• Title/Summary/Keyword: Forensic Analysis Tool

Search Result 49, Processing Time 0.028 seconds

Analysis on Smishing Attack Trends and Mobile Forensic (스미싱 공격 동향 분석 및 Mobile Forensic)

  • Noh, Jung-Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.394-397
    • /
    • 2014
  • Most of Koreans have smartphone. By using smartphone, they have done internet-banking, e-commerce and private scheduling. However, convenience of smart phone has been made side effect such as tool of fraud and crime. Especially, Smishing on smartphone has been increased rapidly since 2013. Smishing have utilized social-engineering technique with social issue such as Korean near-sea cruse ship, 'Sewol-Ho', Sinking and traditional thanks-giving holiday, 'Chu-Seok', etc. This paper proposed the oncoming trend of smishing on smartphone after 2014. This paper also analyzed the process and technique of smishing on internal financial fraud. It also covered smartphone forensic for using legal evidence. By discovering the connectivity of smishing and financial fraud, this paper could be reference for social security on smartphone.

  • PDF

Analysis of ethyl glucuronide (EtG) in Hair for the diagnosis of chronic alcohol abuse of Korean (한국인의 만성 알코올 중독 진단을 위한 모발에서 Ethyl Glucuronide (EtG) 분석법 연구)

  • Gong, Bokyoung;Jo, Young-Hoon;Ju, Soyeong;Min, Ji-Sook;Kwon, Mia
    • Analytical Science and Technology
    • /
    • v.33 no.3
    • /
    • pp.151-158
    • /
    • 2020
  • Alcohol, which can easily be obtained in the same way as ordinary beverages, is harmful enough to cause death due to excessive drinking and chronic alcohol intake, so it is important to maintain a proper amount of drinking and healthy drinking habits. In addition, the incidence of behavioral disturbances and impaired judgments that can be caused by chronic alcohol drinking of more than adequate amounts of alcohol is also significant. Accordingly it is very useful for forensic science to check whether the person involved is drunken or is alcoholism state in various accidents. Currently, in Korea, alcohol consumption is determined by detecting the level of alcohol or alcohol metabolism 'ethyl glucuronide (EtG)' in blood or urine samples. However, analysis of alcohol or EtG in blood or urine can only provide information about the current state of alcohol consumption because of a narrow window of detection time. Therefore, it is important to analyze the EtG as a long-term direct alcohol metabolite bio-marker in human hair and to investigate relationship between alcohol consumption and EtG concentration for the evaluation of chronic ethanol consumption. In this study, we established an analytical method for the detection of EtG in Korean hair efficiently and validated selectivity, linearity, limits of detection (LOD), limits of quantification (LOQ), matrix effect, recovery, process efficiency, accuracy and precision using liquid chromatography tandem mass spectrometry (LC-MS/MS). In addition, the assay performance was evaluated in Korean social drinker's hair and the postmortem hair of a chronic alcoholism. The results of this study can be useful in monitoring the alcohol abuse of Korean in clinical cases and legal procedures related to custody and provide a useful tool to evaluate postmortem diagnosis of alcoholic ketoacidosis in forensics.

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

Composition of volatile organic components on ballpoint pen inks by HS-SPME GC/MS (HS-SPME GC/MS를 이용한 볼펜잉크의 휘발성 성분 분석)

  • Choi, Mi-Jung;Kim, Chang-Seong;Sun, Yale-Shik;Park, Sung-Woo
    • Analytical Science and Technology
    • /
    • v.23 no.4
    • /
    • pp.414-422
    • /
    • 2010
  • In forensic examinations of question document, analysis about inks components and the dating of ink entries is often of considerable importance and forensic examination of inks is principally concerned with the classification and comparison of chemically complex mixtures. The authenticity about inks analysis of a questioned document may be examined through the analysis of inks used to TLC, HPLC/MS, GC/MS, LDI/MS. We collected 56 difference types of black ballpoint pen inks manufactured from 5 country groups. We identified major 6 species volatile organic components (VOCs), ethylbenzene ($0.089-0.244\;{\mu}g$/mL), o-xylene ($0.072-0.331\;{\mu}g$/mL), m,p-xylene ($0.062-0.318\;{\mu}g$/mL), benzene ($0.003-0.173\;{\mu}g$/mL), 1,1-dichloroethylene ($0.003-0.295\;{\mu}g$/mL), toluene ($0.007-0.484\;{\mu}g$/mL) using HS-SPME GC/MS. The results of this study indicated that determined VOCs of black ballpoint pen inks could make a discriminating tool of inks analysis for forensic question document and can supply methodology for classification and identification of between ballpoints pen inks.

