2020 8th International Symposium on Digital Forensics and Security (ISDFS)最新文献

筛选
英文 中文
An Android Case Study on Technical Anti-Forensic Challenges of WhatsApp Application 基于Android的WhatsApp应用反取证技术挑战案例研究
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/ISDFS49300.2020.9116192
Mohammad Meraj Mirza, Fahad E. Salamh, Umit Karabiyik
{"title":"An Android Case Study on Technical Anti-Forensic Challenges of WhatsApp Application","authors":"Mohammad Meraj Mirza, Fahad E. Salamh, Umit Karabiyik","doi":"10.1109/ISDFS49300.2020.9116192","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116192","url":null,"abstract":"Cyberbullying has become a serious concern in this Internet era with the availability of various communication technologies. While no one wishes to be a victim of cyberbullying, some of the electronic platforms, specifically Instant Messaging Applications (IMAs) such as WhatsApp, have created a safe haven for cyberbullying. As the use of WhatsApp application is globally increasing, it is extremely important to consider it being misused as a tool of cybercrime. This paper investigates some of the technical issues with WhatsApp application that could open the door to cybercrimes and pose anti-forensic challenges. In addition, we also highlight possible anti-forensic techniques for WhatsApp application through two hypothetical case scenarios. Moreover, we propose a validated solution to the ‘delete for everyone’ feature of WhatsApp by presenting a demo mobile application that recovers any deleted messages even after block status.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"265 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133792114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Intelligence in Digital Forensics Process 数字取证过程中的智能
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/ISDFS49300.2020.9116442
Iliyasu Yahaya Adam, C. Varol
{"title":"Intelligence in Digital Forensics Process","authors":"Iliyasu Yahaya Adam, C. Varol","doi":"10.1109/ISDFS49300.2020.9116442","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116442","url":null,"abstract":"Digital forensics is the digital equivalence of traditional crime investigations that leverages digital technologies to facilitate criminal investigations. The expertise and previous experience of an investigator or any security agent in traditional forensic investigations play an important role in the success, efficiency, and effectiveness of the investigation. Similarly employing the power of intelligence in the current computational resources in the digital investigation process will lead to more efficient and effective digital investigation results. This study builds on existing works in the literature to propose the use of clustering and classification machine learning algorithms on evolving database files to achieve intelligence in the digital investigation process and finally come up with a comprehensive block diagram as a general-purpose framework for intelligent forensic investigation.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121845064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Critical Analysis of Cryptographic Algorithms 密码算法的关键分析
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/ISDFS49300.2020.9116213
Mazoon AlRoubiei, Thuraiya AlYarubi, B. Kumar
{"title":"Critical Analysis of Cryptographic Algorithms","authors":"Mazoon AlRoubiei, Thuraiya AlYarubi, B. Kumar","doi":"10.1109/ISDFS49300.2020.9116213","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116213","url":null,"abstract":"Security is the most important role in data communication due to the increase of the intruder’s possibility of alteration and eavesdropping to the sensitive data. Hence, cryptography is the fundamental tool used to protect these data. The purpose of using cryptography is to achieve privacy via preventing disclosure of the communication where the data are converted from a readable form into an unreadable form and vice versa. The cryptography algorithm has two types namely: Symmetric key and Asymmetric key. Asymmetric key algorithm mainly invented to overcome the dilemma of key distribution in symmetric key. There are several algorithms classified under these two types based on different parameters. Hence, this variation leads to different levels of performance and efficiency of these algorithms. This paper presents a critical analysis of these systems based on a detailed study and literature review of some cryptography algorithms.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125509562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Z Generation Students and Their Digital Footprints Z世代学生和他们的数字足迹
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/ISDFS49300.2020.9116455
Songül Karabatak, M. Karabatak
{"title":"Z Generation Students and Their Digital Footprints","authors":"Songül Karabatak, M. Karabatak","doi":"10.1109/ISDFS49300.2020.9116455","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116455","url":null,"abstract":"The purpose of this study is to evaluate the literature studies investigating the digital footprints of Generation Z students. For this purpose, studies in various databases related to the digital footprints of children, adolescents, and university students were evaluated in terms of analysis units of the publication type, research method, sampling, data collection tool, and results. However, it was seen that there were not many publications on this subject in the literature. Most of the studies examined were articles. In the studies, quantitative research methods were mostly used, therefore scales were preferred mostly. Also, it was observed that the ones who have the highest awareness about digital footprints are young people while the lowest are children. At the end of the study, various suggestions were made to increase the awareness of Generation Z students in digital footprints.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127142208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Signature Recognition Using Machine Learning 使用机器学习的签名识别
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/ISDFS49300.2020.9116199
Shalaw Mshir, Mehmet Kaya
{"title":"Signature Recognition Using Machine Learning","authors":"Shalaw Mshir, Mehmet Kaya","doi":"10.1109/ISDFS49300.2020.9116199","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116199","url":null,"abstract":"Signatures are popularly used as a method of personal identification and confirmation. Many certificates such as bank checks and legal activities need signature verification. Verifying the signature of a large number of documents is a very difficult and time-consuming task. As a result, explosive growth has been observed in biometric personal verification and authentication systems that relate to unique quantifiable physical properties (fingerprints, hand, and face, ear, iris, or DNA scan) or behavioral characteristics (gait, sound, etc.). Several methods are used to describe the ability of the suggested system in specifying the genuine signatures from the forgeries. This approach presents a new technique for signature verification and recognition, using a tow dataset for training the model by a siamese network.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123310321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Effects of Homework Supported Distance Education on Academic Satisfaction, Academic Achievement, and Attitude towards Distance Education 家庭作业支持远程教育对学业满意度、学业成就和远程教育态度的影响
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/ISDFS49300.2020.9116372
Songül Karabatak, Müslim Alanoğlu, M. Karabatak
