• Title/Summary/Keyword: forensic engineering

Search Result 238, Processing Time 0.032 seconds

Forensic Engineering Study on Damage Assessment of the Damage to the Internal Parts of a Vehicle Involved in a Fire Accident (차량 화재의 기계 부품 손상 평가에 관한 법공학적 연구)

  • Kim, Eui-Soo
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.34 no.3
    • /
    • pp.255-261
    • /
    • 2010
  • Forensic engineering is the area of expertise of those qualified to serve as engineering experts in courts of law or arbitration proceedings. Especially failure of internal parts during vehicle fire accidents causing injuries and damage to property almost always generates conflict between the automaker and customer. Hence, the investigation of such events generally involves an engineering analysis. One of the possible reasons for such accidents caused by vehicle fire is the failure of the piston and connecting rod. By formal inspections and engineering tests, this study shows the results of investigation and the cause of failure of the mechanical parts. For this purpose the failure mechanism is analyzed by using fractography methods and by applying an instrumented indentation technique to compare the material properties of the reference part with those of the malfunctioning part.

Web Log Scenario Make for Forensic (포렌식을 위한 웹로그 시나리오 작성 시스템)

  • Jang, Hae-Sook;Lee, Jin-Kwan;Lee, Jong-Chan;Park, Sang-Joon;Park, Ki-Hong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.01a
    • /
    • pp.303-305
    • /
    • 2011
  • 수많은 웹로그 히스토리의 자료에서 컴퓨터 사이버범죄에 대한 증거자료로 채택되기 위한 기술적인 웹 포렌식 자료의 추출에 사용되는 웹 포렌식 알고리즘은 필수적인 요소이다. 본 논문에서는 웹 로그 시나리오 작성을 제안하고 설계하여, 웹 포렌식을 통한 컴퓨터 사이버범죄에 대한 학문적 기술적 발전에 기여하고자 하는데 본 논문의 목적이 있다. 수많은 웹로그 자료에서 컴퓨터 사이버 범죄에 대한 증거 자료로 채택되기 위한 기술적인 웹 포렌식 자료의 추출에 사용되는 웹 로그 분석 알고리즘은 필수적인 요소이다. 본 논문에서는 웹 포렌식 알고리즘을 제안하고 설계하여, 실제 기업의 웹 서버 시스템에 제안한 알고리즘을 구현해 본다. 웹 서버에서 웹 로그 분석을 위해 사용한 웹 포렌식 알고리즘과 플로우를 설계하고 코딩을 통한 구현을 한다. 구현 결과 웹 포렌식을 통한 컴퓨터 사이버 범죄에 대한 학문적 기술적 발전에 기여하고자 하는데 본 논문의 목적이 있다.

  • PDF

Reliability-based Failure Cause Assessment of Collapsed Bridge during Construction

  • Cho, Hyo-Nam;Choi, Hyun-Ho;Lee, Sang-Yoon;Sun, Jong-Wan
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2003.05a
    • /
    • pp.181-186
    • /
    • 2003
  • There are many uncertainties in structural failures or structures, so probabilistic failure cause assessment should be performed in order to consider the uncertainties. However, in many cases of forensic engineering, the failure cause assessments are performed by deterministic approach though number of uncertainties are existed in the failures or structures. Thus, deterministic approach may have possibility for leading to unreasonable and unrealistic failure cause assessment due to ignorance of the uncertainties. Therefore, probabilistic approach is needed to complement the shortcoming of deterministic approach and to perform the more reasonable and realistic failure cause assessment. In this study, reliability-based failure cause assessment (reliability based forensic engineering) is performed, which can incorporate uncertainties in failures and structures. For more practical application, the modified ETA technique is proposed, which automatically generates the defected structural model, performs structural analysis and reliability analysis, and calculates the failure probabilities of the failure events and the occurrence probabilities of the failure scenarios. Also, for more precise reliability analysis, uncertainties are estimated more reasonably by using bayesian approach based on the experimental laboratory testing data in forensic report.

  • PDF

Study of the Fire Risk Caused by the Use of a Bimetal type Thermometer in the Drying Equipment (바이메탈식 온도센서를 적용한 건조설비에서의 화재 위험성 연구)

  • Park, Nam-Kyu;Kim, Jin-Pyo;Nam, Jung-Woo;Park, Jong-Taek;Song, Jae-Yong
    • Fire Science and Engineering
    • /
    • v.31 no.3
    • /
    • pp.73-78
    • /
    • 2017
  • In this paper, the fire risk using a bimetal type thermometer for construction installation is presented. Because construction equipment is used widely in the field and the site is exposed to explosions and fire by combustible gas or fume, strong restrictions on the structure and usage are applied. Moreover, the risk of fire increases as precise temperature measurements are poorly conducted via an inner temperature sensor inside construction furnace. Therefore, this paper presents the results of structural analysis of a bimetal temperature sensor which is used widely in construction installation and temperature measurement experiments relative to the material property of the target object. The results revealed the relatively precise temperature of the liquid object, whereas those of the gas and solid object showed a lower temperature compared to the real temperature. This shows that bimetal-type temperature sensor is more suitable for measuring a liquid state object than measuring a gas or solid state object.

