Mohammad Meraj Mirza, Fahad E. Salamh, Umit Karabiyik
{"title":"An Android Case Study on Technical Anti-Forensic Challenges of WhatsApp Application","authors":"Mohammad Meraj Mirza, Fahad E. Salamh, Umit Karabiyik","doi":"10.1109/ISDFS49300.2020.9116192","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116192","url":null,"abstract":"Cyberbullying has become a serious concern in this Internet era with the availability of various communication technologies. While no one wishes to be a victim of cyberbullying, some of the electronic platforms, specifically Instant Messaging Applications (IMAs) such as WhatsApp, have created a safe haven for cyberbullying. As the use of WhatsApp application is globally increasing, it is extremely important to consider it being misused as a tool of cybercrime. This paper investigates some of the technical issues with WhatsApp application that could open the door to cybercrimes and pose anti-forensic challenges. In addition, we also highlight possible anti-forensic techniques for WhatsApp application through two hypothetical case scenarios. Moreover, we propose a validated solution to the ‘delete for everyone’ feature of WhatsApp by presenting a demo mobile application that recovers any deleted messages even after block status.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"265 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133792114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligence in Digital Forensics Process","authors":"Iliyasu Yahaya Adam, C. Varol","doi":"10.1109/ISDFS49300.2020.9116442","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116442","url":null,"abstract":"Digital forensics is the digital equivalence of traditional crime investigations that leverages digital technologies to facilitate criminal investigations. The expertise and previous experience of an investigator or any security agent in traditional forensic investigations play an important role in the success, efficiency, and effectiveness of the investigation. Similarly employing the power of intelligence in the current computational resources in the digital investigation process will lead to more efficient and effective digital investigation results. This study builds on existing works in the literature to propose the use of clustering and classification machine learning algorithms on evolving database files to achieve intelligence in the digital investigation process and finally come up with a comprehensive block diagram as a general-purpose framework for intelligent forensic investigation.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121845064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Critical Analysis of Cryptographic Algorithms","authors":"Mazoon AlRoubiei, Thuraiya AlYarubi, B. Kumar","doi":"10.1109/ISDFS49300.2020.9116213","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116213","url":null,"abstract":"Security is the most important role in data communication due to the increase of the intruder’s possibility of alteration and eavesdropping to the sensitive data. Hence, cryptography is the fundamental tool used to protect these data. The purpose of using cryptography is to achieve privacy via preventing disclosure of the communication where the data are converted from a readable form into an unreadable form and vice versa. The cryptography algorithm has two types namely: Symmetric key and Asymmetric key. Asymmetric key algorithm mainly invented to overcome the dilemma of key distribution in symmetric key. There are several algorithms classified under these two types based on different parameters. Hence, this variation leads to different levels of performance and efficiency of these algorithms. This paper presents a critical analysis of these systems based on a detailed study and literature review of some cryptography algorithms.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125509562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Z Generation Students and Their Digital Footprints","authors":"Songül Karabatak, M. Karabatak","doi":"10.1109/ISDFS49300.2020.9116455","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116455","url":null,"abstract":"The purpose of this study is to evaluate the literature studies investigating the digital footprints of Generation Z students. For this purpose, studies in various databases related to the digital footprints of children, adolescents, and university students were evaluated in terms of analysis units of the publication type, research method, sampling, data collection tool, and results. However, it was seen that there were not many publications on this subject in the literature. Most of the studies examined were articles. In the studies, quantitative research methods were mostly used, therefore scales were preferred mostly. Also, it was observed that the ones who have the highest awareness about digital footprints are young people while the lowest are children. At the end of the study, various suggestions were made to increase the awareness of Generation Z students in digital footprints.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127142208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Signature Recognition Using Machine Learning","authors":"Shalaw Mshir, Mehmet Kaya","doi":"10.1109/ISDFS49300.2020.9116199","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116199","url":null,"abstract":"Signatures are popularly used as a method of personal identification and confirmation. Many certificates such as bank checks and legal activities need signature verification. Verifying the signature of a large number of documents is a very difficult and time-consuming task. As a result, explosive growth has been observed in biometric personal verification and authentication systems that relate to unique quantifiable physical properties (fingerprints, hand, and face, ear, iris, or DNA scan) or behavioral characteristics (gait, sound, etc.). Several methods are used to describe the ability of the suggested system in specifying the genuine signatures from the forgeries. This approach presents a new technique for signature verification and recognition, using a tow dataset for training the model by a siamese network.