2,320 research outputs found

    Dark clouds on the horizon:the challenge of cloud forensics

    Get PDF
    We introduce the challenges to digital forensics introduced by the advent and adoption of technologies, such as encryption, secure networking, secure processors and anonymous routing. All potentially render current approaches to digital forensic investigation unusable. We explain how the Cloud, due to its global distribution and multi-jurisdictional nature, exacerbates these challenges. The latest developments in the computing milieu threaten a complete “evidence blackout” with severe implications for the detection, investigation and prosecution of cybercrime. In this paper, we review the current landscape of cloud-based forensics investigations. We posit a number of potential solutions. Cloud forensic difficulties can only be addressed if we acknowledge its socio-technological nature, and design solutions that address both human and technological dimensions. No firm conclusion is drawn; rather the objective is to present a position paper, which will stimulate debate in the area and move the discipline of digital cloud forensics forward. Thus, the paper concludes with an invitation to further informed debate on this issue

    An assessment of blockchain consensus protocols for the Internet of Things

    Get PDF
    In a few short years the Internet of Things has become an intrinsic part of everyday life, with connected devices included in products created for homes, cars and even medical equipment. But its rapid growth has created several security problems, with respect to the transmission and storage of vast amounts of customers data, across an insecure heterogeneous collection of networks. The Internet of Things is therefore creating a unique set of risk and problems that will affect most households. From breaches in confidentiality, which could allow users to be snooped on, through to failures in integrity, which could lead to consumer data being compromised; devices are presenting many security challenges to which consumers are ill equipped to protect themselves from. Moreover, when this is coupled with the heterogeneous nature of the industry, and the interoperable and scalability problems it becomes apparent that the Internet of Things has created an increased attack surface from which security vulnerabilities may be easily exploited. However, it has been conjectured that blockchain may provide a solution to the Internet of Things security and scalability problems. Because of blockchain’s immutability, integrity and scalability, it is possible that its architecture could be used for the storage and transfer of Internet of Things data. Within this paper a cross section of blockchain consensus protocols have been assessed against a requirement framework, to establish each consensus protocols strengths and weaknesses with respect to their potential implementation in an Internet of Things blockchain environment

    On the digital forensic analysis of the Firefox browser via recovery of SQLite artifacts from unallocated space

    Get PDF
    A technique and supporting tool for the recovery of browsing activity (both stored and deleted) from current and recent versions of the Firefox web-browser is presented. The generality of the technique is discussed: It is applicable to any software that uses the popular SQLite embedded database engine such as the Apple Safari web-browser and many Android apps

    Reducing risky security behaviours:utilising affective feedback to educate users

    Get PDF
    Despite the number of tools created to help end-users reduce risky security behaviours, users are still falling victim to online attacks. This paper proposes a browser extension utilising affective feedback to provide warnings on detection of risky behaviour. The paper provides an overview of behaviour considered to be risky, explaining potential threats users may face online. Existing tools developed to reduce risky security behaviours in end-users have been compared, discussing the success rate of various methodologies. Ongoing research is described which attempts to educate users regarding the risks and consequences of poor security behaviour by providing the appropriate feedback on the automatic recognition of risky behaviour. The paper concludes that a solution utilising a browser extension is a suitable method of monitoring potentially risky security behaviour. Ultimately, future work seeks to implement an affective feedback mechanism within the browser extension with the aim of improving security awareness

    Assessing the impact of affective feedback on end-user security awareness

    Get PDF
    A lack of awareness regarding online security behaviour can leave users and their devices vulnerable to compromise. This paper highlights potential areas where users may fall victim to online attacks, and reviews existing tools developed to raise users’ awareness of security behaviour. An ongoing research project is described, which provides a combined monitoring solution and affective feedback system, designed to provide affective feedback on automatic detection of risky security behaviour within a web browser. Results gained from the research conclude an affective feedback mechanism in a browser-based environment, can promote general awareness of online security

    Complete Genome Sequence and Comparative Metabolic Profiling of the Prototypical Enteroaggregative Escherichia coli Strain 042

    Get PDF
    Background \ud Escherichia coli can experience a multifaceted life, in some cases acting as a commensal while in other cases causing intestinal and/or extraintestinal disease. Several studies suggest enteroaggregative E. coli are the predominant cause of E. coli-mediated diarrhea in the developed world and are second only to Campylobacter sp. as a cause of bacterial-mediated diarrhea. Furthermore, enteroaggregative E. coli are a predominant cause of persistent diarrhea in the developing world where infection has been associated with malnourishment and growth retardation. \ud \ud Methods \ud In this study we determined the complete genomic sequence of E. coli 042, the prototypical member of the enteroaggregative E. coli, which has been shown to cause disease in volunteer studies. We performed genomic and phylogenetic comparisons with other E. coli strains revealing previously uncharacterised virulence factors including a variety of secreted proteins and a capsular polysaccharide biosynthetic locus. In addition, by using Biolog™ Phenotype Microarrays we have provided a full metabolic profiling of E. coli 042 and the non-pathogenic lab strain E. coli K-12. We have highlighted the genetic basis for many of the metabolic differences between E. coli 042 and E. coli K-12. \ud \ud Conclusion \ud This study provides a genetic context for the vast amount of experimental and epidemiological data published thus far and provides a template for future diagnostic and intervention strategies

    Logarithmic deformations of the rational superpotential/Landau-Ginzburg construction of solutions of the WDVV equations

    Get PDF
    The superpotential in the Landau-Ginzburg construction of solutions to the Witten-Dijkgraaf-Verlinde-Verlinde (or WDVV) equations is modified to include logarithmic terms. This results in deformations - quadratic in the deformation parameters- of the normal prepotential solutions of the WDVV equations. Such solutions satisfy various pseudo-quasi-homogeneity conditions, on assigning a notional weight to the deformation parameters. These solutions originate in the so-called `water-bag' reductions of the dispersionless KP hierarchy. This construction includes, as a special case, deformations which are polynomial in the flat coordinates, resulting in a new class of polynomial solutions of the WDVV equations

    IR Background Anisotropies in Spitzer GOODS images and constraints on first galaxies

    Get PDF
    We describe the angular power spectrum of unresolved 3.6 micron IR light in Spitzer GOODS fields. The amplitude of the anisotropy spectrum decreases with decreasing flux threshold to which resolved sources are removed from images. When all pixels brighter than a Vega magnitude of 24.6 are removed, the amplitude of the power spectrum at arcminute angular scales can be described with an extra component of z>8 sources with a IRB contribution around 0.4 nW m^-2 sr-1. The shape of the power spectrum, however, is more consistent with that expected for unresolved, faint galaxies at lower redshifts with Vega magnitudes fainter than 23 with a total 3.6 micron intensity between 0.1 to 0.8 nW m^-2 sr^-1. We confirm this assumption by showing that large-scale power decreases rapidly when the unresolved clustering spectrum is measured from a processed HDF-N IRAC image where locations of faint ACS sources with no IR counterparts were also masked. Based on resolved counts and unresolved fluctuations, we find that, at most, about 7.0 nW m^-2 sr^-1 can be ascribed to galaxies.Comment: 4 pages, 3 figures; for additional information see astro-ph/0609451 ; data products are available at http://www.cooray.org/spitzer.htm
    corecore