Skip to main content

Showing 1–44 of 44 results for author: Scanlon, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.19366  [pdf, other

    cs.CR cs.AI

    Exploring the Potential of Large Language Models for Improving Digital Forensic Investigation Efficiency

    Authors: Akila Wickramasekara, Frank Breitinger, Mark Scanlon

    Abstract: The growing number of cases that require digital forensic analysis raises concerns about the ability of law enforcement to conduct investigations promptly. Consequently, this paper delves into the potential and effectiveness of integrating Large Language Models (LLMs) into digital forensic investigation to address these challenges. A comprehensive literature review is carried out, encompassing exi… ▽ More

    Submitted 11 June, 2024; v1 submitted 29 February, 2024; originally announced February 2024.

  2. arXiv:2402.15448  [pdf, other

    cs.CV cs.AI cs.CY

    Computer Vision for Multimedia Geolocation in Human Trafficking Investigation: A Systematic Literature Review

    Authors: Opeyemi Bamigbade, John Sheppard, Mark Scanlon

    Abstract: The task of multimedia geolocation is becoming an increasingly essential component of the digital forensics toolkit to effectively combat human trafficking, child sexual exploitation, and other illegal acts. Typically, metadata-based geolocation information is stripped when multimedia content is shared via instant messaging and social media. The intricacy of geolocating, geotagging, or finding geo… ▽ More

    Submitted 23 February, 2024; originally announced February 2024.

  3. arXiv:2402.10030  [pdf, other

    cs.CR

    Systematic Literature Review of EM-SCA Attacks on Encryption

    Authors: Muhammad Rusyaidi Zunaidi, Asanka Sayakkara, Mark Scanlon

    Abstract: Cryptography is vital for data security, but cryptographic algorithms can still be vulnerable to side-channel attacks (SCAs), physical assaults exploiting power consumption and EM radiation. SCAs pose a significant threat to cryptographic integrity, compromising device keys. While literature on SCAs focuses on real-world devices, the rise of sophisticated devices necessitates fresh approaches. Ele… ▽ More

    Submitted 15 February, 2024; originally announced February 2024.

  4. arXiv:2312.13228  [pdf, other

    cs.RO

    Benchmarks for Retrospective Automated Driving System Crash Rate Analysis Using Police-Reported Crash Data

    Authors: John M. Scanlon, Kristofer D. Kusano, Laura A. Fraade-Blanar, Timothy L. McMurry, Yin-Hsiu Chen, Trent Victor

    Abstract: With fully automated driving systems (ADS; SAE level 4) ride-hailing services expanding in the US, we are now approaching an inflection point, where the process of retrospectively evaluating ADS safety impact can start to yield statistically credible conclusions. An ADS safety impact measurement requires a comparison to a "benchmark" crash rate. This study aims to address, update, and extend the e… ▽ More

    Submitted 20 December, 2023; originally announced December 2023.

  5. arXiv:2312.12675  [pdf, other

    cs.RO

    Comparison of Waymo Rider-Only Crash Data to Human Benchmarks at 7.1 Million Miles

    Authors: Kristofer D. Kusano, John M. Scanlon, Yin-Hsiu Chen, Timothy L. McMurry, Ruoshu Chen, Tilia Gode, Trent Victor

    Abstract: This paper examines the safety performance of the Waymo Driver, an SAE level 4 automated driving system (ADS) used in a rider-only (RO) ride-hailing application without a human driver, either in the vehicle or remotely. ADS crash data was derived from NHTSA's Standing General Order (SGO) reporting over 7.14 million RO miles through the end of October 2023 in Phoenix, AZ, San Francisco, CA, and Los… ▽ More

    Submitted 19 December, 2023; originally announced December 2023.

  6. arXiv:2312.11301  [pdf, other

    cs.CR

    Ensuring Cross-Device Portability of Electromagnetic Side-Channel Analysis

    Authors: Lojenaa Navanesana, Nhien-An Le-Khac, Mark Scanlon, Kasun De Zoysa, Asanka P. Sayakkara

    Abstract: Investigation on smart devices has become an essential subdomain in digital forensics. The inherent diversity and complexity of smart devices pose a challenge to the extraction of evidence without physically tampering with it, which is often a strict requirement in law enforcement and legal proceedings. Recently, this has led to the application of non-intrusive Electromagnetic Side-Channel Analysi… ▽ More

    Submitted 18 December, 2023; originally announced December 2023.

