Cahyani et al., 2017 - Google Patents
Forensic data acquisition from cloud‐of‐things devices: windows Smartphones as a case studyCahyani et al., 2017
- Document ID
- 6094411971514183284
- Author
- Cahyani N
- Martini B
- Choo K
- Al‐Azhar A
- Publication year
- Publication venue
- Concurrency and Computation: Practice and Experience
External Links
Snippet
The continued amalgamation of cloud technologies into all aspects of our daily lives and the technologies we use (ie cloud‐of‐things) creates business opportunities, security and privacy risks, and investigative challenges (in the event of a cybersecurity incident). This …
- 238000000034 method 0 abstract description 43
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/30144—Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/445—Programme loading or initiating
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cahyani et al. | Forensic data acquisition from cloud‐of‐things devices: windows Smartphones as a case study | |
Barmpatsalou et al. | A critical review of 7 years of Mobile Device Forensics | |
US9621597B2 (en) | Systems and methods for digital forensic triage | |
Quick et al. | Digital droplets: Microsoft SkyDrive forensic data remnants | |
Zdziarski | iPhone forensics: recovering evidence, personal data, and corporate assets | |
KR101373986B1 (en) | Method and apparatus to vet an executable program using a model | |
Yusoff et al. | Forensic investigation of social media and instant messaging services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as case studies | |
Bommisetty et al. | Practical mobile forensics | |
Mahalik et al. | Practical mobile forensics | |
Martini et al. | Conceptual evidence collection and analysis methodology for Android devices | |
Grispos et al. | Recovering residual forensic data from smartphone interactions with cloud storage providers | |
Al-Sabaawi et al. | A comparison study of android mobile forensics for retrieving files system | |
Tso et al. | iPhone social networking for evidence investigations using iTunes forensics | |
JP6196740B2 (en) | System and method for informing users about applications available for download | |
Azhar et al. | Forensic analysis of secure ephemeral messaging applications on android platforms | |
Bays et al. | Forensic analysis of third party location applications in android and ios | |
Schwamm et al. | Effects of the factory reset on mobile devices | |
Yusoff et al. | Advances of mobile forensic procedures in Firefox OS | |
Toldinas et al. | Suitability of the digital forensic tools for investigation of cyber crime in the internet of things and services | |
Shukla et al. | Perlustration on mobile forensics tools | |
Verma et al. | Preserving dates and timestamps for incident handling in android smartphones | |
Agrawal et al. | Forensic analysis of Google Allo messenger on Android platform | |
Yusoff et al. | An approach for forensic investigation in Firefox OS | |
Zdziarski | iOS forensic investigative methods | |
Silla | WeChat forensic artifacts: Android phone extraction and analysis |