middle of the file. We argue that these approaches are fundamentally flawed because they fail to consider the inherent internal structure in widely used file types such as PDF, DOC, and ZIP. We support our argument with a bottom-up examination of some popular formats and an analysis of TK PDF files. Based on our analysis, we argue that specialized methods targeted to each specific file type will be necessary to make progress in this area.","PeriodicalId":101922,"journal":{"name":"2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134548365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
Snapshot Filtering Based on Resource-Usage Profiles 基于资源使用配置文件的快照过滤
F. Adelstein, C. Marceau
Live forensic tools provide investigators with new sources of information. Unfortunately, the amount of data gathered by such tools can be overwhelming, with a low signal-to-noise ratio. The authors use an innovative method of monitoring the resource use of running processes to build a profile of the application’s normal resource use, which they then exploit to filter out extraneous, forensically uninteresting data from a list of open file handles and dynamically loaded libraries attached to a process. Preliminary results show a dramatic reduction in the number of file and registry handles and DLLs, greatly reducing the forensic haystack, allowing the investigator to more easily spot the needles.
现场取证工具为调查人员提供了新的信息来源。不幸的是,这些工具收集的数据量可能是压倒性的,信噪比很低。作者使用了一种创新的方法来监控运行进程的资源使用情况,以构建应用程序正常资源使用情况的概要,然后他们利用该概要从打开的文件句柄列表和附加到进程的动态加载库中过滤掉无关的、在法律上无趣的数据。初步结果显示,文件和注册表句柄以及dll的数量急剧减少,大大减少了法医的工作量,使调查人员更容易发现针头。
{"title":"Snapshot Filtering Based on Resource-Usage Profiles","authors":"F. Adelstein, C. Marceau","doi":"10.1109/SADFE.2009.15","DOIUrl":"https://doi.org/10.1109/SADFE.2009.15","url":null,"abstract":"Live forensic tools provide investigators with new sources of information. Unfortunately, the amount of data gathered by such tools can be overwhelming, with a low signal-to-noise ratio. The authors use an innovative method of monitoring the resource use of running processes to build a profile of the application’s normal resource use, which they then exploit to filter out extraneous, forensically uninteresting data from a list of open file handles and dynamically loaded libraries attached to a process. Preliminary results show a dramatic reduction in the number of file and registry handles and DLLs, greatly reducing the forensic haystack, allowing the investigator to more easily spot the needles.","PeriodicalId":101922,"journal":{"name":"2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133297558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Distributed Triage Model for Digital Forensic Services to State and Local Law Enforcement 为州和地方执法部门提供数字法医服务的分布式分类模型
M. Losavio, D. Keeling, Adel Said Elmaghraby
We propose a distributed triage model for digital forensic services to state local law enforcement. This would permit efficient use of forensic resources by using local law enforcement for basic digital forensic analysis and assigning more complex matters to intermediate and advanced examiners.
我们提出了一种分布式分类模型,用于州地方执法部门的数字法医服务。这将允许有效地利用法医资源,利用当地执法部门进行基本的数字法医分析,并将更复杂的事项分配给中级和高级审查员。
{"title":"A Distributed Triage Model for Digital Forensic Services to State and Local Law Enforcement","authors":"M. Losavio, D. Keeling, Adel Said Elmaghraby","doi":"10.1109/SADFE.2009.10","DOIUrl":"https://doi.org/10.1109/SADFE.2009.10","url":null,"abstract":"We propose a distributed triage model for digital forensic services to state local law enforcement. This would permit efficient use of forensic resources by using local law enforcement for basic digital forensic analysis and assigning more complex matters to intermediate and advanced examiners.","PeriodicalId":101922,"journal":{"name":"2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123040220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Two Models of Digital Forensic Examination 数字法医检验的两种模式
F. Cohen
This paper examines an existing cost model of digital forensic examination and describes a new model of examination. Alternative approaches to the previous techniques are identified including optimization approaches for determining examination order and alternative evaluation methods for optimization criteria.