  7. arXiv:2312.11292  [pdf

    cs.CR

    DFRWS EU 10-Year Review and Future Directions in Digital Forensic Research

    Authors: Frank Breitinger, Jan-Niclas Hilgert, Christopher Hargreaves, John Sheppard, Rebekah Overdorf, Mark Scanlon

    Abstract: Conducting a systematic literature review and comprehensive analysis, this paper surveys all 135 peer-reviewed articles published at the Digital Forensics Research Conference Europe (DFRWS EU) spanning the decade since its inaugural running (2014-2023). This comprehensive study of DFRWS EU articles encompasses sub-disciplines such as digital forensic science, device forensics, techniques and funda… ▽ More

    Submitted 15 March, 2024; v1 submitted 18 December, 2023; originally announced December 2023.

  8. arXiv:2307.10195  [pdf, other

    cs.CR cs.AI cs.CL

    ChatGPT for Digital Forensic Investigation: The Good, The Bad, and The Unknown

    Authors: Mark Scanlon, Frank Breitinger, Christopher Hargreaves, Jan-Niclas Hilgert, John Sheppard

    Abstract: The disruptive application of ChatGPT (GPT-3.5, GPT-4) to a variety of domains has become a topic of much discussion in the scientific community and society at large. Large Language Models (LLMs), e.g., BERT, Bard, Generative Pre-trained Transformers (GPTs), LLaMA, etc., have the ability to take instructions, or prompts, from users and generate answers and solutions based on very large volumes of… ▽ More

    Submitted 10 July, 2023; originally announced July 2023.

  9. SoK: Exploring the State of the Art and the Future Potential of Artificial Intelligence in Digital Forensic Investigation

    Authors: Xiaoyu Du, Chris Hargreaves, John Sheppard, Felix Anda, Asanka Sayakkara, Nhien-An Le-Khac, Mark Scanlon

    Abstract: Multi-year digital forensic backlogs have become commonplace in law enforcement agencies throughout the globe. Digital forensic investigators are overloaded with the volume of cases requiring their expertise compounded by the volume of data to be processed. Artificial intelligence is often seen as the solution to many big data problems. This paper summarises existing artificial intelligence based… ▽ More

    Submitted 2 December, 2020; originally announced December 2020.

    Journal ref: The 15th International ARES Conference on Availability, Reliability and Security, August 25--28, 2020

  10. Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events

    Authors: Xiaoyu Du, Quan Le, Mark Scanlon

    Abstract: Case-hindering, multi-year digital forensic evidence backlogs have become commonplace in law enforcement agencies throughout the world. This is due to an ever-growing number of cases requiring digital forensic investigation coupled with the growing volume of data to be processed per case. Leveraging previously processed digital forensic cases and their component artefact relevancy classifications… ▽ More

    Submitted 2 December, 2020; originally announced December 2020.

    Journal ref: The 6th IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Dublin, Ireland, June 2020

  11. Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation

    Authors: Felix Anda, Brett A. Becker, David Lillis, Nhien-An Le-Khac, Mark Scanlon

    Abstract: Swift response to the detection of endangered minors is an ongoing concern for law enforcement. Many child-focused investigations hinge on digital evidence discovery and analysis. Automated age estimation techniques are needed to aid in these investigations to expedite this evidence discovery process, and decrease investigator exposure to traumatic material. Automated techniques also show promise… ▽ More

    Submitted 2 December, 2020; originally announced December 2020.

    Journal ref: The 6th IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Dublin, Ireland, June 2020

  12. Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT

    Authors: Aikaterini Kanta, Iwen Coisel, Mark Scanlon

    Abstract: In recent decades, criminals have increasingly used the web to research, assist and perpetrate criminal behaviour. One of the most important ways in which law enforcement can battle this growing trend is through accessing pertinent information about suspects in a timely manner. A significant hindrance to this is the difficulty of accessing any system a suspect uses that requires authentication via… ▽ More

    Submitted 2 December, 2020; originally announced December 2020.

    Journal ref: The 6th IEEE International Conference on Cyber Security and Protection of Digital Services (Cyber Security 2020)

  13. arXiv:2012.01107  [pdf, ps, other

    cs.MM cs.CR

    Retracing the Flow of the Stream: Investigating Kodi Streaming Services

    Authors: Samuel Todd Bromley, John Sheppard, Mark Scanlon, Nhien-An Le-Khac

    Abstract: Kodi is of one of the world's largest open-source streaming platforms for viewing video content. Easily installed Kodi add-ons facilitate access to online pirated videos and streaming content by facilitating the user to search and view copyrighted videos with a basic level of technical knowledge. In some countries, there have been paid child sexual abuse organizations publishing/streaming child ab… ▽ More

    Submitted 2 December, 2020; originally announced December 2020.

