1,401 research outputs found
Investigating visualisation techniques for rapid triage of digital forensic evidence
This study investigates the feasibility of a tool that allows digital forensics (DF) investigators to efficiently triage device datasets during the collection phase of an investigation. This tool utilises data visualisation techniques to display images found in near real-time to the end user. Findings indicate that participants were able to accurately identify contraband material whilst using this tool, however, classification accuracy dropped slightly with larger datasets. Combined with participant feedback, the results show that the proposed triage method is indeed feasible, and this tool provides a solid foundation for the continuation of further work
Identifying Trace Evidence from Target-Specific Data Wiping Application Software
One area of particular concern for computer forensics examiners involves situations in which someone utilized software applications to destroy evidence. There are products available in the marketplace that are relatively inexpensive and advertised as being able to destroy targeted portions of data stored within a computer system. This study was undertaken to analyze a subset of these tools in order to identify trace evidence, if any, left behind on disk media after executing these applications. We evaluated five Windows 7 compatible software products whose advertised features include the ability for users to wipe targeted files, folders, or evidence of selected activities. We conducted a series of experiments that involved executing each application on systems with identical data, and we then analyzed the results and compared the before and after images for each application. We identified information for each application that is beneficial to forensics examiners when faced with similar situations. This paper describes our application selection process, our application evaluation methodology, and our findings, including the variability of the effects of these tools. Following this, we describe limitations of this study and suggest areas of additional research that will benefit the study of digital forensics. --from articl
Identifying Trace Evidence from Target-Specific Data Wiping Application Software
One area of particular concern for computer forensics examiners involves situations in which someone utilized software applications to destroy evidence. There are products available in the marketplace that are relatively inexpensive and advertised as being able to destroy targeted portions of data stored within a computer system. This study was undertaken to analyze a subset of these tools in order to identify trace evidence, if any, left behind on disk media after executing these applications. We evaluated five Windows 7 compatible software products whose advertised features include the ability for users to wipe targeted files, folders, or evidence of selected activities. We conducted a series of experiments that involved executing each application on systems with identical data, and we then analyzed the results and compared the before and after images for each application. We identified information for each application that is beneficial to forensics examiners when faced with similar situations. This paper describes our application selection process, our application evaluation methodology, and our findings, including the variability of the effects of these tools. Following this, we describe limitations of this study and suggest areas of additional research that will benefit the study of digital forensics. --from articl
Identifying Trace Evidence from Target-Specific Data Wiping Application Software
One area of particular concern for computer forensics examiners involves situations in which someone utilized software applications to destroy evidence. There are products available in the marketplace that are relatively inexpensive and advertised as being able to destroy targeted portions of data stored within a computer system. This study was undertaken to analyze a subset of these tools in order to identify trace evidence, if any, left behind on disk media after executing these applications. We evaluated five Windows 7 compatible software products whose advertised features include the ability for users to wipe targeted files, folders, or evidence of selected activities. We conducted a series of experiments that involved executing each application on systems with identical data, and we then analyzed the results and compared the before and after images for each application. We identified information for each application that is beneficial to forensics examiners when faced with similar situations. This paper describes our application selection process, our application evaluation methodology, and our findings, including the variability of the effects of these tools. Following this, we describe limitations of this study and suggest areas of additional research that will benefit the study of digital forensics
Climate Dynamics: A Network-Based Approach for the Analysis of Global Precipitation
