Now showing 1 - 10 of 25
  • Publication
    Forensic analysis of Exfat Artefacts
    (University College Dublin, 2018-05-23) ; ; ;
    Although keeping some basic concepts inherited from FAT32, the exFAT file system introduces many differences, such as the new mapping scheme of directory entries. The combination of exFAT mapping scheme with the allocation of bitmap files and the use of FAT leads to new forensic possibilities. The recovery of deleted files, including fragmented ones and carving becomes more accurate compared with former forensic processes. Nowadays, the accurate and sound forensic analysis is more than ever needed, as there is a high risk of erroneous interpretation. Indeed, most of the related work in the literature on exFAT structure and forensics, is mainly based on reverse engineering research, and only few of them cover the forensic interpretation. In this paper, we propose a new methodology using of exFAT file systems features to improve the interpretation of inactive entries by using bitmap file analysis and recover the file system metadata information for carved files. Experimental results show how our approach improves the forensic interpretation accuracy.
      219
  • Publication
    Forensics Acquisition Of Imvu: A Case Study
    (Association of Digital Forensics, Security and Law, 2015-11) ; ;
    There are many applications available for personal computers and mobile devices that facilitate users in meeting potential partners. There is, however, a risk associated with the level of anonymity on using instant message applications, because there exists the potential for predators to attract and lure vulnerable users. Today Instant Messaging within a Virtual Universe (IMVU) combines custom avatars, chat or instant message (IM), community, content creation, commerce, and anonymity. IMVU is also being exploited by criminals to commit a wide variety of offenses. However, there are very few researches on digital forensic acquisition of IMVU applications. In this paper, we discuss first of all on challenges of IMVU forensics. We present a forensic acquisition of an IMVU 3D application as a case study. We also describe and analyse our experiments with this application.
      835
  • Publication
    MPM Job Scheduling Problem: a bi-objective approach
    (United Kingdom Simulation Society, 2013-02) ; ;
    This paper presents a Recurrent Neural Network approach for the multi purpose machines Job Shop Scheduling Problem. This case of JSSP can be utilized for the modelling of project portfolio management besides the well known adoption in factory environment. Therefore, each project oriented organization develops a set of projects and it has to schedule them as a whole. In this work, we extended a bi-objective system model based on the JSSP modelling and formulate dit as a combination of two recurrent neural networks. In addition, we designed an example within its neural networks that are focused on the Make span and the Total Weighted Tardiness objectives. Moreover, we present the findings of our approach using a set of well known benchmark instances and the discussion about them and the singularity that arises
      178
  • Publication
    Forensic Analysis of Virtual Hard Drives
    (The Association of Digital Forensics, Security and Law, 2017-03-31) ; ;
    The issue of the volatility of virtual machines is perhaps the most pressing concern in any digital investigation involving a virtual machine. Current digital forensics tools do not fully address the complexities of data recovery that are posed by virtual hard drives. It is necessary, for this reason, to explore ways to capture evidence, other than those using current digital forensic methods. Data recovery should be done in the most efficient and secure manner, as quickly, and in an as non-intrusive way as can be achieved. All data in a virtual machine is disposed of when that virtual machine is destroyed, it may not therefore be possible to extract and preserve evidence such as incriminating images prior to destruction. Recovering that evidence, or finding some way of associating that evidence with the virtual machine before destruction of that virtual machine, is therefore crucial.In this paper we present a method for extracting evidence from a virtual hard disk drive in a quick, secure and verifiable manner, with a minimum impact on the drive thus preserving its integrity for further analysis.
      395
  • Publication
    Smartphone Forensic Analysis: A Case Study for Obtaining Root Access of an Android Samsung S3 Device and Analyse the Image without an Expensive Commercial Tool
    (Scientific Research Publishing, 2014) ; ;
    Smartphone is a very useful and compact device that fits in persons pocket, but at the same time itcan be used as a tool for criminal activities. In this day and age, people increasingly rely on smartphones rather than desktop computers or laptops to exchange messages, share videos and audiomessages. A smartphone is almost equivalent in its application to a PC, hence there are securityrisks associated with its use such as carrying out a digital crime or becoming a victim of one. Criminalscan use smartphones for a number of activities. Namely, committing a fraud over e-mail,harassment via text messages, drug trafficking, child pornography, communications related to narcotics,etc. It is a great challenge for forensic experts to extract data from a smartphone for forensic purposes that can be used as evidence in the court of law. In this case study, I show how to obtain the root access of Samsung S3 phone, how to create DD image and then how to examine DD image via commercial tool like UFED physical analyzer trial version which doesnt support Android devices. I will extract the messages for Viber on trial version of UFED Physical analyzer.