    Journal ref: Digital Forensics and Cyber Crime: 11th EAI International Conference on Digital Forensics and Cybercrime (ICDF2C), Boston, USA, September 2020

  14. Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning

    Authors: Felix Anda, David Lillis, Aikaterini Kanta, Brett A. Becker, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon

    Abstract: Achieving high performance for facial age estimation with subjects in the borderline between adulthood and non-adulthood has always been a challenge. Several studies have used different approaches from the age of a baby to an elder adult and different datasets have been employed to measure the mean absolute error (MAE) ranging between 1.47 to 8 years. The weakness of the algorithms specifically in… ▽ More

    Submitted 2 July, 2019; originally announced July 2019.

    Journal ref: 14th International Conference on Availability, Reliability and Security (ARES 2019), Canterbury, UK, August 2019

  15. Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts

    Authors: Xiaoyu Du, Mark Scanlon

    Abstract: The ever increasing volume of data in digital forensic investigation is one of the most discussed challenges in the field. Usually, most of the file artefacts on seized devices are not pertinent to the investigation. Manually retrieving suspicious files relevant to the investigation is akin to finding a needle in a haystack. In this paper, a methodology for the automatic prioritisation of suspicio… ▽ More

    Submitted 2 July, 2019; originally announced July 2019.

    Journal ref: 14th International Conference on Availability, Reliability and Security (ARES 2019), Canterbury, UK, August 2019

  16. arXiv:1904.02089  [pdf, other

    cs.CR

    Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices

    Authors: Asanka Sayakkara, Nhien-An Le-Khac, Mark Scanlon

    Abstract: Internet of Things (IoT) devices have expanded the horizon of digital forensic investigations by providing a rich set of new evidence sources. IoT devices includes health implants, sports wearables, smart burglary alarms, smart thermostats, smart electrical appliances, and many more. Digital evidence from these IoT devices is often extracted from third party sources, e.g., paired smartphone applic… ▽ More

    Submitted 3 April, 2019; originally announced April 2019.

    Comments: Digital Investigation, 2019

  17. A Survey of Electromagnetic Side-Channel Attacks and Discussion on their Case-Progressing Potential for Digital Forensics

    Authors: Asanka Sayakkara, Nhien-An Le-Khac, Mark Scanlon

    Abstract: The increasing prevalence of Internet of Things (IoT) devices has made it inevitable that their pertinence to digital forensic investigations will increase into the foreseeable future. These devices produced by various vendors often posses limited standard interfaces for communication, such as USB ports or WiFi/Bluetooth wireless interfaces. Meanwhile, with an increasing mainstream focus on the se… ▽ More

    Submitted 18 March, 2019; originally announced March 2019.

    Comments: Digital Investigation (2019)

  18. Shining a light on Spotlight: Leveraging Apple's desktop search utility to recover deleted file metadata on macOS

    Authors: Tajvinder Singh Atwal, Mark Scanlon, Nhien-An Le-Khac

    Abstract: Spotlight is a proprietary desktop search technology released by Apple in 2004 for its Macintosh operating system Mac OS X 10.4 (Tiger) and remains as a feature in current releases of macOS. Spotlight allows users to search for files or information by querying databases populated with filesystem attributes, metadata, and indexed textual content. Existing forensic research into Spotlight has provid… ▽ More

    Submitted 17 March, 2019; originally announced March 2019.

    Comments: Digital Investigation (2019)

  19. arXiv:1807.08265  [pdf

    cs.CR cs.AI cs.LG

    Deep learning at the shallow end: Malware classification for non-domain experts

    Authors: Quan Le, Oisín Boydell, Brian Mac Namee, Mark Scanlon

    Abstract: Current malware detection and classification approaches generally rely on time consuming and knowledge intensive processes to extract patterns (signatures) and behaviors from malware, which are then used for identification. Moreover, these signatures are often limited to local, contiguous sequences within the data whilst ignoring their context in relation to each other and throughout the malware f… ▽ More

    Submitted 22 July, 2018; originally announced July 2018.

