首页 > 最新文献

Journal of Digital Forensics Security and Law最新文献

英文 中文
Fault Lines In The Application Of International Humanitarian Law To Cyberwarfare 国际人道法在网络战中的应用断层
IF 0.3 Pub Date : 2022-01-01 DOI: 10.15394/jdfsl.2022.1761
Humna Sohail
{"title":"Fault Lines In The Application Of International Humanitarian Law To Cyberwarfare","authors":"Humna Sohail","doi":"10.15394/jdfsl.2022.1761","DOIUrl":"https://doi.org/10.15394/jdfsl.2022.1761","url":null,"abstract":"","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"67058680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social Media User Relationship Framework (SMURF) 社交媒体用户关系框架(SMURF)
IF 0.3 Pub Date : 2021-02-16 DOI: 10.15394/JDFSL.2021.1698
A. David, Sarah Morris, G. Appleby-Thomas
The use of social media has spread through many aspects of society, allowing millions of individuals, corporate as well as government entities to leverage the opportunities it affords. These opportunities often end up being exploited by a small percentage of the user community who use it for objectionable or unlawful activities; for example, trolling, cyber bullying, grooming, luring. In some cases, these unlawful activities result in investigations where the swift retrieval of critical evidence is required in order to save a life. This paper presents a proof of concept (PoC) framework for social media user attribution. The framework aims to provide digital evidence that can be used to substantiate user activity in live triage investigations. This paper highlights the use of live triage as a viable technique for the investigation of social media activity, contextualizing user activity and attributing actions to users. It discusses the reliability of artefacts other than the communication content as a means of drawing inferences about user social media activity, taking into account.
社交媒体的使用已经蔓延到社会的许多方面,使数以百万计的个人、企业和政府实体能够利用它提供的机会。这些机会往往最终被一小部分用户社区利用,用于令人反感或非法的活动;比如,网络挑衅,网络欺凌,打扮,引诱。在某些情况下,这些非法活动导致调查,需要迅速检索关键证据以挽救生命。本文提出了一个用于社交媒体用户归因的概念验证框架。该框架旨在提供数字证据,可用于证实现场分诊调查中的用户活动。本文强调了使用现场分类作为一种可行的技术来调查社交媒体活动,将用户活动语境化并将行为归因于用户。它讨论了除了通信内容之外的人工制品的可靠性,作为对用户社交媒体活动进行推断的一种手段。
{"title":"Social Media User Relationship Framework (SMURF)","authors":"A. David, Sarah Morris, G. Appleby-Thomas","doi":"10.15394/JDFSL.2021.1698","DOIUrl":"https://doi.org/10.15394/JDFSL.2021.1698","url":null,"abstract":"The use of social media has spread through many aspects of society, allowing millions of individuals, corporate as well as government entities to leverage the opportunities it affords. These opportunities often end up being exploited by a small percentage of the user community who use it for objectionable or unlawful activities; for example, trolling, cyber bullying, grooming, luring. In some cases, these unlawful activities result in investigations where the swift retrieval of critical evidence is required in order to save a life. This paper presents a proof of concept (PoC) framework for social media user attribution. The framework aims to provide digital evidence that can be used to substantiate user activity in live triage investigations. This paper highlights the use of live triage as a viable technique for the investigation of social media activity, contextualizing user activity and attributing actions to users. It discusses the reliability of artefacts other than the communication content as a means of drawing inferences about user social media activity, taking into account.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77440049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of LSB image Steganography using Cover Image Comparisons 基于封面图像比对的LSB图像隐写识别
IF 0.3 Pub Date : 2021-01-01 DOI: 10.15394/JDFSL.2021.1551
M. Pelosi, N. Poudel, Pratap Lamichhane, Devon Lam, Gary C. Kessler, Joshua MacMonagle
Steganography has long been used to counter forensic investigation. This use of steganography as an antiforensics technique is becoming more widespread. This requires forensic examiners to have additional tools to more effectively detect steganography. In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of least significant bit (LSB) image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. This technique is embodied in a software implementation named CounterSteg. The CounterSteg software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bitand color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. This paper demonstrates usage and typical forensic analysis with eight commonly available steganographic programs. Future work will attempt to automate the typical types of analysis and detection. This is important, as currently there is a steep rise in the use of image LSB steganographic techniques to hide the payload code used by malware and viruses, and for the purposes of data exfiltration. This results because of the fact that the hidden code and/or data can more easily bypass virus and malware signature detection in such a manner as being surreptitiously hidden in an otherwise innocuous image file.
