首页 > 最新文献

Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics最新文献

英文 中文
Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics 第一届ACM SIGSOFT软件工程与数字取证国际研讨会论文集
Dalal Alrajeh, L. Pasquale
{"title":"Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics","authors":"Dalal Alrajeh, L. Pasquale","doi":"10.1145/3121252","DOIUrl":"https://doi.org/10.1145/3121252","url":null,"abstract":"","PeriodicalId":252458,"journal":{"name":"Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127856030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sustainable automated data recovery: a research roadmap 可持续自动数据恢复:研究路线图
J. V. D. Bos
Digital devices contain increasingly more data and applications. This means more data to handle and a larger amount of different types of traces to recover and consider in digital forensic investigations. Both present a challenge to data recovery approaches, requiring higher performance and increased flexibility. In order to progress to a long-term sustainable approach to automated data recovery, this paper proposes a partitioning into manual, custom, formalized and self-improving approaches. These approaches are described along with research directions to consider: building universal abstractions, selecting appropriate techniques and developing user-friendly tools.
数字设备包含越来越多的数据和应用程序。这意味着在数字法医调查中需要处理更多的数据,需要恢复和考虑更多不同类型的痕迹。两者都对数据恢复方法提出了挑战,要求更高的性能和更大的灵活性。为了向长期可持续的自动化数据恢复方法迈进,本文提出了手动、自定义、形式化和自我改进方法的划分。描述了这些方法以及需要考虑的研究方向:构建通用抽象,选择适当的技术和开发用户友好的工具。
{"title":"Sustainable automated data recovery: a research roadmap","authors":"J. V. D. Bos","doi":"10.1145/3121252.3121254","DOIUrl":"https://doi.org/10.1145/3121252.3121254","url":null,"abstract":"Digital devices contain increasingly more data and applications. This means more data to handle and a larger amount of different types of traces to recover and consider in digital forensic investigations. Both present a challenge to data recovery approaches, requiring higher performance and increased flexibility. In order to progress to a long-term sustainable approach to automated data recovery, this paper proposes a partitioning into manual, custom, formalized and self-improving approaches. These approaches are described along with research directions to consider: building universal abstractions, selecting appropriate techniques and developing user-friendly tools.","PeriodicalId":252458,"journal":{"name":"Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122162317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building forensics in: supporting the investigation of digital criminal activities (invited talk) 建立法医学:支持数码犯罪活动的调查(特邀演讲)
L. Williams
Logging mechanisms that capture detailed traces of user activity, including creating, reading, updating, and deleting (CRUD) data, facilitate meaningful forensic analysis following a security or privacy breach. However, software requirements often inadequately and inconsistently state 'what' user actions should be logged, thus hindering meaningful forensic analysis. In this talk, we will explore a variety of techniques for building a software system that supports forensic analysis. We will discuss systematic heuristics-driven and patterns-driven processes for identifying log events that must be logged based on user actions and potential accidental and malicious use, as described in natural language software artifacts. We then discuss systematic process for creating a black-box test suite for verifying the identified log events are logged. Using the results of executing the black-box test suite, we propose and evaluate a security metric for measuring the forensic-ability of user activity logs.
记录机制捕获用户活动的详细跟踪,包括创建、读取、更新和删除(CRUD)数据,有助于在安全或隐私泄露之后进行有意义的取证分析。然而,软件需求经常不充分和不一致地说明“什么”用户操作应该被记录,从而阻碍了有意义的取证分析。在这次演讲中,我们将探讨构建支持法医分析的软件系统的各种技术。我们将讨论系统的启发式驱动和模式驱动的过程,用于识别必须根据用户操作和潜在的意外和恶意使用记录的日志事件,如自然语言软件工件中所述。然后我们讨论创建黑盒测试套件的系统过程,以验证已识别的日志事件被记录下来。使用执行黑盒测试套件的结果,我们提出并评估了用于度量用户活动日志取证能力的安全度量。
{"title":"Building forensics in: supporting the investigation of digital criminal activities (invited talk)","authors":"L. Williams","doi":"10.1145/3121252.3127582","DOIUrl":"https://doi.org/10.1145/3121252.3127582","url":null,"abstract":"Logging mechanisms that capture detailed traces of user activity, including creating, reading, updating, and deleting (CRUD) data, facilitate meaningful forensic analysis following a security or privacy breach. However, software requirements often inadequately and inconsistently state 'what' user actions should be logged, thus hindering meaningful forensic analysis. In this talk, we will explore a variety of techniques for building a software system that supports forensic analysis. We will discuss systematic heuristics-driven and patterns-driven processes for identifying log events that must be logged based on user actions and potential accidental and malicious use, as described in natural language software artifacts. We then discuss systematic process for creating a black-box test suite for verifying the identified log events are logged. Using the results of executing the black-box test suite, we propose and evaluate a security metric for measuring the forensic-ability of user activity logs.","PeriodicalId":252458,"journal":{"name":"Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124641426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use of organisational topologies for forensic investigations 使用组织拓扑进行法医调查
George Grispos, Sorren Hanvey, B. Nuseibeh
In today's highly regulated business environment, it is becoming increasingly important that organisations implement forensic-ready systems and architectures to aid the investigation of security incidents and data breaches. Previously, different solutions have been proposed for implementing forensic readiness within organisations. One of these solutions is that organisations implement an organisational structure that takes into consideration digital forensics by establishing roles and responsibilities to assist with investigations. However, no previous research has defined how this can actually be accomplished within an organisation. In this paper, we put forth the idea of using the topology of an organisation's structure to define the roles and responsibilities to assist with handling a forensic investigation. In the past, the role of topology has been examined from various perspectives, including software engineering. We draw on this previous research and use the topological properties of containment, proximity and reachability in order to define a representation of the organisational structure that takes into consideration digital forensics. For example, topology can be used to express and provide a context regarding the location of assets that need to be investigated, as well as the individuals, whose assistance is required to investigate such assets. Furthermore, knowing the topology of an organisation's structure can also assist investigators identify stakeholders that could be of interest to an investigation, based on their relationship to the asset(s) under investigation.
