• Title/Summary/Keyword: Forensic Tools

Search Result 73, Processing Time 0.021 seconds

A Study on the Risks of Technology Leakage Using Smartwatch and Its Countermeasures Focusing on Galaxy Watch (갤럭시 워치를 중심으로 본 스마트워치 활용 기술유출의 위험성 및 대응방안에 대한 연구)

  • Seungjae Jeon;Jaehyun Chung;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.893-906
    • /
    • 2023
  • Awareness that smartphones can be used as tools for criminal activity is prevalent in many organizations, but the functionally smartphone-like smartwatch's potential as a criminal tool is being overlooked. Considering this situation, this research verifies the possibility of information leakage through an insider's smartwatch in a situation where smartphones are controlled by security regulations and technologies, but smart watch are not. By analyzing information related application usage and Wi-Fi connection generated in the smartwatch during the verification process, forensic information and limitations are identified. Finally, this research proposes preventive methods to prepare for potential smartwatch-related crimes, and reconsiders awareness of the possibility of using smartwatches as criminal tools.

Applications of NMR spectroscopy based metabolomics: a review

  • Yoon, Dahye;Lee, Minji;Kim, Siwon;Kim, Suhkmann
    • Journal of the Korean Magnetic Resonance Society
    • /
    • v.17 no.1
    • /
    • pp.1-10
    • /
    • 2013
  • Metabolomics is the study which detects the changes of metabolites level. Metabolomics is a terminal view of the biological system. The end products of the metabolism, metabolites, reflect the responses to external environment. Therefore metabolomics gives the additional information about understanding the metabolic pathways. These metabolites can be used as biomarkers that indicate the disease or external stresses such as exposure to toxicant. Many kinds of biological samples are used in metabolomics, for example, cell, tissue, and bio fluids. NMR spectroscopy is one of the tools of metabolomics. NMR data are analyzed by multivariate statistical analysis and target profiling technique. Recently, NMR-based metabolomics is a growing field in various studies such as disease diagnosis, forensic science, and toxicity assessment.

Influence of reconstruction parameters of micro-computed tomography on the analysis of bone mineral density

  • Gaeta-Araujo, Hugo;Nascimento, Eduarda Helena Leandro;Brasil, Danieli Moura;Madlum, Daniela Verardi;Haiter-Neto, Francisco;Oliveira-Santos, Christiano
    • Imaging Science in Dentistry
    • /
    • v.50 no.2
    • /
    • pp.153-159
    • /
    • 2020
  • Purpose: This study was conducted evaluate the influence of reconstruction parameters of micro-computed tomography (micro-CT) images on bone mineral density (BMD) analyses. Materials and Methods: The sample consisted of micro-CT images of the maxillae of 5 Wistar rats, acquired using a SkyScan 1174 unit (Bruker, Kontich, Belgium). Each acquisition was reconstructed following the manufacturer's recommendations(standard protocol; SP) for the application of artifact correction tools(beam hardening correction [BHC], 45%; smoothing filter, degree 2; and ring artifact correction [RAC], level 5). Additionally, images were reconstructed with 36 protocols combining different settings of artifact correction tools (P0 to P35). BMD analysis was performed for each reconstructed image. The BMD values obtained for each protocol were compared to those obtained using the SP through repeated-measures analysis of variance with the Dunnett post hoc test(α=0.05). Results: The BMD values obtained from all protocols that used a BHC of 45% did not significantly differ from those obtained using the SP (P>0.05). The other protocols all yielded significantly different BMD values from the SP(P<0.05). The smoothing and RAC tools did not affect BMD values. Conclusion: BMD values measured on micro-CT images were influenced by the BHC level. Higher levels of BHC induced higher values of BMD.