    Journal ref: Digital Investigation, Volume 26, Supplement, 2018, Pages S118-S126, ISSN 1742-2876

  20. Digital forensic investigation of two-way radio communication equipment and services

    Authors: Arie Kouwen, Mark Scanlon, Kim-Kwang Raymond Choo, Nhien-An Le-Khac

    Abstract: Historically, radio-equipment has solely been used as a two-way analogue communication device. Today, the use of radio communication equipment is increasing by numerous organisations and businesses. The functionality of these traditionally short-range devices have expanded to include private call, address book, call-logs, text messages, lone worker, telemetry, data communication, and GPS. Many of… ▽ More

    Submitted 22 July, 2018; originally announced July 2018.

    Journal ref: Digital Investigation, Volume 26, Supplement, 2018, Pages S77-S86, ISSN 1742-2876

  21. arXiv:1712.05727  [pdf, ps, other

    cs.CR cs.NI

    Network Intell: Enabling the Non-Expert Analysis of Large Volumes of Intercepted Network Traffic

    Authors: Erwin van de Wiel, Mark Scanlon, Nhien-An Le-Khac

    Abstract: In criminal investigations, telecommunication wiretaps have become a common technique used by law enforcement. While phone-based wiretap** is well documented and the procedure for their execution are well known, the same cannot be said for Internet taps. Lawfully intercepted network traffic often contains a lot of encrypted traffic making it increasingly difficult to find useful information insi… ▽ More

    Submitted 27 January, 2018; v1 submitted 15 December, 2017; originally announced December 2017.

  22. Hierarchical Bloom Filter Trees for Approximate Matching

    Authors: David Lillis, Frank Breitinger, Mark Scanlon

    Abstract: Bytewise approximate matching algorithms have in recent years shown significant promise in de- tecting files that are similar at the byte level. This is very useful for digital forensic investigators, who are regularly faced with the problem of searching through a seized device for pertinent data. A common scenario is where an investigator is in possession of a collection of "known-illegal" files… ▽ More

    Submitted 12 December, 2017; originally announced December 2017.

  23. arXiv:1712.03455  [pdf, other

    cs.CR cs.NI

    Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies

    Authors: Mark Scanlon

    Abstract: The scalable, low overhead attributes of Peer-to-Peer (P2P) Internet protocols and networks lend themselves well to being exploited by criminals to execute a large range of cybercrimes. The types of crimes aided by P2P technology include copyright infringement, sharing of illicit images of children, fraud, hacking/cracking, denial of service attacks and virus/malware propagation through the use of… ▽ More

    Submitted 9 December, 2017; originally announced December 2017.

    Comments: This is a thesis submitted in fulfilment of a PhD in Digital Forensics and Cybercrime Investigation in the School of Computer Science, University College Dublin in October 2013

  24. arXiv:1712.02529  [pdf, other

    cs.CR

    Enabling the Remote Acquisition of Digital Forensic Evidence through Secure Data Transmission and Verification

    Authors: Mark Scanlon

    Abstract: Providing the ability to any law enforcement officer to remotely transfer an image from any suspect computer directly to a forensic laboratory for analysis, can only help to greatly reduce the time wasted by forensic investigators in conducting on-site collection of computer equipment. RAFT (Remote Acquisition Forensic Tool) is a system designed to facilitate forensic investigators by remotely gat… ▽ More

    Submitted 7 December, 2017; originally announced December 2017.

    Comments: A Thesis submitted in 2009 to the National University of Ireland, Dublin for the degree of M.Sc. (Research) in the School of Computer Science

  25. arXiv:1708.09053  [pdf

    cs.CR

    Increasing digital investigator availability through efficient workflow management and automation

    Authors: Ronald In de Braekt, Nhien-An Le-Khac, Jason Farina, Mark Scanlon, M-Tahar Kechadi

    Abstract: The growth of digital storage capacities and diversity devices has had a significant time impact on digital forensic laboratories in law enforcement. Backlogs have become commonplace and increasingly more time is spent in the acquisition and preparation steps of an investigation as opposed to detailed evidence analysis and reporting. There is generally little room for increasing digital investigat… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

  26. arXiv:1708.01732  [pdf

    cs.CR

    Private Web Browser Forensics: A Case Study of the Epic Privacy Browser

    Authors: Alan Reed, Mark Scanlon, Nhien-An Le-Khac

    Abstract: Organised crime, as well as individual criminals, is benefiting from the protection of private browsers provide to those who would carry out illegal activity, such as money laundering, drug trafficking, the online exchange of child-abuse material, etc. The protection afforded to users of the Epic Privacy Browser illustrates these benefits. This browser is currently in use in approximately 180 coun… ▽ More

    Submitted 4 January, 2018; v1 submitted 5 August, 2017; originally announced August 2017.

