Advertisement

Forensics Analysis

  • Izzat Alsmadi
Chapter

Abstract

In digital investigations, many software and hardware components include possible forensic artifacts that can be searched for. The process however is not trivial and such search should be focused in the context of the forensic case.

Bibliography

  1. Alsmadi I, Burdwell R, Aleroud A, Wahbeh A, Al-Qudah MA, Al-Omari A (2018) Introduction to information security. In: Practical information security. Springer, New YorkCrossRefGoogle Scholar
  2. Cheng BH et al (2009) Software engineering for self-adaptive systems: a research roadmap. In: Cheng BH, de Lemos R, Giese H, Inverardi P, Magee J (eds) Software engineering for self-adaptive systems. Springer, Berlin, pp 1–26. https://doi.org/10.1007/978-3-642-02161-9_1CrossRefGoogle Scholar
  3. Conlan K, Baggili I, Breitinger F (2016) Anti-forensics: furthering digital forensic science through a new extended, granular taxonomy. In: Proceedings of the 16th annual USA digital forensics research conference, DFRWSGoogle Scholar
  4. Garfinkel S (2007) Anti-forensics: techniques, detection and countermeasure. CalhounGoogle Scholar
  5. Hargreaves CJ (2009) Assessing the reliability of digital evidence from live investigations involving encryption. PhD thesis, Cranfield University, ShrivenhamGoogle Scholar
  6. Harrell C (2012) Malware root cause analysis. Journey into Incident ResponseGoogle Scholar
  7. Kaser R (2017) WikiLeaks reveals grasshopper, the CIA’s Windows hacking tool. https://thenextweb.com/security/2017/04/07/wikileaks-reveals-grasshopper-cias-windows-hacking-tool/
  8. Kent K, Chevalier S, Grance T, Dang H (2006) Guide to integrating forensic techniques into incident response, NIST SP800-86Google Scholar
  9. Kumar M (2017) This CIA tool hacks windows computers silently over the network. https://thehackernews.com/2017/06/windows-hacking-implant.html
  10. Liu, Brown (2006) Bleeding-edge anti-forensics. Infosec world conference & expo, MIS Training InstituteGoogle Scholar
  11. Mandia K, Prosise C (2001) Incident response: investigating computer crime. Osborne/McGraw-Hill, Berkeley, pp 16–17Google Scholar
  12. Noon RK (2001) Forensic engineering investigation, 1st edn. CRC Press, Boca Raton, p 1Google Scholar
  13. Rogers M (2006) Anti-forensics: the coming wave in digital forensics. Accessed 7 Sept 2006Google Scholar
  14. Tech (2009) Forensic analysis on the go, Deployable Forensics Lab makes crime-related investigations mobile, Tech, the newsletter of the first responder technologies program, volume 2, issue 3, March 2009.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Izzat Alsmadi
    • 1
  1. 1.Texas A&M UniversitySan AntonioUSA

Personalised recommendations