36 research outputs found

    Using smartphones as a proxy for forensic evidence contained in cloud storage services

    Get PDF
    Cloud storage services such as Dropbox, Box and SugarSync have been embraced by both individuals and organizations. This creates an environment that is potentially conducive to security breaches and malicious activities. The investigation of these cloud environments presents new challenges for the digital forensics community. It is anticipated that smartphone devices will retain data from these storage services. Hence, this research presents a preliminary investigation into the residual artifacts created on an iOS and Android device that has accessed a cloud storage service. The contribution of this paper is twofold. First, it provides an initial assessment on the extent to which cloud storage data is stored on these client-side devices. This view acts as a proxy for data stored in the cloud. Secondly, it provides documentation on the artifacts that could be useful in a digital forensics investigation of cloud services

    A comparison of forensic evidence recovery techniques for a windows mobile smart phone

    Get PDF
    <p>Acquisition, decoding and presentation of information from mobile devices is complex and challenging. Device memory is usually integrated into the device, making isolation prior to recovery difficult. In addition, manufacturers have adopted a variety of file systems and formats complicating decoding and presentation.</p> <p>A variety of tools and methods have been developed (both commercially and in the open source community) to assist mobile forensics investigators. However, it is unclear to what extent these tools can present a complete view of the information held on a mobile device, or the extent the results produced by different tools are consistent.</p> <p>This paper investigates what information held on a Windows Mobile smart phone can be recovered using several different approaches to acquisition and decoding. The paper demonstrates that no one technique recovers all information of potential forensic interest from a Windows Mobile device; and that in some cases the information recovered is conflicting.</p&gt

    Polarized Photoproduction of Heavy Quarks in Next-to-Leading Order

    Get PDF
    The results of a next-to-leading order calculation of heavy quark production in longitudinally polarized photon-nucleon collisions are presented. At c.m. energy S=10\sqrt{S}=10 GeV, for γ+pc+X\vec \gamma +\vec p \to c+X, cross sections differential in the transverse momentum and rapidity of the charmed quark cc and the corresponding asymmetries are presented; also, as functions of S\sqrt{S}, integrated cross sections, KK-factors and the corresponding asymmetries are given. Errors in the asymmetries are estimated and the possibility to distinguish between three scerarios differing essentially in the polarized gluon distribution is discussed.Comment: 8 pages, 3 figure

    Next-to-leading order QCD corrections to spin-dependent hadron-pair photoproduction

    Full text link
    We compute the next-to-leading order QCD corrections to the ``direct'' part of the spin-dependent cross section for hadron-pair photoproduction. The calculation is performed using largely analytical methods. We present a brief phenomenological study of our results focussing on the KK-factors and scale dependence of the next-to-leading order cross sections. This process is relevant for the extraction of the gluon polarization in present and future spin-dependent lepton-nucleon scattering experiments.Comment: 9 pages, 2 eps figure

    A framework for designing cloud forensic‑enabled services (CFeS)

    Get PDF
    Cloud computing is used by consumers to access cloud services. Malicious actors exploit vulnerabilities of cloud services to attack consumers. The link between these two assumptions is the cloud service. Although cloud forensics assists in the direction of investigating and solving cloud-based cyber-crimes, in many cases the design and implementation of cloud services falls back. Software designers and engineers should focus their attention on the design and implementation of cloud services that can be investigated in a forensic sound manner. This paper presents a methodology that aims on assisting designers to design cloud forensic-enabled services. The methodology supports the design of cloud services by implementing a number of steps to make the services cloud forensic-enabled. It consists of a set of cloud forensic constraints, a modelling language expressed through a conceptual model and a process based on the concepts identified and presented in the model. The main advantage of the proposed methodology is the correlation of cloud services’ characteristics with the cloud investigation while providing software engineers the ability to design and implement cloud forensic-enabled services via the use of a set of predefined forensic related task

    Polarized photoproduction of large-p(T) hadron pairs as a probe of the polarized gluon distribution

    No full text
    Production of large-p(T) hadron pairs by a polarized photon on a longitudinally polarized proton towards probing the polarized gluon distribution is studied. Resolved photon contributions and the effect of changing the scales are taken into account, and predictions are presented. A very recent experimental result at c.m. energy 7.18 GeV is compared to our predictions extended down to this energy. A proper combination of cross sections is also considered
    corecore