{"title":"Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics","authors":"Jiang Wang, Fengwei Zhang, Kun Sun, A. Stavrou","doi":"10.1109/SADFE.2011.7","DOIUrl":"https://doi.org/10.1109/SADFE.2011.7","url":null,"abstract":"Being able to inspect and analyze the operational state of commodity machines is crucial for modern digital forensics. Indeed, volatile system state including memory data and CPU registers contain information that cannot be directly inferred or reconstructed by acquiring the contents of the nonvolatile storage. Unfortunately, it still remains an open problem how to reliably and consistently retrieve the volatile machine state without disrupting its operation. In this paper, we propose to leverage commercial PCI network cards and the current x86 implementation of System Management Mode to reliably replicate the physical memory and critical CPU registers from commodity hardware. Furthermore, we demonstrate how remote state replication can be used for semantic reconstruction, where the analysis of memory structures enables us to interactively perform forensic analysis of the machine's memory content.","PeriodicalId":264200,"journal":{"name":"2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130662212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Case Study on South Africa and Namibia: A Model for Electronic Evidence for the SADC Region","authors":"A. Phillips","doi":"10.1109/SADFE.2011.4","DOIUrl":"https://doi.org/10.1109/SADFE.2011.4","url":null,"abstract":"The need for standardized laws for electronic evidence is well established. As more countries realize the need for such laws in their day to day affairs, they create ones that work for their country. In today's global economy and interlaced businesses, both civil and criminal cases cross international lines. This case study uses South Africa and Namibia as a model for the SADC region of sub-Saharan Africa in the establishment of digital law and handling of digital evidence.","PeriodicalId":264200,"journal":{"name":"2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116116250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Losavio, Musa Hindi, Roman V Yampolskiy, D. Keeling
{"title":"Boundary Conditions for the Digital Forensic Use of Electronic Evidence and The Need for Forensic Counter-Analysis","authors":"M. Losavio, Musa Hindi, Roman V Yampolskiy, D. Keeling","doi":"10.1109/SADFE.2011.2","DOIUrl":"https://doi.org/10.1109/SADFE.2011.2","url":null,"abstract":"Network and Digital Forensics provide information about electronic activity in new, sometimes unprecedented forms. These new forms offer new, powerful tactical tools for investigations of electronic malfeasance when incorporated under traditional legal regulation of state power, particular that of Fourth Amendment limitations on police searches and seizures under the U.S. Constitution. These tactical tools raise issues of public policy and privacy that may raise concerns about the proper police oversight of civil society. How those issues are resolved will define personal privacy, autonomy and dignity in the 21st digital century.","PeriodicalId":264200,"journal":{"name":"2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127886005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}