David Dampier News Archive
Summary: This chapter highlights significant research and challenges pertaining to the applicability of emerging predictive and prescriptive analytics solutions to achieve cyber resilience. It presents significant predictive and prescriptive analytics solutions for protecting the cyberinfrastructure supporting scientific research. The chapter discusses various predictive and prescriptive analytics techniques/algorithms that when combined effectively will aid in
Summary: Dynamic link library (DLL) injection is a method of forcing a running process to load a DLL into its address space. Malware authors use DLL injection to hide their code while it executes on a system. Due to the large number and variety of DLLs in modern Windows systems, distinguishing a malicious DLL from
Summary: Many institutions today are interested in starting cyber-security programs. It is one of the hottest topics out there, and an increasing number of students are interested in studying cyber-security. This paper describes a recipe that can be used to build a successful cyber-security program, either from scratch or from a minimal capability that already
Summary: The amount of data that must be processed in current digital forensic examinations continues to rise. Both the volume and diversity of data are obstacles to the timely completion of forensic investigations. Additionally, some law enforcement agencies do not have the resources to handle cases of even moderate size. To address these issues we
Summary: The shortage of women in science, technology, engineering, and mathematics (STEM) is well-documented. Many efforts address women’s low representation in fields such as computing target high school girls in an effort to solidify their commitment to these fields before they enter college and create computing “potential selves.” This paper describes one such effort in
Summary: The digital forensic process as traditionally laid out is very time intensive – it begins with the collection, duplication and authentication of every piece of digital media prior to examination. Digital triage, a process that takes place prior to this standard methodology, can be used to speed up the process and provide valuable intelligence
Summary: The digital forensic process as traditionally laid out begins with the collection, duplication, and authentication of every piece of digital media prior to examination. These first three phases of the digital forensic process are by far the most costly. However, complete forensic duplication is standard practice among digital forensic laboratories. The time it takes