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123310321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effects of Homework Supported Distance Education on Academic Satisfaction, Academic Achievement, and Attitude towards Distance Education","authors":"Songül Karabatak, Müslim Alanoğlu, M. Karabatak","doi":"10.1109/ISDFS49300.2020.9116372","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116372","url":null,"abstract":"The purpose of this study is to reveal the effects of homework supported distance education on students’ academic achievement, academic satisfaction, and attitudes towards distance education. This study was performed with a quantitative paradigm. In this context, repeated measures design was used. The purposeful sampling method was used to determine the participants. One-way analysis of variance (ANOVA) for repeated measures was used to compare academic achievement tests and scale scores. As a result of the study, the distance education process applied significantly increased students’ academic achievement but supporting the distance education process with homework increased academic achievement more. The distance education process did not change the students’ attitudes towards distance education and their academic satisfaction, but homework-supported distance education process changed positively. This finding revealed that distance education alone is not enough and it should be supported with different techniques and methods to increase its effectiveness.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117088620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting Crime Scene Location Details for First Responders","authors":"S. Krishnan, Bing Zhou","doi":"10.1109/ISDFS49300.2020.9116386","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116386","url":null,"abstract":"Responding to an emergency or crime can be challenging especially when one does not fully know the location details. Often first responders arrive a crime scene with little information and then make their way around. During an emergency, when seconds count and first responder units need to locate individuals requiring immediate assistance, they simply don’t have the time to figure out the location details at the facility or residence. In this experiment, the author’s leverage statistical predictive modeling and machine learning techniques to analyze a public dataset to predict premise/location details for first responders with reasonable accuracy.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"111 6 Pt 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130749046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Augmented reality based criminal investigation system (ARCRIME)","authors":"Shaheryar Ehsan I Haque, S. Saleem","doi":"10.1109/ISDFS49300.2020.9116204","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116204","url":null,"abstract":"Crime scene investigation and preservation are fundamentally the pillars of forensics. Numerous cases have been discussed in this paper where mishandling of evidence or improper investigation leads to lengthy trials and even worse incorrect verdicts. Whether the problem is lack of training of first responders or any other scenario, it is essential for police officers to properly preserve the evidence. Second problem is the criminal profiling where each district department has its own method of storing information about criminals. ARCRIME intends to digitally transform the way police combat crime. It will allow police officers to create a copy of the scene of crime so that it can be presented in courts or in forensics labs. It will be in the form of wearable glasses for officers on site whereas officers during training will be wearing a headset. The trainee officers will be provided with simulations of cases which have already been resolved. Officers on scene would be provided with intelligence about the crime and the suspect they are interviewing. They would be able to create a case file with audio recording and images which can be digitally sent to a prosecution lawyer. This paper also explores the risks involved with ARCRIME and also weighs in their impact and likelihood of happening. Certain contingency plans have been highlighted in the same section as well to respond to emergency situations.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114834454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities","authors":"Safa Aktepe, C. Varol, N. Shashidhar","doi":"10.1109/ISDFS49300.2020.9116443","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116443","url":null,"abstract":"Cryptocurrencies are the digital currencies designed to replace the regular cash money while taking place in our daily lives especially for the last couple of years. Mining cryptocurrencies are one of the popular ways to have them and make a profit due to unstable values in the market. This attracts attackers to utilize malware on internet users’ computer resources, also known as cryptojacking, to mine cryptocurrencies. Cryptojacking started to be a major issue in the internet world. In this case, we developed MiNo, a web browser add-on application to detect these malicious mining activities running without the user’s permission or knowledge. This add-on provides security and efficiency for the computer resources of the internet users. MiNo designed and developed with double-layer protection which makes it ahead of its competitors in the market.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124068845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Automatic Speech Recognition Systems","authors":"Habib Ibrahim, A. Varol","doi":"10.1109/ISDFS49300.2020.9116286","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116286","url":null,"abstract":"Speech recognition is a technique that enables machines to automatically identify the human voice through speech signals. In other words, it helps create a communication link between machines and humans. Speech recognition uses an acoustic and modeling algorithm to execute its task. It allows interaction between computer interfaces and a natural human voice. Speech recognition is one of the current topics of discussion in the twenty-first century. The advent of technological gadgets in modern society has become rampant through vigorous efforts made by scientists in realizing their aim of developing an algorithm that will allow machines to interact with human beings. It is obvious that this situation previously thought of as fiction, has been achieved. Hence, there are several applications that enhance speech recognition. This paper aims to study some models of the speech recognition system, its classification of speech, its significance, and its application.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124241073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}