  27. arXiv:1708.01731  [pdf

    cs.CR

    Integration of Ether Unpacker into Ragpicker for plugin-based Malware Analysis and Identification

    Authors: Erik Schaefer, Nhien-An Le-Khac, Mark Scanlon

    Abstract: Malware is a pervasive problem in both personal computing devices and distributed computing systems. Identification of malware variants and their families others a great benefit in early detection resulting in a reduction of the analyses time needed. In order to classify malware, most of the current approaches are based on the analysis of the unpacked and unencrypted binaries. However, most of the… ▽ More

    Submitted 5 August, 2017; originally announced August 2017.

  28. arXiv:1708.01730  [pdf

    cs.CR

    Evaluation of Digital Forensic Process Models with Respect to Digital Forensics as a Service

    Authors: Xiaoyu Du, Nhien-An Le-Khac, Mark Scanlon

    Abstract: Digital forensic science is very much still in its infancy, but is becoming increasingly invaluable to investigators. A popular area for research is seeking a standard methodology to make the digital forensic process accurate, robust, and efficient. The first digital forensic process model proposed contains four steps: Acquisition, Identification, Evaluation and Admission. Since then, numerous pro… ▽ More

    Submitted 5 August, 2017; originally announced August 2017.

  29. Privileged Data within Digital Evidence

    Authors: Dominique Fleurbaaij, Mark Scanlon, Nhien-An Le-Khac

    Abstract: In recent years the use of digital communication has increased. This also increased the chance to find privileged data in the digital evidence. Privileged data is protected by law from viewing by anyone other than the client. It is up to the digital investigator to handle this privileged data properly without being able to view the contents. Procedures on handling this information are available, b… ▽ More

    Submitted 5 August, 2017; originally announced August 2017.

  30. EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution

    Authors: Mark Scanlon, Xiaoyu Du, David Lillis

    Abstract: Education and training in digital forensics requires a variety of suitable challenge corpora containing realistic features including regular wear-and-tear, background noise, and the actual digital traces to be discovered during investigation. Typically, the creation of these challenges requires overly arduous effort on the part of the educator to ensure their viability. Once created, the challenge… ▽ More

    Submitted 28 April, 2017; originally announced April 2017.

    Comments: Digital Forensic Research Workshop Europe 2017

    Journal ref: Digital Investigation, Volume 20, Supplement, March 2017, Pages S29-S36, ISSN 1742-2876

  31. arXiv:1610.05462  [pdf, other

    cs.CY cs.CR

    Towards the Leveraging of Data Deduplication to Break the Disk Acquisition Speed Limit

    Authors: Hannah Wolahan, Claudio Chico Lorenzo, Elias Bou-Harb, Mark Scanlon

    Abstract: Digital forensic evidence acquisition speed is traditionally limited by two main factors: the read speed of the storage device being investigated, i.e., the read speed of the disk, memory, remote storage, mobile device, etc.), and the write speed of the system used for storing the acquired data. Digital forensic investigators can somewhat mitigate the latter issue through the use of high-speed sto… ▽ More

    Submitted 20 October, 2016; v1 submitted 18 October, 2016; originally announced October 2016.

  32. arXiv:1610.00248  [pdf, other

    cs.CY cs.CR cs.IR

    Battling the Digital Forensic Backlog through Data Deduplication

    Authors: Mark Scanlon

    Abstract: In everyday life. Technological advancement can be found in many facets of life, including personal computers, mobile devices, wearables, cloud services, video gaming, web-powered messaging, social media, Internet-connected devices, etc. This technological influence has resulted in these technologies being employed by criminals to conduct a range of crimes -- both online and offline. Both the numb… ▽ More

    Submitted 2 October, 2016; originally announced October 2016.