A Study on Collection and Analysis of Collaboration Tool JANDI Artifacts in a Windows Environment (윈도우 환경에서의 협업 도구 잔디 아티팩트 수집 및 분석 연구)

  • Dabin We;Hangyeol Kim;Myungseo Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.5
    • /
    • pp.915-925
    • /
    • 2024
  • As non-face-to-face work increases due to the COVID-19 pandemic, companies have introduced collaboration tools to perform work without spatial constraints. The rapidly growing collaboration tool market continues to show high utilization rates even after the endemic due to the increase in demand for hybrid work that combines face-to-face and non-face-to-face work. The use of collaboration tools increases work efficiency, facilitates smooth collaboration, and increases data integration, generating various data. However, at the same time, it also increases the risk of exposure of corporate confidential information due to the possibility of external access by internal users. In response to this, an analysis method is needed to collect and acquire data during digital investigations targeting collaboration tools. In this paper, we identified local artifacts targeting JANDI, a collaboration tool in a Windows environment, and explained how to collect and analyze data through API reconstruction. Finally, we presented a digital forensic utilization method through scenario and chat room reconstruction.

Integrity verification of VM data collected in private cloud environment and reliability verification of related forensic tools (사설 클라우드 환경에서 수집된 VM 데이터의 무결성 입증과 관련 포렌식 도구의 신뢰성 검증)

  • Kim, Deunghwa;Jang, Sanghee;Park, Jungheum;Kang, Cheulhoon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.223-230
    • /
    • 2013
  • Recently, a large number of corporations are adopting cloud solution in order to reduce IT-related costs. By the way, Digital Trace should have admissibility to be accepted as digital evidence in court, and integrity is one of the factors for admissibility. In this context, this research implemented integrity verification test to VM Data which was collected by well-known private cloud solutions such as Citrix, VMware, and MS Hyper-V. This paper suggests the effective way to verify integrity of VM data collected in private cloud computing environment based on the experiment and introduces the error that EnCase fails to mount VHD (Virtual Hard Disk) files properly.

Digital Forensics: Review of Issues in Scientific Validation of Digital Evidence

  • Arshad, Humaira;Jantan, Aman Bin;Abiodun, Oludare Isaac
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.346-376
    • /
    • 2018
  • Digital forensics is a vital part of almost every criminal investigation given the amount of information available and the opportunities offered by electronic data to investigate and evidence a crime. However, in criminal justice proceedings, these electronic pieces of evidence are often considered with the utmost suspicion and uncertainty, although, on occasions are justifiable. Presently, the use of scientifically unproven forensic techniques are highly criticized in legal proceedings. Nevertheless, the exceedingly distinct and dynamic characteristics of electronic data, in addition to the current legislation and privacy laws remain as challenging aspects for systematically attesting evidence in a court of law. This article presents a comprehensive study to examine the issues that are considered essential to discuss and resolve, for the proper acceptance of evidence based on scientific grounds. Moreover, the article explains the state of forensics in emerging sub-fields of digital technology such as, cloud computing, social media, and the Internet of Things (IoT), and reviewing the challenges which may complicate the process of systematic validation of electronic evidence. The study further explores various solutions previously proposed, by researchers and academics, regarding their appropriateness based on their experimental evaluation. Additionally, this article suggests open research areas, highlighting many of the issues and problems associated with the empirical evaluation of these solutions for immediate attention by researchers and practitioners. Notably, academics must react to these challenges with appropriate emphasis on methodical verification. Therefore, for this purpose, the issues in the experiential validation of practices currently available are reviewed in this study. The review also discusses the struggle involved in demonstrating the reliability and validity of these approaches with contemporary evaluation methods. Furthermore, the development of best practices, reliable tools and the formulation of formal testing methods for digital forensic techniques are highlighted which could be extremely useful and of immense value to improve the trustworthiness of electronic evidence in legal proceedings.

