Learn More
Keywords: Xbox one Video game console forensics Network forensics Games Digital forensics NTFS Hard drive a b s t r a c t Video game consoles can no longer be viewed as just gaming consoles but rather as full multimedia machines, capable of desktop computer-like performance. The past has shown that game consoles have been used in criminal activities such as(More)
Agile methodologies have proven to be a popular addition to the software engineering toolbox, promising significant advances in quality for small teams, with developers no longer weighed under by the documentation said to characterise traditional approaches. Yet, in spite of these claims, quality assurance remains a question to which agile methodologies(More)
Keywords: Mobile device forensics Social networking iPhone Android Blackberry a b s t r a c t The increased use of social networking applications on smartphones makes these devices a goldmine for forensic investigators. Potential evidence can be held on these devices and recovered with the right tools and examination methods. This paper focuses on(More)
This paper highlights the importance of Facebook's instant messaging service (Facebook Chat) as a potential source of evidence in an investigation. The paper discusses the process of recovering and reconstructing artifacts left by the use of Facebook Chat on a computer's hard disk. The paper describes experiments in which Facebook Chat conversations in(More)
Precondition event Happened-before CAT detect a b s t r a c t The construction of timelines of computer activity is a part of many digital investigations. These timelines of events are composed of traces of historical activity drawn from system logs and potentially from evidence of events found in the computer file system. A potential problem with the use(More)
Keywords: Network forensics Android forensics Instant messaging Privacy of messaging applications Application security testing Datapp a b s t r a c t In this research we forensically acquire and analyze the device-stored data and network traffic of 20 popular instant messaging applications for Android. We were able to reconstruct some or the entire message(More)
The continued increase in the usage of Small Scale Digital Devices (SSDDs) to browse the web has made mobile devices a rich potential for digital evidence. Issues may arise when suspects attempt to hide their browsing habits using applications like Orweb - which intends to anonymize network traffic as well as ensure that no browsing history is saved on the(More)
This paper discusses the use of models in automatic computer forensic analysis, and proposes and elaborates on a novel model for use in computer profiling, the computer profiling object model. The computer profiling object model is an information model which models a computer as objects with various attributes and inter-relationships. These together provide(More)
Portable web browsers are installed on removable storage devices which can be taken by a user from computer to computer. One of the claimed benefits of portable web browsers is enhanced privacy, through minimization of the traces of browsing activity left on the host's hard disk. On the basis of this claim, it would appear that portable web browsers pose a(More)
Due to the numerous complicating factors in the field of small scale digital device forensics, physical acquisition of the storage of such devices is often not possible (at least not without destroying the device). As an alternative, forensic examiners often gather digital evidence from small scale digital devices through logical acquisition. This paper(More)