{"title":"Effects of Homework Supported Distance Education on Academic Satisfaction, Academic Achievement, and Attitude towards Distance Education","authors":"Songül Karabatak, Müslim Alanoğlu, M. Karabatak","doi":"10.1109/ISDFS49300.2020.9116372","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116372","url":null,"abstract":"The purpose of this study is to reveal the effects of homework supported distance education on students’ academic achievement, academic satisfaction, and attitudes towards distance education. This study was performed with a quantitative paradigm. In this context, repeated measures design was used. The purposeful sampling method was used to determine the participants. One-way analysis of variance (ANOVA) for repeated measures was used to compare academic achievement tests and scale scores. As a result of the study, the distance education process applied significantly increased students’ academic achievement but supporting the distance education process with homework increased academic achievement more. The distance education process did not change the students’ attitudes towards distance education and their academic satisfaction, but homework-supported distance education process changed positively. This finding revealed that distance education alone is not enough and it should be supported with different techniques and methods to increase its effectiveness.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117088620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Predicting Crime Scene Location Details for First Responders 为急救人员预测犯罪现场位置细节
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/ISDFS49300.2020.9116386
S. Krishnan, Bing Zhou
{"title":"Predicting Crime Scene Location Details for First Responders","authors":"S. Krishnan, Bing Zhou","doi":"10.1109/ISDFS49300.2020.9116386","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116386","url":null,"abstract":"Responding to an emergency or crime can be challenging especially when one does not fully know the location details. Often first responders arrive a crime scene with little information and then make their way around. During an emergency, when seconds count and first responder units need to locate individuals requiring immediate assistance, they simply don’t have the time to figure out the location details at the facility or residence. In this experiment, the author’s leverage statistical predictive modeling and machine learning techniques to analyze a public dataset to predict premise/location details for first responders with reasonable accuracy.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"111 6 Pt 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130749046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Augmented reality based criminal investigation system (ARCRIME) 基于增强现实的刑侦系统(ARCRIME)
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/ISDFS49300.2020.9116204
Shaheryar Ehsan I Haque, S. Saleem
{"title":"Augmented reality based criminal investigation system (ARCRIME)","authors":"Shaheryar Ehsan I Haque, S. Saleem","doi":"10.1109/ISDFS49300.2020.9116204","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116204","url":null,"abstract":"Crime scene investigation and preservation are fundamentally the pillars of forensics. Numerous cases have been discussed in this paper where mishandling of evidence or improper investigation leads to lengthy trials and even worse incorrect verdicts. Whether the problem is lack of training of first responders or any other scenario, it is essential for police officers to properly preserve the evidence. Second problem is the criminal profiling where each district department has its own method of storing information about criminals. ARCRIME intends to digitally transform the way police combat crime. It will allow police officers to create a copy of the scene of crime so that it can be presented in courts or in forensics labs. It will be in the form of wearable glasses for officers on site whereas officers during training will be wearing a headset. The trainee officers will be provided with simulations of cases which have already been resolved. Officers on scene would be provided with intelligence about the crime and the suspect they are interviewing. They would be able to create a case file with audio recording and images which can be digitally sent to a prosecution lawyer. This paper also explores the risks involved with ARCRIME and also weighs in their impact and likelihood of happening. Certain contingency plans have been highlighted in the same section as well to respond to emergency situations.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114834454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities MiNo: Chrome Web浏览器附加应用程序,以阻止隐藏的加密货币挖矿活动
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/ISDFS49300.2020.9116443
Safa Aktepe, C. Varol, N. Shashidhar
{"title":"MiNo: The Chrome Web Browser Add-on Application to Block the Hidden Cryptocurrency Mining Activities","authors":"Safa Aktepe, C. Varol, N. Shashidhar","doi":"10.1109/ISDFS49300.2020.9116443","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116443","url":null,"abstract":"Cryptocurrencies are the digital currencies designed to replace the regular cash money while taking place in our daily lives especially for the last couple of years. Mining cryptocurrencies are one of the popular ways to have them and make a profit due to unstable values in the market. This attracts attackers to utilize malware on internet users’ computer resources, also known as cryptojacking, to mine cryptocurrencies. Cryptojacking started to be a major issue in the internet world. In this case, we developed MiNo, a web browser add-on application to detect these malicious mining activities running without the user’s permission or knowledge. This add-on provides security and efficiency for the computer resources of the internet users. MiNo designed and developed with double-layer protection which makes it ahead of its competitors in the market.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124068845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Study on Automatic Speech Recognition Systems 自动语音识别系统的研究
2020 8th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2020-06-01 DOI: 10.1109/ISDFS49300.2020.9116286
Habib Ibrahim, A. Varol
{"title":"A Study on Automatic Speech Recognition Systems","authors":"Habib Ibrahim, A. Varol","doi":"10.1109/ISDFS49300.2020.9116286","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116286","url":null,"abstract":"Speech recognition is a technique that enables machines to automatically identify the human voice through speech signals. In other words, it helps create a communication link between machines and humans. Speech recognition uses an acoustic and modeling algorithm to execute its task. It allows interaction between computer interfaces and a natural human voice. Speech recognition is one of the current topics of discussion in the twenty-first century. The advent of technological gadgets in modern society has become rampant through vigorous efforts made by scientists in realizing their aim of developing an algorithm that will allow machines to interact with human beings. It is obvious that this situation previously thought of as fiction, has been achieved. Hence, there are several applications that enhance speech recognition. This paper aims to study some models of the speech recognition system, its classification of speech, its significance, and its application.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124241073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信