Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2015
…
4 pages
1 file
Abstract—Forensic analysis of a suspect program is a daily challenge encounters forensic analysts and law-enforcement. It requires determining the behavior of a suspect program found in a computer system subject to investigation and attempting to reconstruct actions that have been invoked in the system. In this research paper, a forensic analysis approach for suspect programs in an executable binary form is introduced. The proposed approach aims to reconstruct high level forensic actions and approximate action arguments from low level machine instructions; That is, reconstructed actions will assist in forensic inferences of evidence and traces caused by an action invocation in a system subject to forensics investigation.
2013 IEEE Security and Privacy Workshops, 2013
Forensic analysis of a suspect program is a daily challenge encounters forensic analysts and law-enforcement. It requires determining the behavior of a suspect program found in a computer system subject to investigation and attempting to reconstruct actions that have been invoked in the system. In this research paper, a forensic analysis approach for suspect programs in an executable binary form is introduced. The proposed approach aims to reconstruct high level forensic actions and approximate action arguments from low level machine instructions; That is, reconstructed actions will assist in forensic inferences of evidence and traces caused by an action invocation in a system subject to forensics investigation.
Criminals use computers and software to perform their crimes or to cover their misconducts. Main memory or RAM encompasses vibrant information about a system including its active processes. Program's variables data and value vary in their scope and duration in RAM. This paper exploits program's execution state and its dataflow to obtain evidence of the software usage. It extracts information left by program execution in support for legal actions against perpetrators. Our investigation model assumes no information is provided by the operating system; only raw RAM dumps. Our methodology employs information from the target program source code. This paper targets C programs that are used on Unix based systems. Several experiments are designed to show that scope and storage information of various source code variables can be used to identify program's activities. Results show that investigators have good chances locating various variables' values even after the process is stopped.
—The field of digital forensic analysis has emerged in the past two decades to counter the digital crimes and investigate the modus operandi of the culprits to secure the computer systems. With the advances in technologies and pervasive nature of the computing devices, the digital forensic analysis is becoming a challenging task. Due to ease of digital equipment and popularity of Internet, criminals have been enticed to carry out digital crimes. Digital forensic is aimed to investigate the criminal activity and bring the culprits to justice. Traditionally the static analysis is used to investigate about an incident but due to a lot of issues related the accuracy and authenticity of the static analysis, the live digital forensic analysis shows an investigator a more complete picture of memory dump. In this paper, we introduce a module for profiling behavior of application programs. Profiling of application is helpful in forensic analysis as one can easily analyze the compromised system. Profiling is also helpful to the investigator in conducting malware analysis as well as debugging a system. The concept of our model is to trace the unique process name, loaded services and called modules of the target system and store it in a database for future forensic and malware analysis. We used VMware workstation version 9.0 on Windows 7 platform so that we can get the detailed and clean image of the current state of the system. The profile of the target application includes the process name, modules and services which are specific to an application program.
Journal of Internet Technology and Secured Transaction, 2012
This paper presents the method of identifying and finding forensic evidence from the volatile memory of Windows computer systems. This is a scenario-based investigation on what amount of user input can be recovered when application is opened and images are captured at set interval while Windows system is still actively running. This approach of digital investigation revealed the extracted evidence of user input stored and as dispersed on the application memory of Windows system. In this experiment, the result shows a coherent view of user input on some commonly used applications with over 39% of user input stored on MS Access and 44% was stored on Excel. The quantitative assessment of user input will be presented on the basis of the repeated number of user input recovered, the percentage of user input found and the length of evidence found in a continuous block of the application memory.
Digital forensics is a major area where researches are still being conducted on a large-scale basis as the growth of computer-assisted crimes are innumerous and the fine-tuned approaches to investigate cybercrimes are still in its infancy. Related manuscripts were obtained from previously published literature which discusses about the challenges that exist within the domain, from the increasing volume of data to the varying technology platforms and systems that exist. We conducted an extensive study and found that the lack of effective evidence data acquisition methods because of diversity of technology and their deployment platforms and the lack of effective models to process large volumes of data to analyze are key limiting factors in this domain. This paper reviews the existing forensic models, defines cybercrime, focuses on challenges and move on to proposing an enhancement of cyber forensic approach which includes an operating system assisted profiling and evidence preserving using virtualized secure logging scheme which can be applied to majority of technology platforms
— This paper proposes an execution-based formal approach for digital forensic investigation. It considers an attack scenario as a sequence of legitimate and malicious actions. Using a library of potential hypotheses, a library of legitimate actions and a formal description of the system under investigation, our approach works by rebuilding the attack scenarios in forward and backward chaining manner. During reconstruction, malicious events are generated based on selected hypotheses. The execution graph is produced with an enhancement in states representation and hypotheses management. A case study on a compromised FTP server is provided to show how our method performs practically.
With only the binary executable of a program, it is useful to discover the program's data structures and infer their syntactic and semantic definitions. Such knowledge is highly valuable in a variety of security and forensic applications. Although there exist efforts in program data structure inference, the existing solutions are not suitable for our targeted application scenarios. In this paper, we propose a reverse engineering technique to automatically reveal program data structures from binaries. Our technique, called REWARDS, is based on dynamic analysis. More specifically, each memory location accessed by the program is tagged with a timestamped type attribute. Following the program's runtime data flow, this attribute is propagated to other memory locations and registers that share the same type. During the propagation, a variable's type gets resolved if it is involved in a type-revealing execution point or " type sink ". More importantly, besides the forward type propagation, REWARDS involves a backward type resolution procedure where the types of some previously accessed variables get recursively resolved starting from a type sink. This procedure is constrained by the timestamps of relevant memory locations to disambiguate variables re-using the same memory location. In addition, REWARDS is able to reconstruct in-memory data structure layout based on the type information derived. We demonstrate that REWARDS provides unique benefits to two applications: memory image forensics and binary fuzzing for vulnerability discovery.
Proceedings of the 2005 workshop on New security paradigms - NSPW '05, 2005
It is possible to enhance our understanding of what has happened on a computer system by using forensic techniques that do not require prediction of the nature of the attack, the skill of the attacker, or the details of the system resources or objects affected. These techniques address five fundamental principles of computer forensics. These principles include recording data about the entire operating system, particularly user space events and environments, and interpreting events at different layers of abstraction, aided by the context in which they occurred. They also deal with modeling the recorded data as a multi-resolution, finite state machine so that results can be established to a high degree of certainty rather than merely inferred.
ACM SIGOPS Operating …, 2008
Whether we accept it or not, computer systems and the op-erating systems that direct them are at the heart of major forms of malicious activity. Criminals can use computers as the actual target of their malicious activity (stealing funds electronically from a bank) or use ...
Equids and wheeled vehicles in the Ancient World, 2019
Louvain Studies, 2005
Methods, Mounds & Missions: New Contributions to Florida Archaeology, 2021
Social Sciences and Humanities Open , 2024
Journal of Business and Management Sciences, 2013
XVIème Congrès de l’AIPTLF, « Le Travail dans tous ses Etats », Université Catholique de Lille, 6-9 juillet 2010, Lille, en collaboration avec David Alis., 2010
Paleoanthropology, 2009
International Journal of Agricultural Economics, 2019
Journal of Wetland Archaeology, 2011
Clinical and Vaccine Immunology, 2006
Value in Health, 2016
Quality of Life Research, 2008
Life Sciences, 1983
European Journal of Physics, 2007