31 lines
4.5 KiB
TeX
31 lines
4.5 KiB
TeX
\newcommand{\introauthor}{Miha Frangež}
|
|
%
|
|
% The first few paragraphs don't really change between years
|
|
%
|
|
Digital forensics is a pivotal branch of forensic science dedicated to the recovery and investigation of materials found in
|
|
digital devices. Originally synonymous with computer forensics, the field of digital forensics has expanded significantly
|
|
to encompass the examination of all digital data storage devices. Its roots can be traced back to the personal computer
|
|
revolution of the late 1970s and early 1980s, evolving through the 1990s without formal organization until the emergence
|
|
of national guidelines in the 21st century.
|
|
\par
|
|
Digital forensic investigations serve diverse purposes, primarily to substantiate or challenge hypotheses in both criminal
|
|
and civil court proceedings. In criminal cases, these investigations support allegations of offenses such as murder, theft,
|
|
and personal assault. In civil cases, they safeguard individuals’ rights and property, often addressing disputes ranging
|
|
from family matters to contractual conflicts among economic entities. The field also extends into electronic discovery,
|
|
crucial in modern litigation.
|
|
\par
|
|
This conference gathers the seminar papers of master’s students at the Faculty of Computer Science and Information,
|
|
University of Ljubljana \yearstart/\yearstart. It explores a variety of topics including mobile forensics, logs, password forensics
|
|
and cyphering, browser forensics and forensic investigation. Each paper contributes to the ongoing development and
|
|
application of digital forensic techniques, enhancing our ability to navigate the complexities of today’s digital landscape.
|
|
%
|
|
% Here, add a one-paragraph summary for each of the categories/topics
|
|
%
|
|
\par
|
|
Multiple papers focus on Internet of Things devices and automotive systems, reflecting the increasing integration of cloud-connected technologies in everyday objects. One paper presents cloud forensic analysis of iRobot Roomba vacuum cleaners, demonstrating how household IoT devices can contain valuable digital evidence. Two papers examine vehicle forensics through cloud data analysis: one investigates forensic vehicle event reconstruction using mobile car insurance application data for hit-and-run cases, while another provides a comprehensive forensic analysis of vehicle cloud data systems. These works highlight the forensic potential of connected vehicles and IoT devices in modern investigations.
|
|
\par
|
|
In files and systems forensics, fundamental aspects of file systems and storage media are addressed, covering both traditional and gaming platforms. One paper applies digital stratigraphy concepts to recycled storage media problems, offering new approaches to data recovery from reused storage devices. Another examines forensic aspects of complex file systems, addressing challenges in analyzing modern storage architectures. Two papers focus on gaming platform forensics: one extends forensic analysis of Steam Deck devices, while another conducts cross-platform studies inspired by Nintendo 3DS residual data analysis, demonstrating the forensic value of gaming device artifacts.
|
|
\par
|
|
In mobile forensics, various aspects of mobile device examination are explored, from image analysis to comprehensive device investigation. One paper analyzes deterministic and heuristic approaches to JPEG fragmentation detection, important for recovering corrupted or partially deleted images. Another investigates the accuracy of geolocation metadata in smartphone images, crucial for establishing location evidence. The third provides a targeted overview of mobile device forensics, offering comprehensive insights into current methodologies and challenges in examining smartphones and tablets for digital evidence.
|
|
\par
|
|
Finally, the miscellaneous category covers diverse digital forensic topics span malware detection, cryptocurrency forensics, temporal analysis, and audio forensics. One paper presents WARNE, a specialized tool for collecting evidence of stalkerware, addressing the growing concern of privacy violations through malicious surveillance software. Another explores cryptocurrency mining detection through traffic forensics, providing methods to identify unauthorized mining activities on networks. A third paper examines timestamp accuracy and time anchors across different operating systems, crucial for establishing digital evidence timelines. The final work enhances speaker identification in criminal investigations through advanced clusterization and rank-based scoring techniques, improving the reliability of audio evidence analysis.
|