73 research outputs found

    Forensically-Sound Analysis of Security Risks of using Local Password Managers

    Get PDF
    Password managers have been developed to address the human challenges associated with password security, i.e., to solve usability issues in a secure way. They offer, e.g., features to create strong passwords, to manage the increasing number of passwords a typical user has, and to auto-fill passwords, sparing users the hassle of not only remembering but also typing them. Previous studies have focused mainly on the security analysis of cloud-based and browser-based password managers; security of local password managers remains mostly under-explored. This paper takes a forensic approach and reports on a case study of three popular local password managers: KeePass (v2.28), Password Safe (v3.35.1) and RoboForm (v7.9.12). Results revealed that either the master password or the content of the password database could be found unencrypted in Temp folders, Page files or Recycle bin, even after the applications had been closed. Therefore, an attacker or malware with temporary access to the computer on which the password managers were running may be able to steal sensitive information, even though these password managers are meant to keep the databases encrypted and protected at all times

    Effect of superior blepharoplasty on tear film: objective evaluation with the Keratograph 5M - a pilot study

    Get PDF
    PURPOSE: To evaluate the effect of superior blepharoplasty on the tear film using the corneal topographer Keratograph 5M. METHODS: A prospective study was performed of 27 eyes of 14 patients with superior dermatochalasis who underwent superior blepharoplasty between May and June 2016. Conservative upper eyelid blepharoplasty was performed by an en bloc resection of anterior lamellar tissue that included skin, subcutaneous tissue, and the orbicularis oculi muscle. All the eyes were imaged using the noninvasive tear breakup time tools of the Keratograph 5M. The following parameters were recorded in each patient before and 6 weeks after surgery: first noninvasive Keratograph 5M tear breakup time (the time at which the first breakup of tears occurs) and average noninvasive Keratograph 5M tear breakup time (the average time of all breakup incidents). The exclusion criteria were ophthalmological pathology, previous eyelid surgery, use of eye drops, systemic pathology, and medication that interferes with lacrimal tears. RESULTS: The mean age of the patients was 65.1 years (range, 51-84); 86% were female. Student's t-test was used to compare the values of first and average noninvasive Keratograph 5M tear breakup times before and after surgery. The values for first noninvasive Keratograph 5M tear breakup time evaluated before and after surgery were not significantly different (9.04 and 8.71, respectively; p=0.926). The values for average noninvasive Keratograph 5M tear breakup time evaluated before and after surgery were also not significantly different (13.01 seconds and 13.14 seconds, respectively; p=0.835). CONCLUSIONS: The results of this pilot study suggest that upper blepharoplasty does not affect tear breakup time according to the objective evaluation of breakup time with the Keratograph 5M.info:eu-repo/semantics/publishedVersio

    Special Issue on Cyberharassment Investigation: Advances and Trends

    Get PDF
    Empirical and anecdotal evidence indicates that cyberharassment is more prevalent as the use of social media becomes increasingly widespread, making geography and physical proximity irrelevant. Cyberharassment can take different forms (e.g., cyberbullying, cyberstalking, cybertrolling), and be motivated by the objectives of inflicting distress, exercising control, impersonation, and defamation. Little is currently known about the modus operandi of offenders and their psychological characteristics. Investigation of these behaviours is particularly challenging because it involves digital evidence distributed across the devices of both alleged offenders and victims, as well as online service providers, sometimes over an extended period of time. This special issue aims to improve understanding of cyberharassment from a multidisciplinary perspective in order to further develop theoretical knowledge and investigative practice

    Adding transparency to uncertainty: An argument-based method for evaluative opinions

    Get PDF
    Over the past 15 years, digital evidence has been identified as a leading cause, or contributing factor, in wrongful convictions in England and Wales. To prevent legal decision-makers from being misled about the relevance and credibility of digital evidence and to ensure a fair administration of justice, adopting a balanced, systematic and transparent approach to evaluating digital evidence and disseminating results is crucial. This paper draws on general concepts from argumentation theory, combined with key principles and concepts from probabilistic and narrative/scenario approaches to develop arguments and analyse evidence. We present the “Argument-Based Method for Evaluative Opinions”, which is a novel method for producing argument-based evaluative opinions in the context of criminal investigation. The method may be used stand-alone or in combination with other qualitative or quantitative/statistical methods to produce evaluative opinions, highlighting the logical relationships between the components making up the argument supporting a hypothesis. To facilitate a structured assessment of the credibility and relevance of the individual argument components, we introduce an Argument Evaluation Scale and, ultimately, an Argument Matrix for a holistic determination of the probative value of the evidence

