—Cyber crimes often involve complicated scenes. In this paper, we investigate unidentified crimes committed through anonymous communication networks. We developed a long Pseudo-Noise (PN) code based Direct Sequence Spread Spectrum (DSSS) flow marking technique for invisibly tracing suspect anonymous flows. By interfering with a sender's traffic and… (More)
Three-dimensional topological Dirac semimetals (TDSs) are a new kind of Dirac materials that exhibit linear energy dispersion in the bulk and can be viewed as three-dimensional graphene. It has been proposed that TDSs can be driven to other exotic phases like Weyl semimetals, topological insulators and topological superconductors by breaking certain… (More)
—Academic researchers in digital forensics often lack backgrounds in related laws. This ignorance could make their research and development legally invalid, or with less relevance in practice. To better assist academic researchers, we discuss related laws that regulate the government's investigation and summarize different requirements of acquiring data and… (More)
With the development of steganalysis, steganalysis-proof ability of steganography is becoming more and more important. The evaluation for steganalysis-proof ability of steganographic algorithms can provide theoretical foundation and promote the development of steganalysis-proof ability of steganographic algorithms. This paper proposes an evaluation scheme… (More)
Cyber criminals may abuse open wireless networks or those with weak encryption for cyber crimes. Assume surveillance has identified suspect traffic such as child porn downloading traffic on the Internet. To locate such criminals, law enforcement has to first identify which mobile (MAC) is generating suspect traffic behind a wireless router. The challenge is… (More)
Digital forensics is the science of laws and technologies fighting computer crimes. It can be divided into two sub-areas, computer forensics and network forensics. Network forensics is still a frontier area of digital forensics and is the focus of this paper. We propose to classify network forensic investigations into three categories based on when law… (More)
Secret messages can be embedded in a webpage by switching the uppercase-lowercase states of letters in tags. In this paper, a novel steganalytic approach called Tag-Mismatch analysis for detection of hidden information embedded in tags is presented.