4 research outputs found

    HiGate (High Grade Anti-Tamper Equipment) Prototype and Application to e-Discovery

    Get PDF
    These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve this problem, providers encrypt data, and the owner of the computer performs decoding in the memory for encrypted data. The computer owner can be limited to performing only certain processing of data and to observing only the final results. As an implementation that uses existing technology to realize this solution, the processing of data contained in a smart card was considered, but such an implementation would not be practical due to issues related to computer capacity and processing speed. Accordingly, the authors present the concept of PC-based High Grade AntiTamper Equipment (HiGATE), which allows data to be handled without revealing the data content to administrators or users. To verify this concept, an eDiscovery application on a prototype was executed and the results are reported here

    HiGate (High Grade Anti‐Tamper Equipment) Prototype and Application to e‐Discovery

    Get PDF
    These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve this problem, providers encrypt data, and the owner of the computer performs decoding in the memory for encrypted data. The computer owner can be limited to performing only certain processing of data and to observing only the final results. As an implementation that uses existing technology to realize this solution, the processing of data contained in a smart card was considered, but such an implementation would not be practical due to issues related to computer capacity and processing speed. Accordingly, the authors present the concept of PC-based High Grade Anti-Tamper Equipment (HiGATE), which allows data to be handled without revealing the data content to administrators or users. To verify this concept, an e-Discovery application on a prototype was executed and the results are reported here. Keyword: Anti-Tamper, e-Discovery, Bitlocker, APIHoo

    IMPLEMENTING BOOT CONTROL FOR WINDOWS VISTA

    Get PDF
    Abstract A digital forensic logging system must prevent the booting of unauthorized programs and the modification of evidence. Our previous research developed Dig-Force2, a boot control system for Windows XP platforms that employs API hooking and a trusted platform module. However, Dig-Force2 cannot be used for Windows Vista systems because the hooked API cannot monitor booting programs in user accounts. This paper describes an enhanced version of Dig-Force2, which uses a TPM and a white list to provide boot control functionality for Windows Vista systems. In addition, the paper presents the results of security and performance evaluations of the boot control system

    Time-varying overdispersion of SARS-CoV-2 transmission during the periods when different variants of concern were circulating in Japan

    No full text
    Abstract Japan has implemented a cluster-based approach for coronavirus disease 2019 (COVID-19) from the pandemic’s beginning based on the transmission heterogeneity (overdispersion) of severe acute respiratory coronavirus 2 (SARS-CoV-2). However, studies analyzing overdispersion of transmission among new variants of concerns (VOCs), especially for Omicron, were limited. Thus, we aimed to clarify how the transmission heterogeneity has changed with the emergence of VOCs (Alpha, Delta, and Omicron) using detailed contact tracing data in Yamagata Prefecture, Japan. We estimated the time-varying dispersion parameter ( kt{k}_{t} k t ) by fitting a negative binomial distribution for each transmission generation. Our results showed that even after the emergence of VOCs, there was transmission heterogeneity of SARS-CoV-2, with changes in kt{k}_{t} k t during each wave. Continuous monitoring of transmission dynamics is vital for implementing appropriate measures. However, a feasible and sustainable epidemiological analysis system should be established to make this possible
    corecore