    Comments: Scanlon, M., Battling the Digital Forensic Backlog through Data Deduplication, 6th IEEE International Conference on Innovative Computing Technology (INTECH 2016), Dublin, Ireland, August 2016

  33. arXiv:1604.03850  [pdf, other

    cs.CR cs.CY

    Current Challenges and Future Research Areas for Digital Forensic Investigation

    Authors: David Lillis, Brett Becker, Tadhg O'Sullivan, Mark Scanlon

    Abstract: Given the ever-increasing prevalence of technology in modern life, there is a corresponding increase in the likelihood of digital devices being pertinent to a criminal investigation or civil litigation. As a direct consequence, the number of investigations requiring digital forensic expertise is resulting in huge digital evidence backlogs being encountered by law enforcement agencies throughout th… ▽ More

    Submitted 13 April, 2016; originally announced April 2016.

    Comments: The 11th ADFSL Conference on Digital Forensics, Security and Law (CDFSL 2016), Daytona Beach, Florida, USA, May 2016

  34. Tiered Forensic Methodology Model for Digital Field Triage by Non-Digital Evidence Specialists

    Authors: Ben Hitchcock, Nhien-An Le-Khac, Mark Scanlon

    Abstract: Due to budgetary constraints and the high level of training required, digital forensic analysts are in short supply in police forces the world over. This inevitably leads to a prolonged time taken between an investigator sending the digital evidence for analysis and receiving the analytical report back. In an attempt to expedite this procedure, various process models have been created to place the… ▽ More

    Submitted 13 April, 2016; originally announced April 2016.

    Journal ref: Digital Investigation, Volume 16, Number 1, Pages 75-85, ISSN 1742-2876, March 2016

  35. arXiv:1510.00664  [pdf, other

    cs.DC cs.CR cs.NI

    Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Noninvasive Wiretaps

    Authors: Hessel Schut, Mark Scanlon, Jason Farina, Nhien-An Le-Khac

    Abstract: When conducting modern cybercrime investigations, evidence has often to be gathered from computer systems located at cloud-based data centres of hosting providers. In cases where the investigation cannot rely on the cooperation of the hosting provider, or where documentation is not available, investigators can often find the identification of which distinct server among many is of interest difficu… ▽ More

    Submitted 2 October, 2015; originally announced October 2015.

    Comments: Proceedings of 10th International Conference on Availability, Reliability and Security (ARES 2015)

  36. arXiv:1510.00661  [pdf, other

    cs.CR cs.CY cs.NI

    HTML5 Zero Configuration Covert Channels: Security Risks and Challenges

    Authors: Jason Farina, Mark Scanlon, Stephen Kohlmann, Nhien-An Le Khac, M-Tahar Kechadi

    Abstract: In recent months there has been an increase in the popularity and public awareness of secure, cloudless file transfer systems. The aim of these services is to facilitate the secure transfer of files in a peer-to- peer (P2P) fashion over the Internet without the need for centralised authentication or storage. These services can take the form of client installed applications or entirely web browser… ▽ More

    Submitted 2 October, 2015; originally announced October 2015.

    Comments: 15 pages; Proc. of Tenth ADFSL Conference on Digital Forensics, Security and Law (CDFSL 2015)

  37. arXiv:1510.00651  [pdf, other

    cs.CR

    Project Maelstrom: Forensic Analysis of the BitTorrent-Powered Browser

    Authors: Jason Farina, M-Tahar Kechadi, Mark Scanlon

    Abstract: In April 2015, BitTorrent Inc. released their distributed peer-to-peer powered browser, Project Maelstrom, into public beta. The browser facilitates a new alternative website distribution paradigm to the traditional HTTP-based, client-server model. This decentralised web is powered by each of the visitors accessing each Maelstrom hosted website. Each user shares their copy of the website's source… ▽ More

    Submitted 2 October, 2015; originally announced October 2015.

    Journal ref: Journal of Digital Forensics, Security and Law (Proc. of 10th International Conference on Systematic Approaches to Digital Forensic Engineering, SADFE 2015)

  38. Network investigation methodology for BitTorrent Sync: A Peer-to-Peer based file synchronisation service

    Authors: Mark Scanlon, Jason Farina, M-Tahar Kechadi

    Abstract: High availability is no longer just a business continuity concern. Users are increasingly dependant on devices that consume and produce data in ever increasing volumes. A popular solution is to have a central repository which each device accesses after centrally managed authentication. This model of use is facilitated by cloud based file synchronisation services such as Dropbox, OneDrive, Google D… ▽ More

    Submitted 3 June, 2015; originally announced June 2015.

