首页 > 最新文献

2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering最新文献

英文 中文
A Novel Skin Tone Detection Algorithm for Contraband Image Analysis 一种新的用于违禁品图像分析的肤色检测算法
A. Choudhury, M. Rogers, W. Gillam, Keith Watson
This paper examines skin tone detection algorithms used by first responder forensic tools such as File Hound. File Hound is a "field analysis" software application that is currently being used by over 100 law enforcement agencies, both internationally and domestically. It is mainly used in forensic investigations to search and identify pornographic images from a hard drive. Since the conception of File Hound, several steps have been taken to improve its performance and expand its features. One such feature is a skin tone detection filter that can identify images with a large skin color count from the aggregate image results found by File Hound. This filter is based on the idea that there is a positive correlation between images with a large skin color count and images that are pornographic in nature. A novel skin tone detection filter was developed and this filter was tested against random images obtained from the Compaq Image database for skin tone detection. The results of the test are encouraging in terms of accuracy and low error rates: type I = 20.64%, type II = 0.81%, accuracy = 78.55%.
本文研究了第一响应者法医工具(如File Hound)使用的肤色检测算法。File Hound是一款“现场分析”软件应用程序,目前被100多个国际和国内执法机构使用。它主要用于法医调查,从硬盘中搜索和识别色情图像。自从文件猎犬的概念,已经采取了几个步骤,以提高其性能和扩展其功能。其中一个特征是肤色检测过滤器,它可以从File Hound找到的汇总图像结果中识别出具有较大肤色计数的图像。这个滤镜是基于这样的想法,即具有较大肤色的图像与本质上是色情的图像之间存在正相关关系。提出了一种新的肤色检测滤波器,并对从康柏图像数据库中获取的随机图像进行了肤色检测。测试结果在准确性和低错误率方面令人鼓舞:I型= 20.64%,II型= 0.81%,准确率= 78.55%。
{"title":"A Novel Skin Tone Detection Algorithm for Contraband Image Analysis","authors":"A. Choudhury, M. Rogers, W. Gillam, Keith Watson","doi":"10.1109/SADFE.2008.12","DOIUrl":"https://doi.org/10.1109/SADFE.2008.12","url":null,"abstract":"This paper examines skin tone detection algorithms used by first responder forensic tools such as File Hound. File Hound is a \"field analysis\" software application that is currently being used by over 100 law enforcement agencies, both internationally and domestically. It is mainly used in forensic investigations to search and identify pornographic images from a hard drive. Since the conception of File Hound, several steps have been taken to improve its performance and expand its features. One such feature is a skin tone detection filter that can identify images with a large skin color count from the aggregate image results found by File Hound. This filter is based on the idea that there is a positive correlation between images with a large skin color count and images that are pornographic in nature. A novel skin tone detection filter was developed and this filter was tested against random images obtained from the Compaq Image database for skin tone detection. The results of the test are encouraging in terms of accuracy and low error rates: type I = 20.64%, type II = 0.81%, accuracy = 78.55%.","PeriodicalId":391486,"journal":{"name":"2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131324435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Cognitive-Maps Based Investigation of Digital Security Incidents 基于认知地图的数字安全事件调查
S. Rekhis, J. Krichène, N. Boudriga
Investigation of security incidents is of great importance as it allows to trace back the actions taken by the intruders. In this paper we develop a formal technique for digital investigation based on the use of Incident Response Probabilistic Cognitive Maps. Three main issues are addressed here: (1) construction and extraction of plausible known attack scenarios, (2) construction of hypothetical scenarios and their validation using a logic-based formalism, and (3) selection of optimal counter-measures addressing the detected attacks.
安全事件的调查非常重要,因为它允许追溯入侵者所采取的行动。在本文中,我们开发了一种基于使用事件响应概率认知地图的数字调查的正式技术。这里主要解决三个问题:(1)构建和提取可信的已知攻击场景,(2)构建假设场景并使用基于逻辑的形式主义进行验证,以及(3)选择针对检测到的攻击的最佳对策。
{"title":"Cognitive-Maps Based Investigation of Digital Security Incidents","authors":"S. Rekhis, J. Krichène, N. Boudriga","doi":"10.1109/SADFE.2008.20","DOIUrl":"https://doi.org/10.1109/SADFE.2008.20","url":null,"abstract":"Investigation of security incidents is of great importance as it allows to trace back the actions taken by the intruders. In this paper we develop a formal technique for digital investigation based on the use of Incident Response Probabilistic Cognitive Maps. Three main issues are addressed here: (1) construction and extraction of plausible known attack scenarios, (2) construction of hypothetical scenarios and their validation using a logic-based formalism, and (3) selection of optimal counter-measures addressing the detected attacks.","PeriodicalId":391486,"journal":{"name":"2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123145747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Multidimensional Correlation of Software Source Code 软件源代码的多维关联
R. Zeidman
Standard ways of calculating the similarity of different computer programs are needed in computer science. Such measurements can be useful in many different areas such as clone detection, refactoring, compiler optimization, and run-time optimization. Such standards are particularly important for uncovering plagiarism, trade secret theft, copyright infringement, and patent infringement. Other uses include locating open source code within a proprietary program and determining the authors of different programs. In a previous paper (R. Zeidman, 2006) I introduced the concept of source code correlation, presented a theoretical basis for such a measure, and described a program, CodeMatchreg, that compares software source code and calculates correlation. That paper compared the described method of source code correlation against existing methods of comparing source code and found it to be significantly superior. This paper refines that definition of source code correlation and presents a new, more robust, definition of multidimensional source code correlation.