Precipitation is one of the most important meteorological variables for defining the climate dynamics, but the spatial patterns of precipitation have not been fully investigated yet. The complex network theory, which provides a robust tool to investigate the statistical interdependence of many interacting elements, is used here to analyze the spatial dynamics of annual precipitation over seventy years (1941-2010). The precipitation network is built associating a node to a geographical region, which has a temporal distribution of precipitation, and identifying possible links among nodes through the correlation function. The precipitation network reveals significant spatial variability with barely connected regions, as Eastern China and Japan, and highly connected regions, such as the African Sahel, Eastern Australia and, to a lesser extent, Northern Europe. Sahel and Eastern Australia are remarkably dry regions, where low amounts of rainfall are uniformly distributed on continental scales and small-scale extreme events are rare. As a consequence, the precipitation gradient is low, making these regions well connected on a large spatial scale. On the contrary, the Asiatic South-East is often reached by extreme events such as monsoons, tropical cyclones and heat waves, which can all contribute to reduce the correlation to the short-range scale only. Some patterns emerging between mid-latitude and tropical regions suggest a possible impact of the propagation of planetary waves on precipitation at a global scale. Other links can be qualitatively associated to the atmospheric and oceanic circulation. To analyze the sensitivity of the network to the physical closeness of the nodes, short-term connections are broken. The African Sahel, Eastern Australia and Northern Europe regions again appear as the supernodes of the network, confirming furthermore their long-range connection structure. Almost all North-American and Asian nodes vanish, revealing that extreme events can enhance high precipitation gradients, leading to a systematic absence of long-range patterns
Improved TPB-coated Light Guides for Liquid Argon TPC Light Detection Systems
Scintillation light produced in liquid argon (LAr) must be shifted from 128
nm to visible wavelengths in light detection systems used for liquid argon
time-projection chambers (LArTPCs). To date, LArTPC light collection systems
have employed tetraphenyl butadiene (TPB) coatings on photomultiplier tubes
(PMTs) or plates placed in front of the PMTs. Recently, a new approach using
TPB-coated light guides was proposed. In this paper, we report on light guides
with improved attenuation lengths above 100 cm when measured in air. This is an
important step in the development of meter-scale light guides for future
LArTPCs. Improvements come from using a new acrylic-based coating,
diamond-polished cast UV transmitting acrylic bars, and a hand-dipping
technique to coat the bars. We discuss a model for connecting bar response in
air to response in liquid argon and compare this to data taken in liquid argon.
The good agreement between the prediction of the model and the measured
response in liquid argon demonstrates that characterization in air is
sufficient for quality control of bar production. This model can be used in
simulations of light guides for future experiments.Comment: 25 pages, 20 figure
The evidence for and against astronomical impacts on climate change and mass extinctions: A review
Numerous studies over the past 30 years have suggested there is a causal
connection between the motion of the Sun through the Galaxy and terrestrial
mass extinctions or climate change. Proposed mechanisms include comet impacts
(via perturbation of the Oort cloud), cosmic rays and supernovae, the effects
of which are modulated by the passage of the Sun through the Galactic midplane
or spiral arms. Supposed periodicities in the fossil record, impact cratering
dates or climate proxies over the Phanerozoic (past 545 Myr) are frequently
cited as evidence in support of these hypotheses. This remains a controversial
subject, with many refutations and replies having been published. Here I review
both the mechanisms and the evidence for and against the relevance of
astronomical phenomena to climate change and evolution. This necessarily
includes a critical assessment of time series analysis techniques and
hypothesis testing. Some of the studies have suffered from flaws in
methodology, in particular drawing incorrect conclusions based on ruling out a
null hypothesis. I conclude that there is little evidence for intrinsic
periodicities in biodiversity, impact cratering or climate on timescales of
tens to hundreds of Myr. Furthermore, Galactic midplane and spiral arm
crossings seem to have little or no impact on biological or climate variation
above background level. (truncated)Comment: 51 pages, 7 figures, 140 references. To appear in the International
Journal of Astrobiology. For hyperref version with full resolution figures
see http://www.mpia-hd.mpg.de/homes/calj/astimpact_ija.pd
One-Time Pad Encryption Steganography System
In this paper we introduce and describe a novel approach to adaptive image steganography which is combined with One-Time Pad encryption, and demonstrate the software which implements this methodology. Testing using the state-of-the-art steganalysis software tool StegExpose concludes the image hiding is reliably secure and undetectable using reasonably-sized message payloads (≤25% message bits per image pixel; bpp). Payload image file format outputs from the software include PNG, BMP, JP2, JXR, J2K, TIFF, and WEBP. A variety of file output formats is empirically important as most steganalysis programs will only accept PNG, BMP, and possibly JPG, as the file inputs.
Keywords: steganography, one-time pad, steganalysis, information hiding, digital forensic
- …