• Title/Summary/Keyword: forensic technology

Search Result 305, Processing Time 0.029 seconds

A Study on Extraction of Mobile Forensic Data and Integrity Proof (모바일 포렌식 자료의 추출과 무결성 입증 연구)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.177-185
    • /
    • 2007
  • Lately, it is a trend that diffusion of Mobile Information Appliance that do various function by development of IT technology. There is function that do more convenient and efficient exchange information and business using mobile phone that is Mobile Information Appliance, but disfunction that is utilized by pointed end engineering data leakage, individual's privacy infringement, threat, etc. relationship means to use mobile phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage point is lacking about crime who use this portable phone. It is known that this Digital Forensic field is Mobile Forensic. In this paper. We are verify about acquisition way of digital evidence that can happen in this treatise through mobile phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF

Integrity proof Method research in Mobile Forensic (모바일 포렌식 에서의 무결성 입증방안 연구)

  • Kim, Ki-Hwan;Shin, Young-Tae;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.37-46
    • /
    • 2007
  • Lately, is trend that diffusion of Mobile information appliance that do various function by development of IT technology is increasing much. There is function that do more convenient and efficient life and business using portable phone that is Daepyo?? of Mobile information appliance, but dysfunction that is utilized by Beopjoe of pointed end engineering data leakage, individual's privacy infringement, threat and threat etc. relationship means to use Mobile Phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage Point is lacking about crime who use this portable phone. It is known that this digital Forensic field is Mobile Forensic. Is purposeful to verify actually about acquisition way of digital evidence that can happen in this treatise through portable phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF

Enhancement of bloodstain on the dark or multi-colored surfaces by using the acidic hydrogen peroxide (Acidic hydrogen peroxide를 이용한 어둡거나 다양한 색상의 표면에 부착된 혈흔의 증강)

  • Sungwook Hong;Wonyoung Lee;Jaeyoung Byeon;Hyunju Shin;Jaeuk Ha
    • Analytical Science and Technology
    • /
    • v.36 no.3
    • /
    • pp.121-127
    • /
    • 2023
  • The detection of blood at a crime scene is an important process for identification and case reconstruction. However, blood may be difficult to observe with the naked eye on dark or multi-colored surfaces. Acidic hydrogen peroxide (AHP) is a recently reported blood enhancement reagent that can enhance blood with high sensitivity by increasing the exposure time of the camera. However, it has never been compared to previously known techniques on dark or multi-colored surfaces. For this purpose, the method of observation/photographing (UV and IR photography), alginate casting, leuco rhodamine 6G (LR6G), and AHP were applied to bloody impression on dark or multi-colored surfaces and the results were compared. As a result, blood treated with AHP had a higher contrast to the surfaces than UV and IR photography, and it was applicable on all surfaces, opposed to alginate casting. In addition, AHP successfully enhanced blood on dark or multi-colored surfaces, similar to LR6G.

Comparison of pigment in automotive solid color paints by FT-IR and XRF spectroscopy for forensic aspect (법과학적 관점에서 FT-IR과 XRF를 이용한 단색 페인트의 안료 비교)

  • Park, Ha-Sun;Kim, Ki-Wook;Heo, Sangcheol;Ryu, Seung-Jin;Lee, Hyunik;Min, Ji-Sook
    • Analytical Science and Technology
    • /
    • v.26 no.4
    • /
    • pp.245-255
    • /
    • 2013
  • Identification of paint on victim's clothing and a vehicle are valuable for forensic examination when investigating hit-and-run accidents. Automotive paints on clothes are used to prove a victim caused by traffic accident and to identify a suspected vehicle. The comparison of transferred paints between victim's vehicle and suspected vehicle can be an important evidence in reconstructing the accident situation and in discovering the truth. The paints such as white, yellow, red, blue, or black are hard to examine particle shape under a stereomicroscope because of it is not included aluminum, pearl, and mica flakes in the pigments. The aim of this study under forensic aspect is to compare pigment among basecoat layers of solid paints by identifying inorganic elemental compositions and binder resins of pigments using by micro-FT-IR and micro-XRF spectrometer. The pigment samples were analyzed by using two methods of FT-IR: Reflectance and ATR method. Two methods of FT-IR were useful in discriminating binder resins of pigments by comparing characteristic peaks and patterns of spectra. Also, XRF spectrometer could identify the elemental compositions in inorganic pigments of trace paints which are difficult to compare the identification by FT-IR.

Forensic Evidence of Search and Seized Android and Windows Mobile Smart Phone (압수 수색된 안드로이드와 윈도우모바일 스마트폰의 포렌식 증거 자료)

  • Yoon, Kyung-Bae;Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.2
    • /
    • pp.323-331
    • /
    • 2013
  • There are three ways how to extract forensic evidence from mobile phone, such as SYN, JTAG, Revolving. However, it should be a different way to extract forensic evidence due to the differences of their usage and technology between them(mobile phone and smart phone). Therefore, in this paper, I will come up with extraction method that forensics evidence by search and seizure of a smart phone. This study aims to analyze specifications and O.S., backup analysis, evidence in smart to analyze for search and seizure of a smart phone commonly used google android and windows mobile smart phone. This study also aim to extract forensics evidence related to google android and phone book, SMS, photos, video of window mobile smart phone to make legal evidence and forensics report. It is expected that this study on smart phone forensics technology will contribute to developing mobile forensics technology.

