2011
DOI: 10.1007/978-3-642-19513-6_8
View full text | Cite
|
Sign up to set email alerts
|

Abstract: Abstract. This paper introduces a novel approach to user event reconstruction by showing the practicality of generating and implementing signature-based analysis methods to reconstruct high-level user actions from a collection of low-level traces found during a post-mortem forensic analysis of a system. Traditional forensic analysis and the inferences an investigator normally makes when given digital evidence, are examined. It is then demonstrated that this natural process of inferring high-level events from l… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 11 publications
(22 citation statements)
references
References 10 publications
(10 reference statements)
0
22
0
Order By: Relevance
“…Without naming it, James et al [12] adapt the concept of a fingerprint that is known from other areas of computer security. Fingerprints arise from side channels that transport typical information that may be useful to an attacker.…”
Section: B Related Workmentioning
confidence: 99%
“…He has shown that it is possible to tell if and when a folder was last copied even if the event took place weeks or even months prior to the investigation. James et al [12] generate timestamp signatures for identifying user activities in post mortem digital investigations. They focus on generating "signatures" for the startup process of different applications and created those signatures for the following three applications: Microsoft Internet Explorer, Mozilla Firefox and Microsoft MSN Messenger.…”
Section: B Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For each tested action, the results of each instance of the action were analyzed to determine trace category association [13] . This process consisted of comparing the trace time with the known execution time.…”
Section: Experimentationmentioning
confidence: 99%
“…Mohamad et al used markers and data structures for JPEG header detection [11]. James et al used signature-based analysis methods to reconstruct user event [12]. The aforementioned methods are invariably deployed at the application level.…”
Section: Internet Packet Flowmentioning
confidence: 99%