449 research outputs found
Recommended from our members
INFERENCE-BASED FORENSICS FOR EXTRACTING INFORMATION FROM DIVERSE SOURCES
Digital forensics is tasked with the examination and extraction of evidence from a diverse set of devices and information sources. While digital forensics has long been synonymous with file recovery, this label no longer adequately describes the science’s role in modern investigations. Spurred by evolving technologies and online crime, law enforcement is shifting the focus of digital forensics from its traditional role in the final stages of an investigation to assisting investigators in the earliest phases — often before a suspect has been identified and a warrant served. Investigators need new forensic techniques to investigate online crimes, such as child pornography trafficking on peer-to-peer networks (p2p), and to extract evidence from new information sources, such as mobile phones. The traditional approach of developing tools tailored specifically to each source is no longer tenable given the diversity, volume of storage, and introduction rate of new devices and network applications. Instead, we propose the adoption of flexible, inference-based techniques to extract evidence from any format. Such techniques can be readily applied to a wide variety of different evidence sources without requiring significant manual work on the investigator’s part. The primary contribution of my dissertation is a set of novel forensic techniques for extracting information from diverse data sources. We frame the evaluation using two different, but increasingly important, forensic scenarios: mobile phone triage and network-based investigations.
Via probabilistic descriptions of typical data structures, and using a classic dynamic programming algorithm, our phone triage techniques are able to identify user information in phones across varied models and manufacturers. We also show how to incorporate feedback from the investigator to improve the usability of extracted information.
For network-based investigations, we quantify and characterize the extent of contraband trafficking on peer-to-peer networks. We suggest various techniques for prioritizing law enforcement’s limited resources. We finally investigate techniques that use system logs to generate and then analyze a finite state model of a protocol’s implementation. The objective is to infer behavior that an investigator can leverage to further law enforcement objectives.
We evaluate all of our techniques using the real-world legal constraints and restrictions of investigators
A macro-realism inequality for opto-electro-mechanical systems
We show how to apply the Leggett-Garg inequality to opto-electro-mechanical
systems near their quantum ground state. We find that by using a dichotomic
quantum non-demolition measurement (via, e.g., an additional circuit-QED
measurement device) either on the cavity or on the nanomechanical system
itself, the Leggett-Garg inequality is violated. We argue that only
measurements on the mechanical system itself give a truly unambigous violation
of the Leggett-Garg inequality for the mechanical system. In this case, a
violation of the Leggett-Garg inequality indicates physics beyond that of
"macroscopic realism" is occurring in the mechanical system. Finally, we
discuss the difficulties in using unbound non-dichotomic observables with the
Leggett-Garg inequality.Comment: 9 pages, 2 figures. Added additional figure (2b), and associated
conten
Multiple Scattering Theory for Two-dimensional Electron Gases in the Presence of Spin-Orbit Coupling
In order to model the phase-coherent scattering of electrons in
two-dimensional electron gases in the presence of Rashba spin-orbit coupling, a
general partial-wave expansion is developed for scattering from a cylindrically
symmetric potential. The theory is applied to possible electron flow imaging
experiments using a moveable scanning probe microscope tip. In such
experiments, it is demonstrated theoretically that the Rashba spin-orbit
coupling can give rise to spin interference effects, even for unpolarized
electrons at nonzero temperature and no magnetic field.Comment: 34 pages, 7 figure
Modelling and managing systemic risks in supply chains
A structured review of the supply chain and risk management literature supports an analysis of the sources and types of risks anticipated in supply chains and networks. We discuss alternative modelling approaches, such as Bayesian Belief Nets (BBN), System Dynamics, Fault and Event Trees, which are evaluated against the criteria characterizing systemic risks that emerge from the literature review. Finally, we briefly present an empirical pilot case study is conducted with a public sector organization in charge of a pharmaceutical distribution network to explore the feasibility of a BBN modelling approach
Conditional preparation of states containing a definite number of photons
A technique for conditionally creating single- or multimode photon-number
states is analyzed using Bayesian theory. We consider the heralded N-photon
states created from the photons produced by an unseeded optical parametric
amplifier when the heralding detector is the time-multiplexed
photon-number-resolving detector recently demonstrated by Fitch, et al. [Phys.
Rev. A 68, 043814 (2003).] and simultaneously by Achilles, et al. [Opt. Lett.
28, 2387 (2003).]. We find that even with significant loss in the heralding
detector, fields with sub-Poissonian photon-number distributions can be
created. We also show that heralded multimode fields created using this
technique are more robust against detector loss than are single-mode fields.Comment: 6 pages, 6 figures, reference added, typos corrected, content update
- …