• Title/Summary/Keyword: digital evidence

Search Result 492, Processing Time 0.027 seconds

A Secure Logging for Collection of Digital Evidences (디지털 증거 확보를 위한 안전한 로깅 방식 연구)

  • Shin, Weon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.7
    • /
    • pp.1610-1616
    • /
    • 2010
  • By analyzing logs in computer systems, we can find early various threats and discover answers to respond against them. Also logs can help to collect digital evidences for cybercrimes and to be legal effects for investigation. In this paper, we intend to develop a secure logging in computer systems. Therefore we propose a new secure logging scheme and improve it to apply various environments. The proposed scheme will helps to develop a better logging of collection for digital evidences in computer systems.

A Study on Comparison Analysis of Digital Forensic Technology for Preventing Information Leakage (정보유출 방지를 위한 디지털 포렌식 기술 비교분석 연구)

  • Park, Gwangmin;Hong, Seungwan;Kim, Jongpil;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.93-100
    • /
    • 2016
  • Important evidence or clue in general crime as well as crime relevant to computer has been discovered in digital devices including computer with advance of information technology and turning into a information-oriented society. A leakage of industrial technology and confidential business information is related to digital devices such as computer, smart phone, USB, etc. This paper deal with a current state and comparison analysis of digital forensic technology for developing way of forensic field, so we seek for method of preventing information leakage.

A New Logging Scheme in Smart Devices for Digital Evidences (스마트기기 사용 증거 확보를 위한 로깅 연구)

  • Shin, Weon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.4
    • /
    • pp.231-234
    • /
    • 2012
  • Logging is an important part of any secure computer system. By analyzing logs in computer systems, you can identify early various problems and detect intrusions by attackers. Also logs can use to collect digital evidences in smart devices and to be forensics value for cybercrime investigations. In this paper, we propose a new logging scheme for smart devices and improve it to apply various environments. The proposed scheme satisfies the requirements of logging for smart devices. Thus it will help to develop a better logging in smart devices for digital evidences.

File Signature's Automatic Calculation Algorithm Proposal for Digital Forensic

  • Jang, Eun-Jin;Shin, Seung-Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.118-123
    • /
    • 2021
  • Recently, digital crime is becoming more intelligent, and efficient digital forensic techniques are required to collect evidence for this. In the case of important files related to crime, a specific person may intentionally delete the file. In such a situation, data recovery is a very important procedure that can prove criminal charges. Although there are various methods to recover deleted files, we focuses on the recovery technique using HxD editor. When recovering a deleted file using the HxD editor, check the file structure and access the file data area through calculation. However, there is a possibility that errors such as arithmetic errors may occur when a file approach through calculation is used. Therefore, in this paper, we propose an algorithm that automatically calculates the header and footer of a file after checking the file signature in the root directory for efficient file recovery. If the algorithm proposed in this paper is used, it is expected that the error rate of arithmetic errors in the file recovery process can be reduced.

Block based Smart Carving System for Forgery Analysis and Fragmented File Identification

  • Lee, Hanseong;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.93-102
    • /
    • 2020
  • In order for data obtained through all stages of digital crime investigation to be recognized as evidence capability, it must satisfy legal / technical requirements. In this paper, we propose a mechanism and implement software to provide digital forensic evidence by automatically recovering files by scanning / inspecting the unallocated area inside the storage disk block without relying on information provided by the file system. The proposed technique checks / analyzes the RAW disk data of the system under analysis in 512-byte block units based on information on the storage format / file structure of various files stored on the disk without referring to the file system-related information provided by the operating system. The file carving process was implemented, and a smart carving mechanism was proposed to intelligently restore deleted or damaged files in the storage device. As a result, we have provided a block based smart carving method to intelligently identify fragmented and damaged files in storage efficiently for forgery analysis on digital forensic investigation.

Comparative Study of US and Korean Legal System on the Privilege against Self-Incrimination through Forced Unlocking in Digital Era (디지털시대 강제해독에 따른 자기부죄 거부 권리에 관한 미국과 한국의 제도 비교 연구)

  • Lee, Ook;Jee, Myung Keun;Lee, Dong Han
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.235-241
    • /
    • 2017
  • With the coming of the digital era, encryption has become common in everyday life. Almost anyone can easily acquire encryption software and use it to prevent unwanted third parties from accessing one's private information. However, the spread of encryption has also seriously hindered law enforcement during the investigation of cybercrimes, which hides incriminating digital evidence in encrypted hard drives and files. Therefore, many countries have attempted to compel criminals to decrypt encrypted evidence and it has been inevitable to examine privilege against self-incrimination as basic right on the side of constitution. This study analyzed the past court decisions on the issue of compelled decryption in the US and whether the Government can compel a defendant to disclose his password in Korean legal system on the constitutional side. Finally, this study suggests an approach to create a legal procedure to make it a crime for a suspect or defendant to refuse to disclose his password to law enforcement for criminal cases in Korea.