      1876
  • Publication
    Distributed Knowledge Map for Mining Data on Grid Platforms
    Recently, huge datasets representing different applications domains are produced and stored on distributed platforms. These datasets are, generally, owned by different organizations. As a consequence, The scale and distribution nature of these datasets have created the problem of efficient mining and management on these platforms. Most of the existing knowledge management approaches are mainly for centralized data mining. Few of them propose solutions for mining and handling knowledge on Grid. However, the new knowledge is stored and managed as any other kinds of resources.
      172
  • Publication
    Security Threats of URL Shortening: A Users Perspective
    (IACSIT Press, 2015-09) ;
    Short URLs have been used on the Internet for several years now and as time goes by new security threats are discovered in relation to their use (e.g. malware, phishing, spam). However, although current research in literature has compiled addressing the security threats when utilizing such types of URLs, no study approached the assessment of user confidence and user awareness regarding short URLs. Thus the aim of this paper is to cover the existing knowledge gap and to compile a baseline assessment on the frequency of use, user confidence and user awareness when utilizing short URLs. To do so, we have developed questionnaire connected to the previously mentioned aspects and which was applied to one hundred persons of various nationalities from within the European Union with various user experiences when it comes to the Internet and short URLs. The analysis of the replies received from the participants to the survey has revealed a general awareness that there are security risks associated with short URLs, a tendency of propagation of short URLs to other Internet services and platforms.
      2689
  • Publication
    Security Threats of URL Shortening: A User's Perspective
    Short URLs have been used on the Internet for several years now and as time goes by new security threats are discovered in relation to their use (e.g. malware, phishing, spam). However, although current research in literature has compiled addressing the security threats when utilizing such types of URLs, no study approached the assessment of user confidence and user awareness regarding short URLs. Thus the aim of this paper is to cover the existing knowledge gap and to compile a baseline assessment on the frequency of use, user confidence and user awareness when utilizing short URLs. To do so, we have developed questionnaire connected to the previously mentioned aspects and which was applied to one hundred persons of various nationalities from within the European Union with various user experiences when it comes to the Internet and short URLs. The analysis of the replies received from the participants to the survey has revealed a general awareness that there are security risks associated with short URLs, a tendency of propagation of short URLs to other Internet services and platforms.
      1581
  • Publication
    Reference Architecture for a Cloud Forensic Readiness System
    The Digital Forensic science is participating to a brand new change represented by the management of incidents in the Cloud Computing Services. Due that the Cloud Computing architecture is uncontrollable because of some specific features,its use to commit crimes is becoming a very critical issue, too. Proactive Cloud Forensics becomes a matter of urgency, due to its capability of collecting critical data before crimes happen, thus saving time and money for the subsequent investigations. In this paper, a proposal for a Cloud Forensic Readiness System is presented. It is conceived as reference architecture, in order to be of general applicability, not technically constrained by any Cloud architecture. The principal aim of this work is to extend our initial proposed Cloud Forensic Readiness System reference architecture, by providing more details and an example of its application by exploiting the Open Stack Cloud Platform.
      1821
  • Publication
    Segmentation of shoulder rehabilitation exercises for single and multiple inertial sensor systems
    Introduction:Digital home rehabilitation systems require accurate segmentation methods to provide appropriate feedback on repetition counting and exercise technique. Current segmentation methods are not suitable for clinical use; they are not highly accurate or require multiple sensors, which creates usability problems. We propose a model for accurately segmenting inertial measurement unit data for shoulder rehabilitation exercises. This study aims to use inertial measurement unit data to train and test a machine learning segmentation model for single- and multiple-inertial measurement unit systems and to identify the optimal single-sensor location. Methods:A focus group of specialist physiotherapists selected the exercises, which were performed by participants wearing inertial measurement units on the wrist, arm and scapula. We applied a novel machine learning based segmentation technique involving a convolutional classifier and Finite State Machine to the inertial measurement unit data. An accuracy score was calculated for each possible single- or multiple-sensor system. Results:The wrist inertial measurement unit was chosen as the optimal single-sensor location for future system development (mean overall accuracy 0.871). Flexion and abduction based exercises mostly could be segmented with high accuracy, but scapular movement exercises had poor accuracy. Conclusion:A wrist-worn single inertial measurement unit system can accurately segment shoulder exercise repetitions; however, accuracy varies depending on characteristics of the exercise.
      300