隐写术长期以来一直被用于反法医调查。这种隐写术作为反取证技术的使用正变得越来越普遍。这要求法医审查员有额外的工具来更有效地检测隐写。在本文中,我们介绍了一个专门设计的新软件概念,通过将原始封面图像与可疑的隐写有效载荷图像进行并排比较,使数字取证专业人员能够清楚地识别和属性最低有效位(LSB)图像隐写的实例。这种技术体现在一个名为CounterSteg的软件实现中。CounterSteg软件允许对原始封面图像和任何修改后的图像进行详细的分析和比较,使用复杂的位和彩色通道视觉描述图形。在某些情况下,用于消息传输的隐写软件可以通过对LSB的取证分析和有效载荷图像中的其他变化来识别。本文演示了八种常用的隐写程序的用法和典型的法医分析。未来的工作将尝试自动化典型类型的分析和检测。这一点很重要,因为目前使用图像LSB隐写技术来隐藏恶意软件和病毒使用的有效载荷代码以及用于数据泄露的情况急剧增加。这是因为隐藏的代码和/或数据可以更容易地绕过病毒和恶意软件签名检测,以这种方式秘密地隐藏在其他无害的图像文件中。
{"title":"Identification of LSB image Steganography using Cover Image Comparisons","authors":"M. Pelosi, N. Poudel, Pratap Lamichhane, Devon Lam, Gary C. Kessler, Joshua MacMonagle","doi":"10.15394/JDFSL.2021.1551","DOIUrl":"https://doi.org/10.15394/JDFSL.2021.1551","url":null,"abstract":"Steganography has long been used to counter forensic investigation. This use of steganography as an antiforensics technique is becoming more widespread. This requires forensic examiners to have additional tools to more effectively detect steganography. In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of least significant bit (LSB) image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. This technique is embodied in a software implementation named CounterSteg. The CounterSteg software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bitand color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. This paper demonstrates usage and typical forensic analysis with eight commonly available steganographic programs. Future work will attempt to automate the typical types of analysis and detection. This is important, as currently there is a steep rise in the use of image LSB steganographic techniques to hide the payload code used by malware and viruses, and for the purposes of data exfiltration. This results because of the fact that the hidden code and/or data can more easily bypass virus and malware signature detection in such a manner as being surreptitiously hidden in an otherwise innocuous image file.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84786203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Backup and Recovery Mechanisms of Cassandra Database: A Review Cassandra数据库的备份与恢复机制综述
IF 0.3 Pub Date : 2021-01-01 DOI: 10.15394/JDFSL.2021.1613
Karina Bohora, Amol Bothe, D. Sheth, Rupali M. Chopade, V. Pachghare
Cassandra is a NoSQL database having a peer-to-peer, ring-type architecture. Cassandra offers fault-tolerance, data replication for higher availability as well as ensures no single point of failure. Given that Cassandra is a NoSQL database, it is evident that it lacks research that has gone into comparatively older and more widely and broadly used SQL databases. Cassandra’s growing popularity in recent times gives rise to the need to address any security-related or recovery-related concerns associated with its usage. This review paper discusses Cassandra’s existing deletion mechanism and presents some identified issues related to backup and recovery in the Cassandra database. Further, failure detection and handling of failures such as node failure or data center failure have been explored in the paper. In addition, several possible solutions to address backup and recovery, including recovery in case of disasters, have been reviewed.