    Long-term follow-up of myopic choroidal neovascularization treated with ranibizumab

    Get PDF
    PURPOSE: To evaluate the long-term safety and efficacy of intravitreal ranibizumab in the treatment of myopic choroidal neovascularization (CNV). METHODS: Three-year retrospective, nonrandomized, interventional case series. Forty eyes of 39 patients with myopic CNV were included; 15 with previous photodynamic therapy, and 25 naïve eyes. Best-corrected visual acuity (BCVA) changes, central foveal thickness (CFT), and number of treatments were assessed, from baseline to month 36. RESULTS: Mean visual acuity improved from 55.4 Early Treatment Diabetic Retinopathy Study (ETDRS) letters at baseline to 59.7 letters at 12 months (p = 0.07), 61.8 letters at 24 months (p = 0.008) and 63.4 letters at 36 months (p = 0.039). Twenty-five percent of the patients gained ≥15 letters (3 lines) at 12 months, 30% at 24 months and 35% at 36 months. There was a mean reduction of 80 μm in CFT (p < 0.001). A mean of 4.1 injections were performed in the first year, 2.4 in the second year and 1.1 in the third year. Fifty-three percent of the eyes had no need for treatment during the third year of follow-up. CONCLUSIONS: Intravitreal ranibizumab seems to be an effective and safe therapeutic procedure to treat CNV in highly myopic eyes, with a high proportion of patients gaining or stabilizing BCVA at a 3-year follow-up.info:eu-repo/semantics/publishedVersio

    Defense Against Insider Threat: A framework for Gathering Goal-based Requirements

    Get PDF
    Insider threat is becoming comparable to outsider threat in frequency of security events. This is a worrying situation, since insider attacks have a high probability of success because insiders have authorized access and legitimate privileges. Despite their importance, insider threats are still not properly addressed by organizations. We contribute to reverse this situation by introducing a framework composed of a method for identification and assessment of insider threat risks and of two supporting deliverables for awareness of insider threat. The deliverables are: (i) attack strategies structured in four decomposition trees, and (ii) a matrix which correlates defense strategies, attack strategies and control principles. The method output consists of goal-based requirements for the defense against insiders

    Technology, cyberstalking and domestic homicide: informing prevention and response strategies

    Get PDF
    An emerging concern in relation to the importance of technology and social media in everyday life relates to their ability to facilitate online and offline stalking, domestic violence and escalation to homicide. However, there has been little empirical research or policing and policy attention to this domain. This study examined the extent to which there was evidence of the role of technology and cyberstalking in domestic homicide cases based on the analysis of 41 Domestic Homicide Review (DHR) documents, made available by the Home Office (UK). Three interviews were also conducted with victims or family members of domestic homicide in the UK. It aimed to develop a deeper understanding of the role of technology in facilitating these forms of victimisation to inform further development of investigative practice, risk assessment and safeguarding procedures. Key themes identified by the thematic analysis undertaken related to behavioural and psychological indicators of cyberstalking, evidence of the role of technology in escalation to homicide and the digital capabilities of law enforcement. Overall, the results indicated that: (1) there was evidence of technology and social media playing a facilitating role in these behaviours, (2) the digital footprints of victims and perpetrators were often overlooked in police investigations and the DHR process and (3) determining the involvement of technology in such cases is important for risk assessment and earlier intervention to prevent escalation of behaviour to domestic homicide. It also indicates the importance of further developing evidence-based approaches to preventing and responding for victims, the police and other practitioners

    Deepfake: Definitions, Performance Metrics and Standards, Datasets and Benchmarks, and a Meta-Review

    Get PDF
    Recent advancements in AI, especially deep learning, have contributed to a significant increase in the creation of new realistic-looking synthetic media (video, image, and audio) and manipulation of existing media, which has led to the creation of the new term ``deepfake''. Based on both the research literature and resources in English and in Chinese, this paper gives a comprehensive overview of deepfake, covering multiple important aspects of this emerging concept, including 1) different definitions, 2) commonly used performance metrics and standards, and 3) deepfake-related datasets, challenges, competitions and benchmarks. In addition, the paper also reports a meta-review of 12 selected deepfake-related survey papers published in 2020 and 2021, focusing not only on the mentioned aspects, but also on the analysis of key challenges and recommendations. We believe that this paper is the most comprehensive review of deepfake in terms of aspects covered, and the first one covering both the English and Chinese literature and sources
    corecore