AbstractIn this primary work we call for the importance of integrating security testing into the process of testing digital forensic tools. We postulate that digital forensic tools are increasing in features (such as network imaging), becoming networkable, and are being proposed as forensic cloud services. This raises the need for testing the security of these tools, especially since digital evidence integrity is of paramount importance. At the time of conducting this work, little to no published anti-forensic research had focused on attacks against the forensic tools/process. We used the TD3, a popular, validated, touch screen disk duplicator and hardware write blocker with networking capabilities and designed an attack that corrupted the ...
Digital evidence is increasingly relied upon in computer forensic examinations and legal proceedings...
The rise of computer use and technical adeptness by the general public in the last two decades are u...
Flash and USB portable drives are now in common place use in computing environments. The U3 smart dr...
In this primary work we call for the importance of integrating security testing into the process of ...
AbstractIn this primary work we call for the importance of integrating security testing into the pro...
The Sixth International Conference on Innovative Computing Technology (INTECH 2016), Irish Computer ...
Best practices in digital forensics demand the use of write-blockers when creating forensic images o...
Information technology systems are attacked by offenders using digital devices and networks to facil...
The term digital forensics was first coined as a synonym for computer forensics. Since then, it hase...
The area of digital forensics might be old but the idea that criminals or other organisations are ac...
AbstractAnti-forensic tools, techniques and methods are becoming a formidable obstacle for the digit...
There are an abundance of measures available to the standard digital device users which provide the ...
Anti-forensic tools, techniques and methods are becoming a formidable obstacle for the digital foren...
Computer crimes have become very complex in terms of investigation and prosecution. This is mainly b...
Finding, acquiring, processing, analyzing, and reporting data on electronically stored data is the m...
Digital evidence is increasingly relied upon in computer forensic examinations and legal proceedings...
The rise of computer use and technical adeptness by the general public in the last two decades are u...
Flash and USB portable drives are now in common place use in computing environments. The U3 smart dr...
In this primary work we call for the importance of integrating security testing into the process of ...
AbstractIn this primary work we call for the importance of integrating security testing into the pro...
The Sixth International Conference on Innovative Computing Technology (INTECH 2016), Irish Computer ...
Best practices in digital forensics demand the use of write-blockers when creating forensic images o...
Information technology systems are attacked by offenders using digital devices and networks to facil...
The term digital forensics was first coined as a synonym for computer forensics. Since then, it hase...
The area of digital forensics might be old but the idea that criminals or other organisations are ac...
AbstractAnti-forensic tools, techniques and methods are becoming a formidable obstacle for the digit...
There are an abundance of measures available to the standard digital device users which provide the ...
Anti-forensic tools, techniques and methods are becoming a formidable obstacle for the digital foren...
Computer crimes have become very complex in terms of investigation and prosecution. This is mainly b...
Finding, acquiring, processing, analyzing, and reporting data on electronically stored data is the m...
Digital evidence is increasingly relied upon in computer forensic examinations and legal proceedings...
The rise of computer use and technical adeptness by the general public in the last two decades are u...
Flash and USB portable drives are now in common place use in computing environments. The U3 smart dr...