36 research outputs found
Using smartphones as a proxy for forensic evidence contained in cloud storage services
Cloud storage services such as Dropbox, Box and SugarSync have been embraced by both individuals and organizations. This creates an environment that is potentially conducive to security breaches and malicious activities. The investigation of these cloud environments presents new challenges for the digital forensics community.
It is anticipated that smartphone devices will retain data from these storage services. Hence, this research presents a preliminary investigation into the residual artifacts created on an iOS and Android device that has accessed a cloud storage service. The contribution of this paper is twofold. First, it provides an initial assessment on the extent to which cloud storage data is stored on these client-side devices. This view acts as a proxy for data stored in the cloud. Secondly, it provides documentation on the artifacts that could be useful in a digital forensics investigation of cloud services
A comparison of forensic evidence recovery techniques for a windows mobile smart phone
<p>Acquisition, decoding and presentation of information from mobile devices is complex and challenging. Device memory is usually integrated into the device, making isolation prior to recovery difficult. In addition, manufacturers have adopted a variety of file systems and formats complicating decoding and presentation.</p>
<p>A variety of tools and methods have been developed (both commercially and in the open source community) to assist mobile forensics investigators. However, it is unclear to
what extent these tools can present a complete view of the information held on a mobile device, or the extent the results produced by different tools are consistent.</p>
<p>This paper investigates what information held on a Windows Mobile smart phone can be recovered using several different approaches to acquisition and decoding. The paper demonstrates that no one technique recovers all information of potential forensic interest from a Windows Mobile device; and that in some cases the information recovered is
conflicting.</p>
Polarized Photoproduction of Heavy Quarks in Next-to-Leading Order
The results of a next-to-leading order calculation of heavy quark production
in longitudinally polarized photon-nucleon collisions are presented. At c.m.
energy GeV, for , cross sections
differential in the transverse momentum and rapidity of the charmed quark
and the corresponding asymmetries are presented; also, as functions of
, integrated cross sections, -factors and the corresponding
asymmetries are given. Errors in the asymmetries are estimated and the
possibility to distinguish between three scerarios differing essentially in the
polarized gluon distribution is discussed.Comment: 8 pages, 3 figure
Next-to-leading order QCD corrections to spin-dependent hadron-pair photoproduction
We compute the next-to-leading order QCD corrections to the ``direct'' part
of the spin-dependent cross section for hadron-pair photoproduction. The
calculation is performed using largely analytical methods. We present a brief
phenomenological study of our results focussing on the -factors and scale
dependence of the next-to-leading order cross sections. This process is
relevant for the extraction of the gluon polarization in present and future
spin-dependent lepton-nucleon scattering experiments.Comment: 9 pages, 2 eps figure
A framework for designing cloud forensic‑enabled services (CFeS)
Cloud computing is used by consumers to access cloud services. Malicious
actors exploit vulnerabilities of cloud services to attack consumers. The link
between these two assumptions is the cloud service. Although cloud forensics assists
in the direction of investigating and solving cloud-based cyber-crimes, in many
cases the design and implementation of cloud services falls back. Software designers
and engineers should focus their attention on the design and implementation of
cloud services that can be investigated in a forensic sound manner. This paper presents
a methodology that aims on assisting designers to design cloud forensic-enabled
services. The methodology supports the design of cloud services by implementing
a number of steps to make the services cloud forensic-enabled. It consists
of a set of cloud forensic constraints, a modelling language expressed through a
conceptual model and a process based on the concepts identified and presented in
the model. The main advantage of the proposed methodology is the correlation of
cloud services’ characteristics with the cloud investigation while providing software
engineers the ability to design and implement cloud forensic-enabled services via
the use of a set of predefined forensic related task
Polarized photoproduction of large-p(T) hadron pairs as a probe of the polarized gluon distribution
Production of large-p(T) hadron pairs by a polarized photon on a
longitudinally polarized proton towards probing the polarized gluon
distribution is studied. Resolved photon contributions and the effect of
changing the scales are taken into account, and predictions are
presented. A very recent experimental result at c.m. energy 7.18 GeV is
compared to our predictions extended down to this energy. A proper
combination of cross sections is also considered