M. N. Yusoff, R. Mahmod, A. Dehghantanha, Mohd Taufik Abdullah
{"title":"An approach for forensic investigation in Firefox OS","authors":"M. N. Yusoff, R. Mahmod, A. Dehghantanha, Mohd Taufik Abdullah","doi":"10.1109/CyberSec.2014.6913966","DOIUrl":"https://doi.org/10.1109/CyberSec.2014.6913966","url":null,"abstract":"The advancement of smartphone technology has attracted many companies in developing mobile operating system. Mozilla Corporation recently released Linux-based open source operating system, named Firefox OS. The emergence of Firefox OS has created new challenges, concentrations and opportunities for digital investigators. In general, Firefox OS is designed to allow smartphones to communicate directly with HTML5 applications using JavaScript and newly introduced WebAPI. However, the used of JavaScript in HTML5 applications and solely no OS restriction might lead to security issues and potential exploits. Therefore, forensic analysis for Firefox OS is urgently needed in order to investigate any criminal intentions. This paper will present an approach and methodology in forensically sound manner for Firefox OS.","PeriodicalId":383642,"journal":{"name":"2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123938817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, A. M. Salem
{"title":"Statistical analysis for random bits generation on quantum key distribution","authors":"O. Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, A. M. Salem","doi":"10.1109/CyberSec.2014.6913970","DOIUrl":"https://doi.org/10.1109/CyberSec.2014.6913970","url":null,"abstract":"Recently, Quantum cryptography researchers utilize the quantum keys, in order to provide a more trusted environment for both key distribution and management processes. The quantum keys are generated based on quantum mechanics phenomena. However, all events for the quantum key generation rely on exchanging photons between parties over limited distances. So, in this paper, random tests algorithms, such as NIST and DIEHARD, are implemented to test and evaluate the randomness rates for quantum keys generation. After then, the initialized vector, which is the seed of the symmetric encryption algorithms, is established based on specific analysis to be a key for the algorithms. The paper utilizes the (BB84) quantum key distribution (QKD) protocol based on two different innovated modes, the raw and privacy modes.","PeriodicalId":383642,"journal":{"name":"2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128252359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}