Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics最新文献

筛选
英文 中文
Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics 第一届ACM SIGSOFT软件工程与数字取证国际研讨会论文集
Dalal Alrajeh, L. Pasquale
{"title":"Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics","authors":"Dalal Alrajeh, L. Pasquale","doi":"10.1145/3121252","DOIUrl":"https://doi.org/10.1145/3121252","url":null,"abstract":"","PeriodicalId":252458,"journal":{"name":"Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127856030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sustainable automated data recovery: a research roadmap 可持续自动数据恢复:研究路线图
J. V. D. Bos
{"title":"Sustainable automated data recovery: a research roadmap","authors":"J. V. D. Bos","doi":"10.1145/3121252.3121254","DOIUrl":"https://doi.org/10.1145/3121252.3121254","url":null,"abstract":"Digital devices contain increasingly more data and applications. This means more data to handle and a larger amount of different types of traces to recover and consider in digital forensic investigations. Both present a challenge to data recovery approaches, requiring higher performance and increased flexibility. In order to progress to a long-term sustainable approach to automated data recovery, this paper proposes a partitioning into manual, custom, formalized and self-improving approaches. These approaches are described along with research directions to consider: building universal abstractions, selecting appropriate techniques and developing user-friendly tools.","PeriodicalId":252458,"journal":{"name":"Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122162317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building forensics in: supporting the investigation of digital criminal activities (invited talk) 建立法医学:支持数码犯罪活动的调查(特邀演讲)
L. Williams
{"title":"Building forensics in: supporting the investigation of digital criminal activities (invited talk)","authors":"L. Williams","doi":"10.1145/3121252.3127582","DOIUrl":"https://doi.org/10.1145/3121252.3127582","url":null,"abstract":"Logging mechanisms that capture detailed traces of user activity, including creating, reading, updating, and deleting (CRUD) data, facilitate meaningful forensic analysis following a security or privacy breach. However, software requirements often inadequately and inconsistently state 'what' user actions should be logged, thus hindering meaningful forensic analysis. In this talk, we will explore a variety of techniques for building a software system that supports forensic analysis. We will discuss systematic heuristics-driven and patterns-driven processes for identifying log events that must be logged based on user actions and potential accidental and malicious use, as described in natural language software artifacts. We then discuss systematic process for creating a black-box test suite for verifying the identified log events are logged. Using the results of executing the black-box test suite, we propose and evaluate a security metric for measuring the forensic-ability of user activity logs.","PeriodicalId":252458,"journal":{"name":"Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124641426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use of organisational topologies for forensic investigations 使用组织拓扑进行法医调查
George Grispos, Sorren Hanvey, B. Nuseibeh
{"title":"Use of organisational topologies for forensic investigations","authors":"George Grispos, Sorren Hanvey, B. Nuseibeh","doi":"10.1145/3121252.3121253","DOIUrl":"https://doi.org/10.1145/3121252.3121253","url":null,"abstract":"In today's highly regulated business environment, it is becoming increasingly important that organisations implement forensic-ready systems and architectures to aid the investigation of security incidents and data breaches. Previously, different solutions have been proposed for implementing forensic readiness within organisations. One of these solutions is that organisations implement an organisational structure that takes into consideration digital forensics by establishing roles and responsibilities to assist with investigations. However, no previous research has defined how this can actually be accomplished within an organisation. In this paper, we put forth the idea of using the topology of an organisation's structure to define the roles and responsibilities to assist with handling a forensic investigation. In the past, the role of topology has been examined from various perspectives, including software engineering. We draw on this previous research and use the topological properties of containment, proximity and reachability in order to define a representation of the organisational structure that takes into consideration digital forensics. For example, topology can be used to express and provide a context regarding the location of assets that need to be investigated, as well as the individuals, whose assistance is required to investigate such assets. Furthermore, knowing the topology of an organisation's structure can also assist investigators identify stakeholders that could be of interest to an investigation, based on their relationship to the asset(s) under investigation.","PeriodicalId":252458,"journal":{"name":"Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129903078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Snap forensics: a tradeoff between ephemeral intelligence and persistent evidence collection 快速取证:短暂的情报和持久的证据收集之间的权衡
Y. Yu, T. Tun
{"title":"Snap forensics: a tradeoff between ephemeral intelligence and persistent evidence collection","authors":"Y. Yu, T. Tun","doi":"10.1145/3121252.3121255","DOIUrl":"https://doi.org/10.1145/3121252.3121255","url":null,"abstract":"Digital evidence needs to be made persistent so that it can be used later. For citizen forensics, sometimes intelligence cannot or should not be made persistent forever. In this position paper, we propose a form of snap forensics by defining an elastic duration of evidence/intelligence validity. Explicitly declaring such a duration could unify the treatment of both ephemeral intelligence and persistent evidence towards more flexible storage to satisfy privacy requirements.","PeriodicalId":252458,"journal":{"name":"Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128074655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信