计算机科学需要计算不同计算机程序相似度的标准方法。这种度量在许多不同的领域都很有用,比如克隆检测、重构、编译器优化和运行时优化。这些标准对于发现剽窃、商业秘密盗窃、版权侵权和专利侵权尤其重要。其他用途包括在专有程序中定位开源代码和确定不同程序的作者。在之前的一篇论文(R. Zeidman, 2006)中,我介绍了源代码相关性的概念,提出了这种度量的理论基础,并描述了一个比较软件源代码和计算相关性的程序CodeMatchreg。本文将所描述的源代码关联方法与现有的源代码比较方法进行了比较,发现其具有明显的优越性。本文对源代码相关的定义进行了改进,提出了一个新的、更健壮的多维源代码相关的定义。
{"title":"Multidimensional Correlation of Software Source Code","authors":"R. Zeidman","doi":"10.1109/SADFE.2008.9","DOIUrl":"https://doi.org/10.1109/SADFE.2008.9","url":null,"abstract":"Standard ways of calculating the similarity of different computer programs are needed in computer science. Such measurements can be useful in many different areas such as clone detection, refactoring, compiler optimization, and run-time optimization. Such standards are particularly important for uncovering plagiarism, trade secret theft, copyright infringement, and patent infringement. Other uses include locating open source code within a proprietary program and determining the authors of different programs. In a previous paper (R. Zeidman, 2006) I introduced the concept of source code correlation, presented a theoretical basis for such a measure, and described a program, CodeMatchreg, that compares software source code and calculates correlation. That paper compared the described method of source code correlation against existing methods of comparing source code and found it to be significantly superior. This paper refines that definition of source code correlation and presents a new, more robust, definition of multidimensional source code correlation.","PeriodicalId":391486,"journal":{"name":"2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133110071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Network Forensics: Network Data and State Seizures in the United States 网络取证:美国的网络数据和国家缉获
M. Losavio, D. Keeling, Adel Said Elmaghraby, George E. Higgins, J. Shutt
Network systems capture data about electronic activity in new, sometimes unprecedented forms. These new forms offer new, powerful tactical tools for investigations of electronic malfeasance under traditional leg al regulation of state power, particular that of Fourth Amendment limitations on police searches and seizures under the U.S. Constitution. But mis- appreciation of identity and authenticity issues with electronic data, particularly IP addresses and account numbers, raise issues of public policy, privacy and proper oversight network forensic investigations. The digital age uses digital facts, particularly alphanumerical identifiers used for addressing, hashing and authentication and identification in online transactions. These artifacts become the evidence supporting a state search or seizure Given the technical issues with evidence preservation and examination in electronic storage media, search warrants relating to computers may direct the seizure of computers and removal off-site for examination in a computer forensics facility. This can disrupt or even destroy records, objects and systems on those computers. This reliance on simple digital identification with minimal authentication further corrodes privacy and liberty rights in new ways. Technical security cannot protect privacy and security with such attitudes towards data. Security policy must extend into all domains of society. The challenge will be to establish a balance where courts set a stricter boundary for state searches and seizures based on electronic evidence of questionable reliability. As the United States v. Gourde court observed "We are acutely aware that the digital universe poses particular challenges with respect to the Fourth Amendment." That awareness still needs greater knowledge of the facts of identity and authenticity of electronic data as evidence, its mutability and evanescence, if the rights, liberties, and privacy of Americans are to be protected.
