Quantcast
Channel: Research – Forensic Focus – Articles
Browsing latest articles
Browse All 59 View Live

Image may be NSFW.
Clik here to view.

The Future of Mobile Forensics: November 2015 Follow-Up

by Oleg Afonin, Danil Nikolaev, Yuri Gubanov Mobile forensics is a moving target. In our recent article, “The Future of Mobile Forensics”, we described acquisition techniques that used to be...

View Article


Image may be NSFW.
Clik here to view.

SSD and eMMC Forensics 2016

What Has Changed in 2016 in the Way SSD Drives Self-Destruct Evidence. Demystifying eMMC, M.2, NVMe, and PCI-E. by Yuri Gubanov, Oleg Afonin © Belkasoft Research 2016 This publication continues the...

View Article


Image may be NSFW.
Clik here to view.

SSD and eMMC Forensics 2016 – Part 2

What Has Changed in 2016 in the Way SSD Drives Self-Destruct Evidence. Demystifying eMMC, M.2, NVMe, and PCI-E. by Yuri Gubanov, Oleg Afonin © Belkasoft Research 2016 In the first part of this article,...

View Article

Image may be NSFW.
Clik here to view.

SSD and eMMC Forensics 2016 – Part 3

What Has Changed in 2016 in the Way SSD Drives Self-Destruct Evidence: Demystifying eMMC, M.2, NVMe, and PCI-E. by Yuri Gubanov & Oleg Afonin © Belkasoft Research 2016 In the previous part of the...

View Article

Image may be NSFW.
Clik here to view.

Attributing A Third Party To A Recovered (Deleted) IOS SMS Message

In a recent forensic case involving recovered deleted sms messages from an sms.db file on an IOS mobile device none of the mainstream mobile phone forensic software made the link between sender and...

View Article


Image may be NSFW.
Clik here to view.

Who Is Spying On Android Users, Why Do They Do It And What Are They Doing...

If you’ve been following the news, you may already know about the many cases where companies, big and small, were caught spying on their users. It might appear that just about everyone making a phone...

View Article

Image may be NSFW.
Clik here to view.

How Do Criminals Communicate Online?

Flashpoint, a business intelligence agency specialising in the deep and dark web, recently published a report on the economy of criminal networks online. The report looks not only at where criminals go...

View Article

Image may be NSFW.
Clik here to view.

Classifying Illegal Activities On Tor Network Based On Web Textual Contents

by Mhd Wesam Al Nabki, Eduardo Fidalgo, Enrique Alegre & Ivan de Paz; Department of Electrical, Systems and Automation, University of Leon, Spain & INCIBE Spanish National Cybersecurity...

View Article


Image may be NSFW.
Clik here to view.

Evaluating Automated Facial Age Estimation Techniques For Digital Forensics

by Felix Anda, David Lillis, Nhien-An Le-Khac & Mark Scanlon Abstract In today’s world, closed circuit television, cellphone photographs and videos, open-source intelligence (i.e., social media/web...

View Article


Image may be NSFW.
Clik here to view.

Deep Learning At The Shallow End: Malware Classification For Non-Domain Experts

by Quan Le, Oisín Boydell, Brian Mac Namee & Mark Scanlon Abstract Current malware detection and classification approaches generally rely on time consuming and knowledge intensive processes to...

View Article

Image may be NSFW.
Clik here to view.

Electromagnetic Side-Channel A‚ttacks: Potential For Progressing Hindered...

by Asanka Sayakkara, Nhien-An Le-Khac & Mark Scanlon Abstract Digital forensics is a fast-growing €field involving the discovery and analysis of digital evidence acquired from electronic devices to...

View Article

Image may be NSFW.
Clik here to view.

Findings From The Forensic Focus 2018 Survey

Earlier this year, Forensic Focus conducted a survey of its members to find out a bit more about them, their roles in the industry, and common challenges facing digital forensic practitioners today....

View Article

Image may be NSFW.
Clik here to view.

Requirements In Digital Forensics Method Definition: Observations From A UK...

by Angus M. Marshall & Richard Paige Abstract During a project to examine the potential usefulness of evidence of tool verification as part of method validation for ISO 17025 accreditation, the...

View Article


Image may be NSFW.
Clik here to view.

Dissecting Malicious Network Traffic To Identify Botnet Communication

by Swasti Bhushan Deb Botnets are well-known in the domains of information security, digital forensics and incident response for hosting illegal data, launching DDOS attacks, stealing information,...

View Article

Opinion: When Digital Forensics Vendors Hire Research Talent, Where Does It...

by Christa Miller In the second half of 2019, a set of hirings made some waves in the digital forensics community. First, in July, Cellebrite hired well-known SANS Senior Instructor Heather Mahalik....

View Article

Browsing latest articles
Browse All 59 View Live