Smart Phone Copyright Violation and Forensic Apply Method (Smart Phone 저작권 위반과 포렌식 적용 방안)

  • Yi, Jeong-Hoon;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2491-2496
    • /
    • 2010
  • Smart Phone with domestic demand increasing rapidly, the utilization of multimedia services have become diverse. Smart Phone users use the copyrighted multimedia contents illegally from hacking their Smart Phone with Jail Breaking and Rooting. Legal issues according to the Korea-U.S. FTA. and high relevance with crime as mobile communication terminal, the utilization of created and saved digital evidence is high, the mobile forensic evidence study is required. This paper studied method and notice of legal seizure and search assuming the Smart Phone copyright violation. Research the status of Smart Phone copyright violation and related violation by category as broadcasting, movies, music, e-book etc. Research the method of submit a report to the court by applying techniques to forensic. The results of this research will contribute to the provide of Smart Phone crime evidence and mobile forensic technology.

A Study on Extraction of Mobile Forensic Data and Integrity Proof (모바일 포렌식 자료의 추출과 무결성 입증 연구)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.177-185
    • /
    • 2007
  • Lately, it is a trend that diffusion of Mobile Information Appliance that do various function by development of IT technology. There is function that do more convenient and efficient exchange information and business using mobile phone that is Mobile Information Appliance, but disfunction that is utilized by pointed end engineering data leakage, individual's privacy infringement, threat, etc. relationship means to use mobile phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage point is lacking about crime who use this portable phone. It is known that this Digital Forensic field is Mobile Forensic. In this paper. We are verify about acquisition way of digital evidence that can happen in this treatise through mobile phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF

Integrity proof Method research in Mobile Forensic (모바일 포렌식 에서의 무결성 입증방안 연구)

  • Kim, Ki-Hwan;Shin, Young-Tae;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.37-46
    • /
    • 2007
  • Lately, is trend that diffusion of Mobile information appliance that do various function by development of IT technology is increasing much. There is function that do more convenient and efficient life and business using portable phone that is Daepyo?? of Mobile information appliance, but dysfunction that is utilized by Beopjoe of pointed end engineering data leakage, individual's privacy infringement, threat and threat etc. relationship means to use Mobile Phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage Point is lacking about crime who use this portable phone. It is known that this digital Forensic field is Mobile Forensic. Is purposeful to verify actually about acquisition way of digital evidence that can happen in this treatise through portable phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF

A Study evidence collection and analysis procedures for smartphone forensic (스마트폰 포렌식을 위한 증거수집 및 분석절차 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.463-466
    • /
    • 2012
  • Smartphones along with the development of crime evidence has been using smartphones. Phone's internal storage medium can be used as evidence in the case of images, video, phone, GPS information, there are Internet access and other data records. Therefore, these data to collect evidence of a systematic procedure for collecting and analyzing evidence is needed. In this paper, the target mobile phone forensics forensic evidence collection, evidence analysis, and reporting results to the procedures and how to draw. Through this paper, phone forensics and will serve as a basis for the investigation.

  • PDF

Development of Forensic Marking technology for tracing multiple users (다중 불법콘텐츠 복제자 추적 기술 개발)

  • Kim, Jong-An;Kim, Jin-Han;Kim, Jong-Heum
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.102-106
    • /
    • 2008
  • Forensic Marking is the technology that enables the service providers (SP) to identify the illegal digital contents distributors by first inserting markings (data indicating the user information and playback time) in realtime into the digital contents at time of playback of digital contents, and then later by extracting inserted markings from the contents which are illegally captured from the multimedia device such as IPTV STBs and distributed over the Internet. Digital Rights Management (DRM), which is a very popular content protection technology, has the security hole that can be vulnerable because the encrypted digital contents are transformed into their original plaintext forms after the decrypting process on the STBs. Therefore Forensic Marking (FM) has now become a companion content protection solution to DRM. This article describes a new way of tracking up to 4 illegal content users in FM implementation using the blue-difference chroma component of YCbCr color space. This FM technology has many advantages like fast processing time and easy portability to STB devices compared to that of the traditional watermarking processing in the frequency domain.

  • PDF

Extract of evidence on the IoT Device (IoT 단말기에서 증거추출 포렌식 연구)

  • Song, Jin-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.343-345
    • /
    • 2017
  • With the development of IoT technology, terminals connected with IoT are being used. However, security incidents are occurring as IoT is applied to society as a whole. IoT security incidents can be linked to personal risk and social disruption. In this study, we extract the evidence of security breach in IoT device. Analyze IoT security breach environment and extract Hashing function to secure original integrity and integrity. Then, the Forensic evidence is extracted from the IoT security device to verify the integrity of the original and Forensic reports should be written and studied to be used as legal evidence.

  • PDF