Analysis Scheme on Backup Files of Samsung Smartphone available in Forensic (포렌식에서 활용 가능한 삼성 스마트폰 백업 파일 분석 기법)

  • Lee, Gyuwon;Hwang, Hyunuk;Kim, Kibom;Chang, Taejoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.349-356
    • /
    • 2013
  • As various features of the smartphone have been used, a lot of information have been stored in the smartphone, including the user's personal information. However, a frequent update of the operating system and applications may cause a loss of data and a risk of missing important personal data. Thus, the importance of data backup is significantly increasing. Many users employ the backup feature to store their data securely. However, in the point of forensic view these backup files are considered as important objects for investigation when issued hiding of smartphone or intentional deletion on data of smartphone. Therefore, in this paper we propose a scheme that analyze structure and restore data for Kies backup files of Samsung smartphone which has the highest share of the smartphone in the world. As the experimental results, the suggested scheme shows that the various types of files are analyzed and extracted from those backup files compared to other tools.

Janus - Multi Source Event Detection and Collection System for Effective Surveillance of Criminal Activity

  • Shahabi, Cyrus;Kim, Seon Ho;Nocera, Luciano;Constantinou, Giorgos;Lu, Ying;Cai, Yinghao;Medioni, Gerard;Nevatia, Ramakant;Banaei-Kashani, Farnoush
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.1-22
    • /
    • 2014
  • Recent technological advances provide the opportunity to use large amounts of multimedia data from a multitude of sensors with different modalities (e.g., video, text) for the detection and characterization of criminal activity. Their integration can compensate for sensor and modality deficiencies by using data from other available sensors and modalities. However, building such an integrated system at the scale of neighborhood and cities is challenging due to the large amount of data to be considered and the need to ensure a short response time to potential criminal activity. In this paper, we present a system that enables multi-modal data collection at scale and automates the detection of events of interest for the surveillance and reconnaissance of criminal activity. The proposed system showcases novel analytical tools that fuse multimedia data streams to automatically detect and identify specific criminal events and activities. More specifically, the system detects and analyzes series of incidents (an incident is an occurrence or artifact relevant to a criminal activity extracted from a single media stream) in the spatiotemporal domain to extract events (actual instances of criminal events) while cross-referencing multimodal media streams and incidents in time and space to provide a comprehensive view to a human operator while avoiding information overload. We present several case studies that demonstrate how the proposed system can provide law enforcement personnel with forensic and real time tools to identify and track potential criminal activity.

A Study on analysis tools in the SWF file URL (SWF 파일의 URL정보 분석도구)

  • Jang, Dong-Hwan;Song, Yu-Jin;Lee, Jae-Yong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.105-111
    • /
    • 2010
  • SWF(Shock Wave Flash) file is a format file for vector graphics produced by Adobe. It is widely used for a variety of contents such as advertising at websites, widgets, games, education, and videos and it contains various types of data such as sound sources, script, API and images. Many SWF files contain URL information on action script for communication in the network and they can be used as important research data as well as PC users' Web Browser history in terms of forensic investigation. And a decompiler for analyzing SWF files exists by which SWF files can be analysed and URL information can be verified. However, it takes a long time to verify the URL information on action scripts of multiple SWF files by the decompiler. In this paper, analysis of URL information on action scripts and extraction of URL information from multiple SWF files by designing analysis tools for URL information in SWF files is studied.

Research on Advanced Methods for Data Extraction from Corrupted OOXML Files (손상된 OOXML 파일에서의 데이터 추출 고도화 방안 연구)

  • Jiyun Kim;Minsoo Kim;Woobeen Park;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.193-206
    • /
    • 2024
  • In tandem with the advancements in the digital era, the significance of digital data has escalated, necessitating an increased focus on digital forensics investigations. However, the process of collecting and analyzing digital evidence faces significant challenges, such as the unidentifiability of damaged files due to issues like media corruption and anti-forensic techniques. Moreover, the technological limitations of existing tools hinder the recovery of damaged files, posing difficulties in the evidence collection process. This paper aims to propose solutions for the recovery of corrupted MS Office files commonly used in digital data creation. To achieve this, we analyze the structure of MS Office files in the OOXML format and present a novel approach to overcome the limitations of current recovery tools. Through these efforts, we aim to contribute to enhancing the quality of evidence collection in the field of digital forensics by efficiently recovering and identifying damaged data.