Study on advanced analysis method based on timeline chart for Digital Forensic Investigation (타임라인 분석 기법을 이용한 디지털 증거 분석 방법론)

  • Lee, Keun-Gi;Hwang, Seong-Jin;Lee, Chang-Hoon;Lee, Sang-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.1
    • /
    • pp.50-55
    • /
    • 2014
  • Recently, importance of digital forensics has increased and using analysis methods of digital evidence in the analysis of evidence of various types. However, analysis time and effort is steadily increasing because personal disk capacity is too big and it has many number of files. Most digital evidence has time property, such as access time, creation time, and modification time. These time information of digital evidence is one of most important factors in the digital forensic area. But if digital examiner simply analyze based on binary source only, it is possible to have wrong result because time has various types. In this paper, we classify various type of time in the digital evidence and describe advanced analysis method based on timeline chart for digital forensic investigation.

Effect of Hydrogen on Dezincification of Cu-Zn Brass (Cu-Zn 황동에서 수소가 탈아연 부식에 미치는 영향)

  • Choe, Byung Hak;Lee, Bum Gyu;Jang, Hyeon Su;Jeon, Woo Il;Park, Yong Sung;Lim, Jae Kyun;Lee, Jin Hee;Park, Chan Sung;Kim, Jin Pyo
    • Korean Journal of Materials Research
    • /
    • v.27 no.3
    • /
    • pp.172-178
    • /
    • 2017
  • The aim of this study is to consider the effect hydrogen on dezincification behavior of Cu-Zn alloys. The investigations include microstructural observations with scanning electron microscope and chemical composition analysis with energy dispersive spectrometer. The dezincification layer was found to occur in high pressure hydrogen atmosphere, not in air atmosphere. In addition, the layers penetrated into the inner side along the grain boundaries in the case of hydrogen condition. The shape of the dezincification layers was porous because of Zn dissolution from the ${\alpha}$ or ${\beta}$ phase. In the case of stress corrosion cracks formed in the Cu-Zn microstructure, the dezincification phenomenon with porous voids was also accompanied by grain boundary cracking.

Procedures of Coping with Each Type of Infringement using Live Forensic Technology (활성 포렌식 기술을 활용한 피해 유형별 침해사고 대응 절차 연구)

  • Yoon, Ju Hee;Kim, Mi Sun;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.69-78
    • /
    • 2016
  • As the development as the IT society accelerates, the frequency of terrorism from malignant codes and other cyber crimes is increasing. Malignant codes show various forms of attack according to the intentions of the attacker, and leaves behind digital evidences, not analog evidences when damages occur. Digital forensic, the procedure of collecting and analyzing digital evidence is one of the main factors that must be carried out when damages from malignant codes arise. However, there are the difficulties of not being able to preserve the integrity and authenticity in the procedure of coping witht infringements, which must be maintained in the digital forensic procedure. To complement such problems, this paper suggests the method of applying forensic by identifying the malignant code infringement incidents according to the type of damages.

Forensic Body Fluid Identification by Analysis of Multiple RNA Markers Using NanoString Technology

  • Park, Jong-Lyul;Park, Seong-Min;Kim, Jeong-Hwan;Lee, Han-Chul;Lee, Seung-Hwan;Woo, Kwang-Man;Kim, Seon-Young
    • Genomics & Informatics
    • /
    • v.11 no.4
    • /
    • pp.277-281
    • /
    • 2013
  • RNA analysis has become a reliable method of body fluid identification for forensic use. Previously, we developed a combination of four multiplex quantitative PCR (qRT-PCR) probes to discriminate four different body fluids (blood, semen, saliva, and vaginal secretion). While those makers successfully identified most body fluid samples, there were some cases of false positive and negative identification. To improve the accuracy of the identification further, we tried to use multiple markers per body fluid and adopted the NanoString nCounter system instead of a multiplex qRT-PCR system. After measuring tens of RNA markers, we evaluated the accuracy of each marker for body fluid identification. For body fluids, such as blood and semen, each body fluid-specific marker was accurate enough for perfect identification. However, for saliva and vaginal secretion, no single marker was perfect. Thus, we designed a logistic regression model with multiple markers for saliva and vaginal secretion and achieved almost perfect identification. In conclusion, the NanoString nCounter is an efficient platform for measuring multiple RNA markers per body fluid and will be useful for forensic RNA analysis.

Extract of evidence on the IoT Device (IoT 단말기에서 증거추출 포렌식 연구)

  • Song, Jin-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.343-345
    • /
    • 2017
  • With the development of IoT technology, terminals connected with IoT are being used. However, security incidents are occurring as IoT is applied to society as a whole. IoT security incidents can be linked to personal risk and social disruption. In this study, we extract the evidence of security breach in IoT device. Analyze IoT security breach environment and extract Hashing function to secure original integrity and integrity. Then, the Forensic evidence is extracted from the IoT security device to verify the integrity of the original and Forensic reports should be written and studied to be used as legal evidence.

  • PDF