Cassandra是一个NoSQL数据库,具有点对点、环型架构。Cassandra提供容错和数据复制功能,以实现更高的可用性,并确保无单点故障。考虑到Cassandra是一个NoSQL数据库,很明显,它缺乏对相对较老的、更广泛使用的SQL数据库的研究。Cassandra最近越来越受欢迎,因此需要解决与它的使用有关的任何与安全相关或与恢复相关的问题。本文讨论了Cassandra现有的删除机制,并提出了一些与Cassandra数据库备份和恢复相关的确定问题。此外,本文还对节点故障或数据中心故障的故障检测和处理进行了探讨。此外,还审查了处理备份和恢复的几种可能的解决方案,包括灾难情况下的恢复。
{"title":"Backup and Recovery Mechanisms of Cassandra Database: A Review","authors":"Karina Bohora, Amol Bothe, D. Sheth, Rupali M. Chopade, V. Pachghare","doi":"10.15394/JDFSL.2021.1613","DOIUrl":"https://doi.org/10.15394/JDFSL.2021.1613","url":null,"abstract":"Cassandra is a NoSQL database having a peer-to-peer, ring-type architecture. Cassandra offers fault-tolerance, data replication for higher availability as well as ensures no single point of failure. Given that Cassandra is a NoSQL database, it is evident that it lacks research that has gone into comparatively older and more widely and broadly used SQL databases. Cassandra’s growing popularity in recent times gives rise to the need to address any security-related or recovery-related concerns associated with its usage. This review paper discusses Cassandra’s existing deletion mechanism and presents some identified issues related to backup and recovery in the Cassandra database. Further, failure detection and handling of failures such as node failure or data center failure have been explored in the paper. In addition, several possible solutions to address backup and recovery, including recovery in case of disasters, have been reviewed.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89799285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Constructive DIREST Security Threat Modeling for Drone as a Service 无人机作为一种服务的建设性DIREST安全威胁建模
IF 0.3 Pub Date : 2021-01-01 DOI: 10.15394/JDFSL.2021.1695
Fahad E. Salamh, Umit Karabiyik, M. Rogers
The technology used in drones is similar or identical across drone types and components, with many common risks and opportunities. The purpose of this study is to enhance the risk assessment procedures for Drone as a Service (DaaS) capabilities. STRIDE is an acronym that includes the following security risks: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privileges. The paper presents a modified STRIDE threat model and prioritizes its desired properties (i.e., authenticity, integrity, non-reputability, confidentiality, availability, and authorization) to generate an appropriate DaaS threat model. To this end, the proposed DIREST threat model better meets the overall security assessment needs of DaaS. Moreover, this paper discusses the security risks of drones, identifies best practices for security assessment, and proposes a novel software update mechanism for drones during their operations. We explore the best practices related to drone penetration testing, including an effective methodology to maintain the continuity of drone operations, particularly drones used for emergency, safety, and rescue operations. Moreover, this research raises awareness of DaaS and drone operation in general as well as in the forensic science community due to its focus on the importance of securely operated drones for first responders. Furthermore, we address various aspects of security concerns, including data transmission, software restrictions, and embedded system-related events. In order to propose a security assessment for drones, we incorporate digital forensics and penetration testing techniques related to drone operations. Our results show that the proposed threat model enhances the security of flying devices and provides consistency in digital forensic procedures. This work introduces modifications to the STRIDE threat model based on the current literature, drone images provided by the NIST program, and a firmware static analysis of a zino hubsan brand drone.
无人机中使用的技术在无人机类型和组件之间是相似或相同的,存在许多共同的风险和机会。本研究的目的是加强无人机即服务(DaaS)能力的风险评估程序。STRIDE是一个缩略词,包含以下安全风险:欺骗、篡改、拒绝、信息泄露、拒绝服务和特权提升。本文提出了一种改进的STRIDE威胁模型,并对其所需的属性(即真实性、完整性、非声誉性、机密性、可用性和授权)进行优先排序,以生成合适的DaaS威胁模型。为此,本文提出的DIREST威胁模型较好地满足了DaaS的整体安全评估需求。此外,本文还讨论了无人机的安全风险,确定了安全评估的最佳实践,并提出了一种新的无人机运行过程中的软件更新机制。我们探讨了与无人机渗透测试相关的最佳实践,包括保持无人机操作连续性的有效方法,特别是用于紧急、安全和救援行动的无人机。此外,这项研究提高了对DaaS和无人机操作以及法医科学界的认识,因为它专注于安全操作无人机对第一响应者的重要性。此外,我们还解决了安全问题的各个方面,包括数据传输、软件限制和嵌入式系统相关事件。为了提出无人机的安全评估,我们结合了与无人机操作相关的数字取证和渗透测试技术。我们的研究结果表明,提出的威胁模型提高了飞行设备的安全性,并提供了数字取证程序的一致性。这项工作介绍了基于当前文献、NIST项目提供的无人机图像以及zino hubsan品牌无人机的固件静态分析对STRIDE威胁模型的修改。
{"title":"A Constructive DIREST Security Threat Modeling for Drone as a Service","authors":"Fahad E. Salamh, Umit Karabiyik, M. Rogers","doi":"10.15394/JDFSL.2021.1695","DOIUrl":"https://doi.org/10.15394/JDFSL.2021.1695","url":null,"abstract":"The technology used in drones is similar or identical across drone types and components, with many common risks and opportunities. The purpose of this study is to enhance the risk assessment procedures for Drone as a Service (DaaS) capabilities. STRIDE is an acronym that includes the following security risks: Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privileges. The paper presents a modified STRIDE threat model and prioritizes its desired properties (i.e., authenticity, integrity, non-reputability, confidentiality, availability, and authorization) to generate an appropriate DaaS threat model. To this end, the proposed DIREST threat model better meets the overall security assessment needs of DaaS. Moreover, this paper discusses the security risks of drones, identifies best practices for security assessment, and