News Archives
Characterizing data deliverability of greedy routing in wireless sensor networks
November 30, 2015 · Publications
Summary: As a popular routing protocol in wireless sensor networks (WSNs), greedy routing has received great attention. The previous works characterize its data deliverability in WSNs by the probability of all nodes successfully sending their data to the base station. Their analysis, however, neither provides the information of the quantitative relation between successful data delivery
Towards a Feature Set for Classifying Malicious DLLs in Windows Memory
November 20, 2015 · Publications
Summary: Dynamic link library (DLL) injection is a method of forcing a running process to load a DLL into its address space. Malware authors use DLL injection to hide their code while it executes on a system. Due to the large number and variety of DLLs in modern Windows systems, distinguishing a malicious DLL from
A Collision Attack On Sdhash Similarity Hashing
September 30, 2015 · Publications
Summary: Digital forensic investigators can take advantage of tools and techniques that have the capability of finding similar files out of thousands of files up for investigation in a particular case. Finding similar files could significantly reduce the volume of data that needs to be investigated. Sdhash is a well-known fuzzy hashing scheme used for
Building a Successful Cyber-Security Program
June 3, 2015 · Publications
Summary: Many institutions today are interested in starting cyber-security programs. It is one of the hottest topics out there, and an increasing number of students are interested in studying cyber-security. This paper describes a recipe that can be used to build a successful cyber-security program, either from scratch or from a minimal capability that already
Management and Analysis of Multi Class Traffic in Single and Multi-band Systems
February 17, 2015 · Publications
Summary: A recent trend in Internet usage has seen large amounts of multimedia data due to increasingly large numbers of mobile users. To facilitate higher bandwidth, modern mobile routers are capable of supporting simultaneous multi-band, leading to less interference, higher capacity and better reliability. However, there exists neither previous work that attempts to maximize utilization
Forensic-Ready Secure iOS Apps for Jailbroken iPhones
January 27, 2015 · Publications
Summary: Apple iOS is one of the most popular smartphone operating systems, but it restricts the installation of apps that are not from the Apple App Store. As a result, users often jailbreak their iPhones to defeat this restriction. Jailbroken iPhones are making their way into enterprises that have a Bring Your Own Device (BYOD)
A Tool for Extracting Windows 8.X App Static and Volatile Forensic Artifacts
January 26, 2015 · Publications
Summary: Microsoft Windows 8 introduced lightweight sandboxed applications called “apps” that provide a full range of functionality on top of touch enabled displays. Apps offer a wide range of functionality, including media editing, file sharing, Internet surfing, cloud service usage, online social media activities and audio/video streaming for the Windows 8 and 8.1 operating systems.
The Basics of Digital Forensics (2nd Edition)
December 1, 2014 · Publications
Summary: The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS,
Building an Information Security Awareness Program
August 21, 2014 · Publications
Summary: The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization’s staff of the risk and educate them on how to protect your organization’s data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to build
Forensicloud: An Architecture for Digital Forensic Analysis in the Cloud
July 1, 2014 · Publications
Summary: The amount of data that must be processed in current digital forensic examinations continues to rise. Both the volume and diversity of data are obstacles to the timely completion of forensic investigations. Additionally, some law enforcement agencies do not have the resources to handle cases of even moderate size. To address these issues we