The research reported in this paper introduces new techniques to aid in the identification of recovered notebook computers so they may be returned to the rightful owner. We identify non-volatile data storage areas as a means of facilitating the safe storing of computer identification information. A forensic proof of concept tool has been designed to test the feasibility of several storage locations identified within this work to hold the data needed to uniquely identify a computer. The tool was used to perform the creation and extraction of created information in order to allow the analysis of the non-volatile storage locations as valid storage areas capable of holding and preserving the data created within them. While the format of the inf...
Communication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protect...
The issue of the volatility of virtual machines is perhaps the most pressing concern in any digital ...
On Windows systems several identifiers are created when a USB device is plugged into a universal ser...
The LIARS tool was designed to enable identification, and potentially the return, to the rightful ow...
The LIARS tool was designed to enable identification, and potentially the return, to the rightful ow...
Current threats against typical computer systems demonstrate a need for forensic analysis of memory-...
Computer Forensics is the science of obtaining, preserving, documenting and presenting digital evide...
The recovery of digital evidence of crimes from storage media is an increasingly time consuming proc...
Forensic investigations of digital devices is generally conducted on a seized device in a secure env...
USB based memory storage devices are an easy means of collecting and storing both legitimate and unl...
Memory forensics is rapidly becoming a critical part of all digital forensic investigations. The val...
As the proliferation of digital computational systems continue to expand, increasingly complex techn...
Digital evidence is increasingly relied upon in computer forensic examinations and legal proceedings...
Current forensic tools for examination of embedded systems like mobile phones and PDAs mostly perfor...
Communication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protect...
The issue of the volatility of virtual machines is perhaps the most pressing concern in any digital ...
On Windows systems several identifiers are created when a USB device is plugged into a universal ser...
The LIARS tool was designed to enable identification, and potentially the return, to the rightful ow...
The LIARS tool was designed to enable identification, and potentially the return, to the rightful ow...
Current threats against typical computer systems demonstrate a need for forensic analysis of memory-...
Computer Forensics is the science of obtaining, preserving, documenting and presenting digital evide...
The recovery of digital evidence of crimes from storage media is an increasingly time consuming proc...
Forensic investigations of digital devices is generally conducted on a seized device in a secure env...
USB based memory storage devices are an easy means of collecting and storing both legitimate and unl...
Memory forensics is rapidly becoming a critical part of all digital forensic investigations. The val...
As the proliferation of digital computational systems continue to expand, increasingly complex techn...
Digital evidence is increasingly relied upon in computer forensic examinations and legal proceedings...
Current forensic tools for examination of embedded systems like mobile phones and PDAs mostly perfor...
Communication and whole-disk cryptosystems are on the verge of becoming mainstream tools for protect...
The issue of the volatility of virtual machines is perhaps the most pressing concern in any digital ...
On Windows systems several identifiers are created when a USB device is plugged into a universal ser...