在当今高度监管的商业环境中,组织实施取证就绪系统和架构以帮助调查安全事件和数据泄露变得越来越重要。以前,已经提出了不同的解决方案来实现组织内部的取证准备。其中一种解决方案是组织实施一种组织结构,通过建立角色和职责来协助调查,从而考虑到数字取证。然而,之前没有研究定义过如何在组织内实现这一目标。在本文中,我们提出了使用组织结构的拓扑来定义角色和责任的想法,以协助处理法医调查。在过去,拓扑的作用已经从不同的角度进行了研究,包括软件工程。我们借鉴之前的研究,并使用包含、接近和可达性的拓扑属性来定义考虑到数字取证的组织结构的表示。例如,拓扑可以用来表达和提供关于需要调查的资产的位置的上下文,以及需要帮助调查这些资产的个人的上下文。此外,了解组织结构的拓扑结构还可以帮助调查人员根据他们与被调查资产的关系确定可能对调查感兴趣的利益相关者。
{"title":"Use of organisational topologies for forensic investigations","authors":"George Grispos, Sorren Hanvey, B. Nuseibeh","doi":"10.1145/3121252.3121253","DOIUrl":"https://doi.org/10.1145/3121252.3121253","url":null,"abstract":"In today's highly regulated business environment, it is becoming increasingly important that organisations implement forensic-ready systems and architectures to aid the investigation of security incidents and data breaches. Previously, different solutions have been proposed for implementing forensic readiness within organisations. One of these solutions is that organisations implement an organisational structure that takes into consideration digital forensics by establishing roles and responsibilities to assist with investigations. However, no previous research has defined how this can actually be accomplished within an organisation. In this paper, we put forth the idea of using the topology of an organisation's structure to define the roles and responsibilities to assist with handling a forensic investigation. In the past, the role of topology has been examined from various perspectives, including software engineering. We draw on this previous research and use the topological properties of containment, proximity and reachability in order to define a representation of the organisational structure that takes into consideration digital forensics. For example, topology can be used to express and provide a context regarding the location of assets that need to be investigated, as well as the individuals, whose assistance is required to investigate such assets. Furthermore, knowing the topology of an organisation's structure can also assist investigators identify stakeholders that could be of interest to an investigation, based on their relationship to the asset(s) under investigation.","PeriodicalId":252458,"journal":{"name":"Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129903078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Snap forensics: a tradeoff between ephemeral intelligence and persistent evidence collection 快速取证:短暂的情报和持久的证据收集之间的权衡
Y. Yu, T. Tun
Digital evidence needs to be made persistent so that it can be used later. For citizen forensics, sometimes intelligence cannot or should not be made persistent forever. In this position paper, we propose a form of snap forensics by defining an elastic duration of evidence/intelligence validity. Explicitly declaring such a duration could unify the treatment of both ephemeral intelligence and persistent evidence towards more flexible storage to satisfy privacy requirements.
数字证据需要持久保存,以便以后使用。对于公民取证来说,有时情报不能或不应该永远持续下去。在本文中,我们通过定义证据/情报有效性的弹性持续时间,提出了一种快速取证的形式。明确声明这样的持续时间可以统一对短暂情报和持久证据的处理,使其更灵活地存储以满足隐私要求。
{"title":"Snap forensics: a tradeoff between ephemeral intelligence and persistent evidence collection","authors":"Y. Yu, T. Tun","doi":"10.1145/3121252.3121255","DOIUrl":"https://doi.org/10.1145/3121252.3121255","url":null,"abstract":"Digital evidence needs to be made persistent so that it can be used later. For citizen forensics, sometimes intelligence cannot or should not be made persistent forever. In this position paper, we propose a form of snap forensics by defining an elastic duration of evidence/intelligence validity. Explicitly declaring such a duration could unify the treatment of both ephemeral intelligence and persistent evidence towards more flexible storage to satisfy privacy requirements.","PeriodicalId":252458,"journal":{"name":"Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128074655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1