网络系统以新的、有时是前所未有的形式捕捉有关电子活动的数据。这些新表格提供了新的、强大的战术工具,用于在传统的国家权力法律监管下调查电子渎职行为,特别是根据美国宪法第四修正案对警察搜查和扣押的限制。但是,对电子数据(特别是IP地址和账号)的身份和真实性问题的错误认识,引发了公共政策、隐私和适当监督网络取证调查的问题。数字时代使用数字事实,特别是用于在线交易中的寻址、散列、身份验证和识别的字母数字标识符。鉴于电子存储介质中证据保存和检查的技术问题,与计算机有关的搜查令可能指示扣押计算机并将其移出现场,以便在计算机取证设施中进行检查。这可能会破坏甚至破坏这些计算机上的记录、对象和系统。这种对简单的数字身份验证的依赖以最小的身份验证进一步以新的方式侵蚀了隐私权和自由权。以这种对待数据的态度,技术安全无法保护隐私和安全。安全政策必须扩展到社会的各个领域。挑战将是建立一种平衡,法院为基于可靠性可疑的电子证据的国家搜查和扣押设定更严格的界限。正如“美国诉古尔德案”(United States v. Gourde)法院所观察到的那样,“我们敏锐地意识到,数字宇宙对第四修正案构成了特殊的挑战。”如果要保护美国人的权利、自由和隐私,这种意识仍然需要更多地了解作为证据的电子数据的身份和真实性、其可变性和易逝性等事实。
{"title":"Network Forensics: Network Data and State Seizures in the United States","authors":"M. Losavio, D. Keeling, Adel Said Elmaghraby, George E. Higgins, J. Shutt","doi":"10.1109/SADFE.2008.15","DOIUrl":"https://doi.org/10.1109/SADFE.2008.15","url":null,"abstract":"Network systems capture data about electronic activity in new, sometimes unprecedented forms. These new forms offer new, powerful tactical tools for investigations of electronic malfeasance under traditional leg al regulation of state power, particular that of Fourth Amendment limitations on police searches and seizures under the U.S. Constitution. But mis- appreciation of identity and authenticity issues with electronic data, particularly IP addresses and account numbers, raise issues of public policy, privacy and proper oversight network forensic investigations. The digital age uses digital facts, particularly alphanumerical identifiers used for addressing, hashing and authentication and identification in online transactions. These artifacts become the evidence supporting a state search or seizure Given the technical issues with evidence preservation and examination in electronic storage media, search warrants relating to computers may direct the seizure of computers and removal off-site for examination in a computer forensics facility. This can disrupt or even destroy records, objects and systems on those computers. This reliance on simple digital identification with minimal authentication further corrodes privacy and liberty rights in new ways. Technical security cannot protect privacy and security with such attitudes towards data. Security policy must extend into all domains of society. The challenge will be to establish a balance where courts set a stricter boundary for state searches and seizures based on electronic evidence of questionable reliability. As the United States v. Gourde court observed \"We are acutely aware that the digital universe poses particular challenges with respect to the Fourth Amendment.\" That awareness still needs greater knowledge of the facts of identity and authenticity of electronic data as evidence, its mutability and evanescence, if the rights, liberties, and privacy of Americans are to be protected.","PeriodicalId":391486,"journal":{"name":"2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"363 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133937390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computer Forensics in Forensis 取证中的计算机取证
S. Peisert, M. Bishop, K. Marzullo
Different users apply computer forensic systems, models, and terminology in very different ways. They often make incompatible assumptions and reach different conclusions about the validity and accuracy of the methods they use to log, audit, and present forensic data. This is problematic, because these fields are related, and results from one can be meaningful to the others. We present several forensic systems and discuss situations in which they produce valid and accurate conclusions and also situations in which their accuracy is suspect. We also present forensic models and discuss areas in which they are useful and areas in which they could be augmented. Finally, we present some recommendations about how computer scientists, forensic practitioners, lawyers, and judges could build more complete models of forensics that take into account appropriate legal details and lead to scientifically valid forensic analysis.
不同的用户以非常不同的方式应用计算机取证系统、模型和术语。他们经常对用于记录、审计和呈现取证数据的方法的有效性和准确性做出不相容的假设,并得出不同的结论。这是有问题的,因为这些领域是相关的,一个领域的结果可能对其他领域有意义。我们提出了几种法医系统,并讨论了它们产生有效和准确结论的情况,以及它们的准确性值得怀疑的情况。我们还介绍了法医模型,并讨论了它们有用的领域和可以增强的领域。最后,我们就计算机科学家、法医从业者、律师和法官如何建立更完整的法医模型提出了一些建议,这些模型考虑到适当的法律细节,并导致科学有效的法医分析。
{"title":"Computer Forensics in Forensis","authors":"S. Peisert, M. Bishop, K. Marzullo","doi":"10.1145/1368506.1368521","DOIUrl":"https://doi.org/10.1145/1368506.1368521","url":null,"abstract":"Different users apply computer forensic systems, models, and terminology in very different ways. They often make incompatible assumptions and reach different conclusions about the validity and accuracy of the methods they use to log, audit, and present forensic data. This is problematic, because these fields are related, and results from one can be meaningful to the others. We present several forensic systems and discuss situations in which they produce valid and accurate conclusions and also situations in which their accuracy is suspect. We also present forensic models and discuss areas in which they are useful and areas in which they could be augmented. Finally, we present some recommendations about how computer scientists, forensic practitioners, lawyers, and judges could build more complete models of forensics that take into account appropriate legal details and lead to scientifically valid forensic analysis.","PeriodicalId":391486,"journal":{"name":"2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122459317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
期刊
2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1