Meta Analysis on Digital Forensics Research Trends for Securing its Admissibility of Digital Evidence (디지털 증거능력 확보 강화를 위한 디지털 포렌식 연구동향 메타분석)

  • Ryu, Bora;Jeon, Minseo;Ji, Juyeon;Lee, Chanwoo;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.23-32
    • /
    • 2017
  • With the development of information and communication technology, various data including digital data have increased exponentially. In a society where such data utilization is generalized, criminal investigation processes and trial processes have also been influenced. However, in comparison with the progress of the technical capability and analytical capability of digital certification which is increasing exponentially, the establishment of the digital forensic related legal system is still in short supply. Therefore, it is necessary to activate balanced research for legal recognition of digital certification. Therefore, in this research, meta analysis was conducted to grasp trends of research related to digital forensics and to provide objective data for research revitalization.

Digital Forensic: Challenges and Solution in the Protection of Corporate Crime

  • CHOI, Do-Hee
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.6
    • /
    • pp.47-55
    • /
    • 2021
  • Purpose: Organizational crime is an offense committed by an individual or an official in a corporate entity for organizational gain. This study aims to explore the literature on challenges facing digital forensics and further discuss possible solutions to such challenges as far as the protection of corporate crime is concerned. Research design, data and methodology: Qualitative textual methodology matches the interpretative approach since it is a quality method meant to consider the inductivity of strategies. Also, a qualitative approach is vital because it is distinct from the techniques used in optimistic paradigms linked to science laws. Results: For achieving justice through the investigation of digital forensic, there is a need to eradicate corporate crimes. This study suggests several solutions to reduce corporate crime such as 'Solving a problem to Anti-forensic Techniques', 'Cloud computing technique', and 'Legal Framework' etc. Conclusion: As corporate crime increases in rate, the data collected by digital forensics increases. The challenge of analyzing chunks of data requires digital forensic experts, who need tools to analyze them. Research findings shows that a change of the operating system and digital evidence interpretation is becoming a challenge as the new computer application software is not compatible with older software's structure.

Analysis of Emotional Responses to Different Graphical Styles of Natural Scenery in Video Games (게임에서의 자연풍경의 그래픽 스타일 차이에 따른 감성 반응 분석)

  • Hansun Hong;Seongsu Kim;Minji Kang;Juyoung Lee
    • Journal of Environmental Science International
    • /
    • v.32 no.12
    • /
    • pp.979-985
    • /
    • 2023
  • After the outbreak of COVID-19, the demand for home-enjoyable video games has surged, driven by extended pandemic conditions and resulting in rapid graphic technology advancements. Consequently, games with diverse expression techniques have emerged, captivating players. Virtual Reality (VR) environments predominantly feature natural landscapes, with advancing graphic technology enabling lifelike scenes. The rise in individuals seeking solace through natural elements in games has followed suit. As VR technology and metaverse interest grow, more people are exposed to digital imagery. However, evidence on the influence of graphic expression methods on emotional response to that is lacking. Our study examined user emotional responses, focusing on natural landscapes in digital graphics of games. Analyzing a group of 47 young adults as frequent digital media consumers, we studied reactions to different image styles (Realism, Semi-Realism, Stylized). In the analysis, Realism-style images were perceived the most positively, while emotional responses to natural landscapes with different graphical expressions showed no significant differences. Results suggest that recognizing digital natural landscapes may outweigh expression style impacting the evaluation of digital nature. This study's empirical analysis enhances the understanding of digital nature's application to actual situations.

Analysis of the Anatomy of the Venae Comitantes Related to the Digital Artery (손가락동맥과 동반정맥 구조에 대한 해부학적 연구)

  • Choi, Hwan-Jun;Shim, Byung-Kwan;Kim, Cheol-Han;Tark, Min-Seong;Kim, Jun-Hyuk;Jung, Sung-Gyun;Lee, Young-Man
    • Archives of Plastic Surgery
    • /
    • v.37 no.2
    • /
    • pp.122-128
    • /
    • 2010
  • Purpose: Many descriptions of the digital arterial anatomy including skin territory of the finger have been published. Relatively few studies on venous architecture of the finger have been performed in this area, in part, attributable to the technical difficulties encountered in dissecting small vessels. The purpose of this study is to present the precise microsurgical anatomy of the vein related to the digital artery and venae comitantes of the components. Methods: Arterial and venous anatomy of their relation to the fingers were examined in 38 specimens of two fresh cadavers and 36 clinical cases. All specimens were evaluated grossly, surgical microscopically, or / and light microscopically to observe the three & two-dimensional structure of the artery and joining vein, evidence of the venae comitantes, and venous valve. Results: No longitudinal venae comitantes along the digital artery were found in any specimens. The size of the venae comitantes of each digital artery was much smaller than other vein, but always existed any level of digital artery. One or two venae comitantes in the digital artery ran spiral, oblique, helical, fibrillar, or irregular branched shape. The authors also found the vein of the finger, that had bicuspid valves, but not in venae comitantes. Conclusion: Recently, venous outflow problem rather than arterial circulation is the most common cause tissue failure after microvascular surgery in the hand. Sometimes, if it is not recognized early, there is an increased risk of tissue damage and loss. The authors concluded that this study presents a useful knowledge for the characterization of the venous structure and evidence for venae comitantes like a venule in the digital artery at varying levels of the finger.