    Comments: in Computers and Security 2015

    ACM Class: K.6.m; C.2.1

  39. arXiv:1409.8493  [pdf, ps, other

    cs.NI cs.CR

    Digital Evidence Bag Selection for P2P Network Investigation

    Authors: Mark Scanlon, M-Tahar Kechadi

    Abstract: The collection and handling of court admissible evidence is a fundamental component of any digital forensic investigation. While the procedures for handling digital evidence take much of their influence from the established policies for the collection of physical evidence, due to the obvious differences in dealing with non-physical evidence, a number of extra policies and procedures are required.… ▽ More

    Submitted 30 September, 2014; originally announced September 2014.

    Comments: The 7th International Symposium on Digital Forensics and Information Security (DFIS-2013); Future Information Technology, Application, and Service

  40. arXiv:1409.8490  [pdf

    cs.CR cs.NI

    The Case for a Collaborative Universal Peer-to-Peer Botnet Investigation Framework

    Authors: Mark Scanlon, M-Tahar Kechadi

    Abstract: Peer-to-Peer (P2P) botnets are becoming widely used as a low-overhead, efficient, self-maintaining, distributed alternative to the traditional client/server model across a broad range of cyberattacks. These cyberattacks can take the form of distributed denial of service attacks, authentication cracking, spamming, cyberwarfare or malware distribution targeting on financial systems. These attacks ca… ▽ More

    Submitted 30 September, 2014; originally announced September 2014.

    Comments: 9th International Conference on Cyber Warfare and Security (ICCWS-2014)

  41. arXiv:1409.8489  [pdf, other

    cs.CR cs.NI

    BitTorrent Sync: Network Investigation Methodology

    Authors: Mark Scanlon, Jason Farina, M-Tahar Kechadi

    Abstract: The volume of personal information and data most Internet users find themselves amassing is ever increasing and the fast pace of the modern world results in most requiring instant access to their files. Millions of these users turn to cloud based file synchronisation services, such as Dropbox, Microsoft Skydrive, Apple iCloud and Google Drive, to enable "always-on" access to their most up-to-date… ▽ More

    Submitted 30 September, 2014; originally announced September 2014.

    Comments: 9th International Conference on Availability, Reliability and Security (ARES 2014)

  42. arXiv:1409.8486  [pdf, other

    cs.CR cs.CY

    Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on BitTorrent Sync

    Authors: Mark Scanlon, Jason Farina, Nhien An Le Khac, Tahar Kechadi

    Abstract: File synchronization services such as Dropbox, Google Drive, Microsoft OneDrive, Apple iCloud, etc., are becoming increasingly popular in today's always-connected world. A popular alternative to the aforementioned services is BitTorrent Sync. This is a decentralized/cloudless file synchronization service and is gaining significant popularity among Internet users with privacy concerns over where th… ▽ More

    Submitted 30 September, 2014; originally announced September 2014.

    Comments: Special Issue on Proc. of Sixth International Conference on Digital Forensics & Cyber Crime, ICDF2C'14, Journal of Digital Forensics, Security and Law, Vol 9, No 2, September 2014

  43. BitTorrent Sync: First Impressions and Digital Forensic Implications

    Authors: Jason Farina, Mark Scanlon, M-Tahar Kechadi

    Abstract: With professional and home Internet users becoming increasingly concerned with data protection and privacy, the privacy afforded by popular cloud file synchronisation services, such as Dropbox, OneDrive and Google Drive, is coming under scrutiny in the press. A number of these services have recently been reported as sharing information with governmental security agencies without warrants. BitTorre… ▽ More

    Submitted 29 September, 2014; originally announced September 2014.

    Comments: Proc. of Digtial Forensics Research Workshop (DFRWS EU 2014)

    Journal ref: Digital Investigation, Volume 11, Supplement 1, Pages S77-S86, (2014)

  44. arXiv:1409.8171  [pdf, other

    cs.NI cs.CY

    An Analysis of BitTorrent Cross-Swarm Peer Participation and Geolocational Distribution

    Authors: Mark Scanlon, Huijie Shen

    Abstract: Peer-to-Peer (P2P) file-sharing is becoming increasingly popular in recent years. In 2012, it was reported that P2P traffic consumed over 5,374 petabytes per month, which accounted for approximately 20.5% of consumer internet traffic. TV is the popular content type on The Pirate Bay (the world's largest BitTorrent indexing website). In this paper, an analysis of the swarms of the most popular pira… ▽ More

    Submitted 29 September, 2014; originally announced September 2014.

    Comments: The First International Workshop on Hot Topics in Big Data and Networking (HotData I)