Abstract—To improve the user's experience, almost all applications save usage data: web browsers save history and cookies, chat programs save message archives and so on. However, this data can be confidential and may compromise the user's privacy. There are third party solutions to automatically detect and wipe these traces, but they have two problems: they need a constantly updated database of files to target, and they wipe the data after it has been written to the disk. Our proposed solution does not need a database and it automatically reverts the application to its initial (clean) state, leaving no traces behind. This is done by using a monitoring process developed by us and the Volume Shadow Copy Service that takes snapshots ...
We present PORT, a software platform for local data extraction and analysis of digital trace data. W...
Pandemic and infectious disease outbreaks put pressure on health authorities and require lockdowns. ...
An analysis of the privacy of contact tracing apps was performed with the intent of creating a metri...
Abstract—Virtualization has been widely adopted in recent years in the cloud computing platform to i...
Increasing research in ubiquitous computing techniques towards the development of an Ambient Intelli...
We present PORT, a software platform for local data extraction and analysis of digital trace data. W...
International audienceWe propose a technique to collect use traces in any existing applica-tion, wit...
A Virtual Machine (VM) based secure Portable Execution Environment (PEE) provides a safe and secure ...
Hypervisors are increasingly utilized in modern computer systems, ranging from PCs to web servers an...
Sandbox applications can be used as anti-forensics techniques to hide important evidence in the digi...
This paper will discuss and analyse the different methods of wiping media to make them forensically ...
One area of particular concern for computer forensics examiners involves situations in which someone...
This paper will discuss and analyse the different methods of wiping media to make them forensically ...
The success of cloud computing leads to large, centralized collections of virtual machine (VM) image...
Many of the applications proposed for intelligent transportation systems (ITS) need to process and c...
We present PORT, a software platform for local data extraction and analysis of digital trace data. W...
Pandemic and infectious disease outbreaks put pressure on health authorities and require lockdowns. ...
An analysis of the privacy of contact tracing apps was performed with the intent of creating a metri...
Abstract—Virtualization has been widely adopted in recent years in the cloud computing platform to i...
Increasing research in ubiquitous computing techniques towards the development of an Ambient Intelli...
We present PORT, a software platform for local data extraction and analysis of digital trace data. W...
International audienceWe propose a technique to collect use traces in any existing applica-tion, wit...
A Virtual Machine (VM) based secure Portable Execution Environment (PEE) provides a safe and secure ...
Hypervisors are increasingly utilized in modern computer systems, ranging from PCs to web servers an...
Sandbox applications can be used as anti-forensics techniques to hide important evidence in the digi...
This paper will discuss and analyse the different methods of wiping media to make them forensically ...
One area of particular concern for computer forensics examiners involves situations in which someone...
This paper will discuss and analyse the different methods of wiping media to make them forensically ...
The success of cloud computing leads to large, centralized collections of virtual machine (VM) image...
Many of the applications proposed for intelligent transportation systems (ITS) need to process and c...
We present PORT, a software platform for local data extraction and analysis of digital trace data. W...
Pandemic and infectious disease outbreaks put pressure on health authorities and require lockdowns. ...
An analysis of the privacy of contact tracing apps was performed with the intent of creating a metri...