watching you watching us . .

Research Papers

{ in no particular order }

[Sylve2011] – Joe Sylve
Phishing Web-Based Email Services with HTML 5
Department of Computer Science, University of New Orleans, 11 May 2011

[Carrier2003] – Brian Carrier
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
International Journal of Digital Evidence, Volume 1, Issue 4, 2003

[Reith2002] – Mark Reith, Clint Carr, Gregg Gunsch
An Examination of Digital Forensic Models
International Journal of Digital Evidence, Volume 1, Issue 3, 2002

[Buskirk2006] – Eric Van Buskirk, Vincent T. Liu.
Digital Evidence: Challenging the Presumption of Reliability
Journal of Digital Forensic Practice, Volume 1, Issue 1, 2006

[Mislan2010] – Richard P. Mislan, Eoghan Casey, Gary C. Kessler.
The growing need for on-scene triage of mobile devices
Digital Investigation, Volume 6, p.112-124, 2010

[Wei2011] – Michael Wei, Laura M. Grupp, Frederick E. Spada, Steven Swanson.
Reliably Erasing Data From Flash-Based Solid State Drives
USENIX FAST 2011, 15-17 February 2011 – last access 16 March 2011

[Bell2010] – Graeme B. Bell, Richard Boddington
Solid State Drives: The Beginning of the End for Current Practice in Digital Forensic Recovery?
Journal of Digital Forensics, Security and Law, Volume 5, Number 3, 2010

[Breeusma2007] – Marcel Breeuwsma, Martien de Jongh, Coert Klaver, Ronald van der Knijff, Mark Roeloffs.
Forensic Data Recovery from Flash Memory
Small Scale Digital Device Forensics Journal, Volume 1, No. 1, June 2007

[Bang2011] – Jewan Bang, Byeongyeong Yoo, Sangjin Lee.
Analysis of Changes in File Time Attributes with File Manipulation
Digital Investigation, Volume 7, Issues 3-4, p.103-196, April 2011

[Berghel2007] – Berghel, H.
Hiding Data, Forensics and Anti-Forensics
Communications of the ACM, Vol.50, No.4, April 2007

[Bilby2006] – Bilby, D.
Low Down and Dirty: Anti-Forensics Rootkits
Black Hat Japan, 2006

[Burdach2006] Burdach., M.
Physical Memory Forensics
Black Hat USA, 2006

[Carrier2010] – Brian D. Carrier.
Different Interpretations of ISO9660 File Systems
Digital Investigation, Volume 7, Supplement 1, P.S1-S140, August 2010

[Carvey2004] – Carvey, H.
Hiding Data in a Live System
Black Hat USA, 2004

[Case2011] – Andrew Case
De-Anonymizing Live CDs through Physical Memory Analysis
Black Hat DC, 2011

[Dardick2007] – Dardick, G., et al
BLOGS: Anit-Forensics and Counter Anti-Forensics
Proceedings of The 5th Australian Digital Forensics Conference, p.203-207, 3 December 2007

[Denning1999] – Denning, D., Baugh., W.
Hiding Crimes in Cyberspace
Information, Communication and Society, Vol.2, No 3, Autumn 1999

[Garfinkel2007] – Garfinkel, S.
Anti-Forensics: Techniques, Detection and Countermeasures
2nd International Conference on Information Warfare and Security, 8-9 March 2007

[Geiger2005] – Geiger, M.
Evaluating Commercial Counter – Forensic Tools
Digital Forensic Research Workshop (DFRWS), 2005

[Grugq2005] – The Grugq
Modern Anti Forensics – A Systems Disruption Approach
SyscanHK, May 2005

[Grugq2005a] – The Grugq
The Art of Defiling: Defeating Forensic Analysis
Black Hat USA, Las Vegas, 23-28 July 2005

[Grugq2007] -The Grugq
Meta Anti-Forensics – The HASH Hacking Harness
Hack in the Box (HITB) 2007, 3-6 September 2007

[Gupta2006] – Gupta, M., et all
Hidden Disk Areas: HPA and DCO
International Journal of Digital Evidence, Volume 5, Issue 1, 2006.

[Harris2006] – Harris, R.
Arriving at an Anti-Forensics Consensus: Examining How to Define and Control the Anti-Forensics Problem
2006 Proceedings of the DFRWS, 14 August 2006.
Digital Investigation, Volume 3, Supplement 1, p.44-49, September 2006

[Jansen2009] – Jansen, W., Delaitre, A.
Mobile Forensic Reference Materials: A Methodology and Reification
Computer Security Division, NIST October 2009

[Kent2006] – Kent, K., et al
Guide to Integrating Forensic Techniques into Incident Response
NIST Special Publication 800-86, August 2006

[Kessler2007] – Kessler, G.
Anti-Forensics and the Digital Investigator
Proceedings of The 5th Australian Digital Forensics Conference, p5-11, 2007

[Liu2006] – Liu, V., Brown, F.
Bleeding Edge Anti-Forensics
InfoSecWorld 2006, May 2006

[NIST2006] – Kissel, R., et al
Guidelines for Media Sanitization
NIST Special Publication 800-88, September 2006

[Palmer2007] – Palmer, C., Stamos, A.
Vulnerabilities in Critical Evidence Collection
Black Hat USA, Las Vegas, 28 July – 2 August 2007

[Peron2005] – Peron, C., Legary, M.
Digital Anti-Forensics: Emerging Trends in data transformation
In Proceedings of 2005 E‑Crime and Computer Evidence Conference, 1 September 2005

[Rogers2005] – Rogers, M.
Lockheed Martin, 15 September 2005

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s