proposes a novel software update mechanism for drones during their operations. We explore the best practices related to drone penetration testing, including an effective methodology to maintain the continuity of drone operations, particularly drones used for emergency, safety, and rescue operations. Moreover, this research raises awareness of DaaS and drone operation in general as well as in the forensic science community due to its focus on the importance of securely operated drones for first responders. Furthermore, we address various aspects of security concerns, including data transmission, software restrictions, and embedded system-related events. In order to propose a security assessment for drones, we incorporate digital forensics and penetration testing techniques related to drone operations. Our results show that the proposed threat model enhances the security of flying devices and provides consistency in digital forensic procedures. This work introduces modifications to the STRIDE threat model based on the current literature, drone images provided by the NIST program, and a firmware static analysis of a zino hubsan brand drone.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87788406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Two-Stage Model for Social Network Investigations in Digital Forensics 数字取证中社会网络调查的两阶段模型
IF 0.3 Pub Date : 2020-08-20 DOI: 10.15394/jdfsl.2020.1667
A. David, Sarah Morris, G. Appleby-Thomas
This paper proposes a two-stage model for identifying and contextualizing features from artefacts created as a result of social networking activity. This technique can be useful in digital investigations and is based on understanding and the deconstruction of the processes that take place prior to, during and after user activity; this includes corroborating artefacts. Digital Investigations are becoming more complex due to factors such as, the volume of data to be examined; different data formats; a wide range of sources for digital evidence; the volatility of data and the limitations of some of the standard digital forensic tools. This paper highlights the need for an approach that enables digital investigators to prioritize social network artefacts to be further analysed; determine social connections in the context of an investigation e.g. a user’s social relationships, how recovered artefacts came to be, and how they can successfully be used as evidence in court.
本文提出了一个两阶段的模型,用于从作为社交网络活动的结果而创建的工件中识别和情境化特征。这种技术在数字调查中很有用,它基于对用户活动之前、期间和之后发生的过程的理解和解构;这包括确证的人工制品。由于要检查的数据量等因素,数字调查正变得越来越复杂;不同的数据格式;数字证据来源广泛;数据的波动性和一些标准数字取证工具的局限性。本文强调需要一种方法,使数字调查人员能够优先考虑社会网络人工制品,以进一步分析;在调查的背景下确定社会关系,例如用户的社会关系,如何找到文物,以及如何成功地将其用作法庭证据。
{"title":"A Two-Stage Model for Social Network Investigations in Digital Forensics","authors":"A. David, Sarah Morris, G. Appleby-Thomas","doi":"10.15394/jdfsl.2020.1667","DOIUrl":"https://doi.org/10.15394/jdfsl.2020.1667","url":null,"abstract":"This paper proposes a two-stage model for identifying and contextualizing features from artefacts created as a result of social networking activity. This technique can be useful in digital investigations and is based on understanding and the deconstruction of the processes that take place prior to, during and after user activity; this includes corroborating artefacts. Digital Investigations are becoming more complex due to factors such as, the volume of data to be examined; different data formats; a wide range of sources for digital evidence; the volatility of data and the limitations of some of the standard digital forensic tools. This paper highlights the need for an approach that enables digital investigators to prioritize social network artefacts to be further analysed; determine social connections in the context of an investigation e.g. a user’s social relationships, how recovered artefacts came to be, and how they can successfully be used as evidence in court.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2020-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79177679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
What’s in the Cloud? - An examination of the impact of cloud storage usage on the browser cache 云里有什么?-检查云存储使用对浏览器缓存的影响
IF 0.3 Pub Date : 2020-01-01 DOI: 10.15394/JDFSL.2020.1592
G. Horsman
Cloud storage is now a well established and popular service adopted by many individuals and organizations, often at a scaled cost, with free accounts also available. It provides users with the ability to store content on a cloud service provider’s infrastructure, offering the benefit of redundancy, reliability, security, the flexibility of access, and the potential assumed the liability of the provider for data loss within the contexts of a licensing agreement. Consequently, this form of remote storage provides a regulatory challenge as content which once resided upon a seized digital exhibit, available for scrutiny during a digital forensic investigatory, may no longer be present where attempting to acquire access to it creates costing and juridical difficulties. This article offers a digital forensic examination of trace-evidence left in the Internet browser cache following cloud storage account usage and interaction. Following interactions with Dropbox and Google Drive in the Chrome browser, testing demonstrates the possibility to recover data capable of facilitating a partial reconstruction of a user’s cloud storage account, with results offered and contextualized.
