News Archives

Digital Forensics With the Accessdata Forensic Toolkit (FTK)
January 5, 2016 · Publications
Summary: Learn how to use AccessData’s Forensic Toolkit (FTK) while mastering the fundamentals of digital forensics: Digital Forensics with the AccessData Forensic Toolkit (FTK) provides a comprehensive review of essential digital forensics concepts and builds on this information to teach you how to conduct digital investigations with AccessData’s FTK―the industry-standard, court-accepted digital investigations platform. Part I
Digital Forensics: Threatscape and Best Practices
December 28, 2015 · Publications
Summary: Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, coherent overview of the threat landscape and what can
Google Hacking for Penetration Testers (3rd Edition)
December 16, 2015 · Publications
Summary: Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security
Characterizing data deliverability of greedy routing in wireless sensor networks
November 30, 2015 · Publications
Summary: As a popular routing protocol in wireless sensor networks (WSNs), greedy routing has received great attention. The previous works characterize its data deliverability in WSNs by the probability of all nodes successfully sending their data to the base station. Their analysis, however, neither provides the information of the quantitative relation between successful data delivery
Towards a Feature Set for Classifying Malicious DLLs in Windows Memory
November 20, 2015 · Publications
Summary: Dynamic link library (DLL) injection is a method of forcing a running process to load a DLL into its address space. Malware authors use DLL injection to hide their code while it executes on a system. Due to the large number and variety of DLLs in modern Windows systems, distinguishing a malicious DLL from
A Collision Attack On Sdhash Similarity Hashing
September 30, 2015 · Publications
Summary: Digital forensic investigators can take advantage of tools and techniques that have the capability of finding similar files out of thousands of files up for investigation in a particular case. Finding similar files could significantly reduce the volume of data that needs to be investigated. Sdhash is a well-known fuzzy hashing scheme used for
Building a Successful Cyber-Security Program
June 3, 2015 · Publications
Summary: Many institutions today are interested in starting cyber-security programs. It is one of the hottest topics out there, and an increasing number of students are interested in studying cyber-security. This paper describes a recipe that can be used to build a successful cyber-security program, either from scratch or from a minimal capability that already
Management and Analysis of Multi Class Traffic in Single and Multi-band Systems
February 17, 2015 · Publications
Summary: A recent trend in Internet usage has seen large amounts of multimedia data due to increasingly large numbers of mobile users. To facilitate higher bandwidth, modern mobile routers are capable of supporting simultaneous multi-band, leading to less interference, higher capacity and better reliability. However, there exists neither previous work that attempts to maximize utilization
Forensic-Ready Secure iOS Apps for Jailbroken iPhones
January 27, 2015 · Publications
Summary: Apple iOS is one of the most popular smartphone operating systems, but it restricts the installation of apps that are not from the Apple App Store. As a result, users often jailbreak their iPhones to defeat this restriction. Jailbroken iPhones are making their way into enterprises that have a Bring Your Own Device (BYOD)
A Tool for Extracting Windows 8.X App Static and Volatile Forensic Artifacts
January 26, 2015 · Publications
Summary: Microsoft Windows 8 introduced lightweight sandboxed applications called “apps” that provide a full range of functionality on top of touch enabled displays. Apps offer a wide range of functionality, including media editing, file sharing, Internet surfing, cloud service usage, online social media activities and audio/video streaming for the Windows 8 and 8.1 operating systems.