本文对现有的数字法医检验成本模型进行了分析,并提出了一种新的检验模型。确定了先前技术的替代方法,包括用于确定检查顺序的优化方法和用于优化标准的替代评估方法。
{"title":"Two Models of Digital Forensic Examination","authors":"F. Cohen","doi":"10.1109/SADFE.2009.8","DOIUrl":"https://doi.org/10.1109/SADFE.2009.8","url":null,"abstract":"This paper examines an existing cost model of digital forensic examination and describes a new model of examination. Alternative approaches to the previous techniques are identified including optimization approaches for determining examination order and alternative evaluation methods for optimization criteria.","PeriodicalId":101922,"journal":{"name":"2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128215574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Digital Device & Forensics Concerns in Jails, Prisons and Supervisory Environments 监狱、监狱和监管环境中的数字设备和取证问题
Natalie Armstrong, M. Losavio, D. Keeling
We examine concerns relating to digital devices and forensics in jails, prison and supervisedrelease environments. Despite being one of the most controlled physical environments ingovernment, digital devices continue to breach institutional security and increase risks tocorrectional staff and the community.
我们研究了与数字设备和法医学在监狱、监狱和监管释放环境中的相关问题。尽管数字设备是政府中最受控制的物理环境之一,但它仍在继续破坏机构安全,并增加惩教人员和社区的风险。
{"title":"Digital Device & Forensics Concerns in Jails, Prisons and Supervisory Environments","authors":"Natalie Armstrong, M. Losavio, D. Keeling","doi":"10.1109/SADFE.2009.9","DOIUrl":"https://doi.org/10.1109/SADFE.2009.9","url":null,"abstract":"We examine concerns relating to digital devices and forensics in jails, prison and supervisedrelease environments. Despite being one of the most controlled physical environments ingovernment, digital devices continue to breach institutional security and increase risks tocorrectional staff and the community.","PeriodicalId":101922,"journal":{"name":"2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124646495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Formal Rule-Based Scheme for Digital Investigation in Wireless Ad-hoc Networks 一种基于规则的无线自组织网络数字调查方案
S. Rekhis, N. Boudriga
Existing investigation schemes are not suitable to cope with attacks in wireless networks, especially in MANet. We propose in this paper a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in wireless environment, and system and network evidences generated consequently. We develop an inference system that integrates the two types of evidences, handles incompleteness and duplication of information in them, and allows to generate potential and provable actions and attack scenarios. To exemplify the proposal, we consider a case study dealing with a Denial of Service attack on a web server, where the attacker and the target represent mobile nodes.
现有的调查方案不适合应对无线网络中的攻击,特别是在MANet中。本文提出了一种用于无线网络安全攻击数字调查的形式化方法。我们提供了一个描述无线环境下攻击场景的模型,以及由此产生的系统和网络证据。我们开发了一个推理系统,集成了两种类型的证据,处理其中的不完整性和重复信息,并允许生成潜在的和可证明的行动和攻击场景。为了举例说明该建议,我们考虑了一个案例研究,处理web服务器上的拒绝服务攻击,其中攻击者和目标代表移动节点。
{"title":"A Formal Rule-Based Scheme for Digital Investigation in Wireless Ad-hoc Networks","authors":"S. Rekhis, N. Boudriga","doi":"10.1109/SADFE.2009.16","DOIUrl":"https://doi.org/10.1109/SADFE.2009.16","url":null,"abstract":"Existing investigation schemes are not suitable to cope with attacks in wireless networks, especially in MANet. We propose in this paper a formal approach for digital investigation of security attacks in wireless networks. We provide a model for describing attack scenarios in wireless environment, and system and network evidences generated consequently. We develop an inference system that integrates the two types of evidences, handles incompleteness and duplication of information in them, and allows to generate potential and provable actions and attack scenarios. To exemplify the proposal, we consider a case study dealing with a Denial of Service attack on a web server, where the attacker and the target represent mobile nodes.","PeriodicalId":101922,"journal":{"name":"2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127908667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Panel: Technical, Social and Legal Frameworks for Digital Forensics and CyberInfrastructure Security
Jean West, U. Lindqvist, P. Vasquez, M. Losavio, S. Peisert
A systematic approach to digital forensic engineering acknowledges the close, intertwine relationship between digital forensics and information security. Just as their technical structures are interrelated, so, too, are issues relating to legal and social frameworks within which they are used. We examine this critical relationship as to critical cyber infrastructure and the threats to it from domestic and transnational criminals and state actors.