云存储现在是一种成熟且受欢迎的服务,被许多个人和组织采用,通常需要一定的成本,也可以使用免费帐户。它使用户能够将内容存储在云服务提供商的基础设施上,从而提供冗余、可靠性、安全性、访问灵活性等好处,并且在许可协议的背景下,提供商可能会承担数据丢失的责任。因此,这种形式的远程存储带来了监管挑战,因为曾经驻留在被查获的数字证物上的内容,在数字法医调查期间可以进行审查,可能不再存在,因为试图获取它会产生成本和司法困难。本文提供了在云存储帐户使用和交互后留在互联网浏览器缓存中的痕迹证据的数字法医检查。在Chrome浏览器中与Dropbox和Google Drive进行交互后,测试证明了恢复数据的可能性,这些数据能够促进用户云存储帐户的部分重建,并提供结果和上下文。
{"title":"What’s in the Cloud? - An examination of the impact of cloud storage usage on the browser cache","authors":"G. Horsman","doi":"10.15394/JDFSL.2020.1592","DOIUrl":"https://doi.org/10.15394/JDFSL.2020.1592","url":null,"abstract":"Cloud storage is now a well established and popular service adopted by many individuals and organizations, often at a scaled cost, with free accounts also available. It provides users with the ability to store content on a cloud service provider’s infrastructure, offering the benefit of redundancy, reliability, security, the flexibility of access, and the potential assumed the liability of the provider for data loss within the contexts of a licensing agreement. Consequently, this form of remote storage provides a regulatory challenge as content which once resided upon a seized digital exhibit, available for scrutiny during a digital forensic investigatory, may no longer be present where attempting to acquire access to it creates costing and juridical difficulties. This article offers a digital forensic examination of trace-evidence left in the Internet browser cache following cloud storage account usage and interaction. Following interactions with Dropbox and Google Drive in the Chrome browser, testing demonstrates the possibility to recover data capable of facilitating a partial reconstruction of a user’s cloud storage account, with results offered and contextualized.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87554561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A FORENSIC FIRST LOOK AT A POS DEVICE: SEARCHING FOR PCI DSS DATA STORAGE VIOLATIONS 首先检查pos设备:搜索pci DSS数据存储违规
IF 0.3 Pub Date : 2020-01-01 DOI: 10.15394/JDFSL.2020.1614
Stephen Larson, James H. Jones, Jim Swauger
According to the Verizon 2018 Data Breach Investigations Report, 321 POS terminals (user devices) were involved in data breaches in 2017. These data breaches involved standalone POS terminals as well as associated controller systems. This paper examines a standalone Point-of-Sale (POS) system commonly used in smaller retail stores and restaurants to extract unencrypted data and identify possible violations of the Payment Card Industry Data Security Standard (PCI DSS) requirement to protect stored cardholder data. Persistent storage (flash memory chips) were removed from the devices and their contents were successfully acquired. Information about the device and the code running on it was successfully extracted, although no PCI DSS data storage violations were identified.
