70 likes | 177 Views
Computer Forensics. CSI CSCI Pattern Matching. Andrew Burns Brian Norton. Forensics: Broad areas of study. Prevention Detection Analysis Steganography. Examples of Pattern Matching:. Steganography/Cryptology Use in everyday End-User computers
E N D
Computer Forensics CSI CSCI Pattern Matching Andrew Burns Brian Norton
Forensics:Broad areas of study • Prevention • Detection • Analysis • Steganography
Examples of Pattern Matching: • Steganography/Cryptology • Use in everyday End-User computers • Use in sophisticated projects such as human genome sequencing, law enforcement, journalism • Pattern Matching - our area of study in this project
Iranian News photo(s) released to Agence France-Presse July 2008 Major US news outlets issue retractions days later.
Project Description • Where we hope to go: • To develop a Pattern Matching program • For now: • Use of PX Binary Viewer • Preview of C Program • Later Steps: • MD5 Algorithms • System Baselining similar to a photograph - used as comparison tool.
References • Computer Forensics Laboratory and Tools, G. A. Francia III and K. Clinton: Jacksonville State University - JCSC 20, 6 (June 2005) • Network Forensics, “Surviving Network Attacks” Ben Laurie, AL Digital, Queue, June 2004, pp 50-56 • Criminal Computer Forensics Management Ray Yeager, Kennesaw State University pp 168-174 • Wikipedia • “The role of key loggers in computer-based assessment forensics” • “System Baseling - A Forensic Perspective” K. Monroe, D Bailey • Invitation to Computer Science 3rd Ed. Schneider and Gersting