数字取证工程的系统方法承认数字取证与信息安全之间密切交织的关系。正如它们的技术结构是相互关联的一样,与使用它们的法律和社会框架有关的问题也是相互关联的。我们研究了关键网络基础设施的关键关系,以及国内和跨国犯罪分子和国家行为者对其的威胁。
{"title":"Panel: Technical, Social and Legal Frameworks for Digital Forensics and CyberInfrastructure Security","authors":"Jean West, U. Lindqvist, P. Vasquez, M. Losavio, S. Peisert","doi":"10.1109/SADFE.2009.11","DOIUrl":"https://doi.org/10.1109/SADFE.2009.11","url":null,"abstract":"A systematic approach to digital forensic engineering acknowledges the close, intertwine relationship between digital forensics and information security. Just as their technical structures are interrelated, so, too, are issues relating to legal and social frameworks within which they are used. We examine this critical relationship as to critical cyber infrastructure and the threats to it from domestic and transnational criminals and state actors.","PeriodicalId":101922,"journal":{"name":"2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128582713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
High Assurance Digital Forensics: A Panelist's Perspective 高保证数字取证:一个小组成员的观点
S. Greenwald
In these times of trendy LPU1 papers, you may consider this as two papers in one. If you like controversial positions and observations, then I suggest you focus on the second part of this paper (sections V and VI). If you like history, institutional knowledge, definitions, and the wisdom of senior scientist-practitioners, then I suggest you focus on the first part of this paper (sections II through IV). I wrote both as parts of an integrated whole in the hope that you will like that as well.In the first part of this paper (sections II through IV), I attempt to give an adequate working definition of the term “high assurance” for use in the context of “high assurance digital forensics,” with assistance by many luminaries in the field.In the second part of this paper (sections V and VI), I give my observations and reactions to my panelist experience for the “High Assurance Digital Forensics” panel for the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering2 (SADFE). I also examine my overall workshop experiences. In particular, I examine how the computer science paradigm does not compose very well with the legal paradigm and the truly massive problems and dangers that this causes. I sum up with a list of questions that we must answer if we truly wish high assurance digital forensics used properly.
在这些流行LPU1论文的时代,您可以将其视为两篇论文合二为一。如果你喜欢有争议的立场和观察,那么我建议你关注本文的第二部分(第五节和第六节)。如果你喜欢历史、制度知识、定义和资深科学家实践者的智慧,那么我建议你关注本文的第一部分(第二节到第四节)。我把这两个部分作为一个综合整体的一部分来写,希望你也会喜欢。在本文的第一部分(第二节至第四节)中,我试图给出术语“高保证”的适当工作定义,以便在“高保证数字取证”的背景下使用,并得到该领域许多杰出人士的帮助。在本文的第二部分(第五节和第六节)中,我给出了我在第四届IEEE数字取证工程系统方法国际研讨会2 (SADFE)的“高保证数字取证”小组的小组成员经验的观察和反应。我还检查了我的整个研讨会经历。特别是,我研究了计算机科学范式如何不能很好地与法律范式结合,以及由此导致的真正大规模的问题和危险。我总结了一系列问题,如果我们真的希望高保证数字取证得到正确使用,我们必须回答这些问题。
{"title":"High Assurance Digital Forensics: A Panelist's Perspective","authors":"S. Greenwald","doi":"10.1109/SADFE.2009.17","DOIUrl":"https://doi.org/10.1109/SADFE.2009.17","url":null,"abstract":"In these times of trendy LPU1 papers, you may consider this as two papers in one. If you like controversial positions and observations, then I suggest you focus on the second part of this paper (sections V and VI). If you like history, institutional knowledge, definitions, and the wisdom of senior scientist-practitioners, then I suggest you focus on the first part of this paper (sections II through IV). I wrote both as parts of an integrated whole in the hope that you will like that as well.In the first part of this paper (sections II through IV), I attempt to give an adequate working definition of the term “high assurance” for use in the context of “high assurance digital forensics,” with assistance by many luminaries in the field.In the second part of this paper (sections V and VI), I give my observations and reactions to my panelist experience for the “High Assurance Digital Forensics” panel for the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering2 (SADFE). I also examine my overall workshop experiences. In particular, I examine how the computer science paradigm does not compose very well with the legal paradigm and the truly massive problems and dangers that this causes. I sum up with a list of questions that we must answer if we truly wish high assurance digital forensics used properly.","PeriodicalId":101922,"journal":{"name":"2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121890796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1