根据Verizon 2018年数据泄露调查报告,2017年有321个POS终端(用户设备)涉及数据泄露。这些数据泄露涉及独立POS终端以及相关的控制器系统。本文研究了一个独立的销售点(POS)系统,该系统通常用于小型零售商店和餐馆,用于提取未加密的数据,并识别可能违反支付卡行业数据安全标准(PCI DSS)的要求,以保护存储的持卡人数据。持久存储(闪存芯片)从设备中移除,并成功获取其内容。尽管没有识别出PCI DSS数据存储违规,但成功提取了有关设备及其上运行的代码的信息。
{"title":"A FORENSIC FIRST LOOK AT A POS DEVICE: SEARCHING FOR PCI DSS DATA STORAGE VIOLATIONS","authors":"Stephen Larson, James H. Jones, Jim Swauger","doi":"10.15394/JDFSL.2020.1614","DOIUrl":"https://doi.org/10.15394/JDFSL.2020.1614","url":null,"abstract":"According to the Verizon 2018 Data Breach Investigations Report, 321 POS terminals (user devices) were involved in data breaches in 2017. These data breaches involved standalone POS terminals as well as associated controller systems. This paper examines a standalone Point-of-Sale (POS) system commonly used in smaller retail stores and restaurants to extract unencrypted data and identify possible violations of the Payment Card Industry Data Security Standard (PCI DSS) requirement to protect stored cardholder data. Persistent storage (flash memory chips) were removed from the devices and their contents were successfully acquired. Information about the device and the code running on it was successfully extracted, although no PCI DSS data storage violations were identified.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80225425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Evaluation Of Data Erasing Tools 数据擦除工具的评价
IF 0.3 Pub Date : 2020-01-01 DOI: 10.15394/JDFSL.2020.1615
T. Martin, Andrew Jones
The permanent removal of data from computer disks has always been problematic. This has been due, in part, to the lack of availability of tools, and in part due to the misperception by the user that when a file is deleted it is destroyed and cannot be recovered and that when a disk is formatted, the data is destroyed. In this paper, we examine a number of the commonly available tools to determine how effectively they function and whether they achieve the aim of the effective destruction of data
从计算机磁盘上永久删除数据一直是个问题。这部分是由于缺乏可用的工具,部分是由于用户错误地认为,当文件被删除时,它将被销毁并且无法恢复,而当磁盘被格式化时,数据将被销毁。在本文中,我们研究了一些常用的工具,以确定它们的功能如何有效,以及它们是否达到了有效销毁数据的目的
{"title":"An Evaluation Of Data Erasing Tools","authors":"T. Martin, Andrew Jones","doi":"10.15394/JDFSL.2020.1615","DOIUrl":"https://doi.org/10.15394/JDFSL.2020.1615","url":null,"abstract":"The permanent removal of data from computer disks has always been problematic. This has been due, in part, to the lack of availability of tools, and in part due to the misperception by the user that when a file is deleted it is destroyed and cannot be recovered and that when a disk is formatted, the data is destroyed. In this paper, we examine a number of the commonly available tools to determine how effectively they function and whether they achieve the aim of the effective destruction of data","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72419117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Cryptography, Passwords, Privacy, and the Fifth Amendment 密码学,密码,隐私和第五修正案
IF 0.3 Pub Date : 2020-01-01 DOI: 10.15394/jdfsl.2020.1678
G. Kessler, Ann M. Phillips
Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the issues around this complex legal and social issue, including the evolution in the use of digital cryptography and the evolving legal interpretations of privacy.
自20世纪90年代初以来,军用级密码学已广泛用于个人和商业用途,无需任何成本。自从PGP引入以来,越来越多的人对文件和设备进行加密,现在我们的智能手机默认是加密的。虽然这表面上为用户提供了高度的隐私,但强迫用户提供密码被一些法院解释为违反了我们的第五修正案保护,成为执法部门合法执行搜查令的一个通常不可逾越的障碍。本文将探讨围绕这一复杂的法律和社会问题的一些问题,包括数字密码学使用的演变和隐私法律解释的演变。
{"title":"Cryptography, Passwords, Privacy, and the Fifth Amendment","authors":"G. Kessler, Ann M. Phillips","doi":"10.15394/jdfsl.2020.1678","DOIUrl":"https://doi.org/10.15394/jdfsl.2020.1678","url":null,"abstract":"Military-grade cryptography has been widely available at no cost for personal and commercial use since the early 1990s. Since the introduction of Pretty Good Privacy (PGP), more and more people encrypt files and devices, and we are now at the point where our smartphones are encrypted by default. While this ostensibly provides users with a high degree of privacy, compelling a user to provide a password has been interpreted by some courts as a violation of our Fifth Amendment protections, becoming an often insurmountable hurdle to law enforcement lawfully executing a search warrant. This paper will explore some of the issues around this complex legal and social issue, including the evolution in the use of digital cryptography and the evolving legal interpretations of privacy.","PeriodicalId":43224,"journal":{"name":"Journal of Digital Forensics Security and Law","volume":null,"pages":null},"PeriodicalIF":0.3,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80376099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Journal of Digital Forensics Security and Law
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1