Android Log Cat Systems Research for Privacy (개인정보보호를 위한 안드로이드 로그캣 시스템 연구)

  • Jang, Hae-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.101-105
    • /
    • 2012
  • Various social problems through violating personal information and privacy are growing with the rapid spread of smartphones. For this reason, variety of researches and technology developments to protect personal information being made. The smartphone, contains almost all of the personal information, can cause data spill at any time. Collecting or analyzing evidence is not an easy job with forensic analyzing tool. Android forensics research has been focused on techniques to collect and analyze data from non-volatile memory but research for volatile data is very slight. Android log is the non-volatile data that can be collected by volatile storage. It is enough to use as a material to track the usage of the Android phone because all of the recent driven records from system to application are stored. In this paper, we propose a method to respond to determining the existence of personal information leakage by filtering logs without forensic analysis tools.

A study on the Effective Selection of the Personal Information Audit Subject Using Digital Forensic (디지털 포렌식 기법을 활용한 효율적인 개인정보 감사 대상 선정 방안 연구)

  • Cheon, Jun-Young;Lee, Sang-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.5
    • /
    • pp.494-500
    • /
    • 2014
  • Recently the leak of personal information from in-house and contract-managed companies has been continually increasing, which leads a regular observation on outsourcing companies that perform the personal information management system to prevent dangers from the leakage, stolen and loss of personal information. However, analyzing many numbers of computers in limited time has found few difficulties in some circumstances-such as outsourcing companies that own computers that have personal information system or task continuities that being related to company's profits. For the reason, it is necessary to select an object of examination through identifying a high-risk of personal data leak. In this paper, this study will formulate a proposal for the selection of high-risk subjects, which is based on the user interface, by digital forensic. The study designs the integrated analysis tool and demonstrates the effects of the tool through the test results.

A Study of Method to Restore Deduplicated Files in Windows Server 2012 (윈도우 서버 2012에서 데이터 중복 제거 기능이 적용된 파일의 복원 방법에 관한 연구)

  • Son, Gwancheol;Han, Jaehyeok;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1373-1383
    • /
    • 2017
  • Deduplication is a function to effectively manage data and improve the efficiency of storage space. When the deduplication is applied to the system, it makes it possible to efficiently use the storage space by dividing the stored file into chunks and storing only unique chunk. However, the commercial digital forensic tool do not support the file system analysis, and the original file extracted by the tool can not be executed or opened. Therefore, in this paper, we analyze the process of generating chunks of data for a Windows Server 2012 system that can apply deduplication, and the structure of the resulting file(Chunk Storage). We also analyzed the case where chunks that are not covered in the previous study are compressed. Based on these results, we propose the method to collect deduplicated data and reconstruct the original file for digital forensic investigation.

DNAchip as a Tool for Clinical Diagnostics (진단의학 도구로서의 DNA칩)

  • 김철민;박희경
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2004.04a
    • /
    • pp.97-100
    • /
    • 2004
  • The identification of the DNA structure as a double-stranded helix consting of two nucleotide chain molecules was a milestone in modern molecular biology. The DNA chip technology is based on reverse hybridization that follows the principle of complementary binding of double-stranded DNA. DNA chip can be described as the deposition of defined nucleic acid sequences, probes, on a solid substrate to form a regular array of elements that are available for hybridization to complementary nucleic acids, targets. DNA chips based on cDNA clons, oligonucleotides and genomic clons have been developed for gene expression studies, genetic variation analysis and genomic changes associated with disease including cancers and genetic diseases. DNA chips for gene expression profiling can be used for functional analysis in human eel Is and animal models, disease-related gene studies, assessment of gene therapy, assessment of genetically modified food, and research for drug discovery. DNA chips for genetic variation detection can be used for the detection of mutations or chromosomal abnormalities in cnacers, drug resistances in cancer cells or pathogenic microbes, histocompatibility analysis for transplantation, individual identification for forensic medicine, and detection and discrimination of pathogenic microbes. The DNA chip will be generalized as a useful tool in clinical diagnostics in near future. Lab-on-a chip and informatics will facilitate the development of a variety of DNA chips for diagnostic purpose.

  • PDF

A Study for Detection of the Kernel Backdoor Attack and Design of the restoration system (커널 백도어 공격 탐지 및 복구시스템 설계에 관한 연구)

  • Jeon, Wan-Keun;Oh, Im-Geol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.3
    • /
    • pp.104-115
    • /
    • 2007
  • As soon as an intrusion is detected by kernel backdoor, the proposed method can be preserve secure and trustworthy evidence even in a damaged system. As an experimental tool, we implement a backup and analysis system, which can be response quickly, to minimize the damages. In this paper, we propose a method, which can restore the deleted log file and analyze the image of a hard disk, to be able to expose the location of a intruder.

  • PDF

Digital forensic framework for illegal footage -Focused On Android Smartphone- (불법 촬영물에 대한 디지털 포렌식 프레임워크 -안드로이드 스마트폰 중심으로-)

  • Kim, Jongman;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.39-54
    • /
    • 2018
  • Recently, discussions for the eradication of illegal shooting have been carried out in a socially-oriented way. The government has established comprehensive measures to eradicate cyber sexual violence crimes such as illegal shooting. Although the social interest in illegal shooting has increased, the illegal film shooting case is evolving more and more due to the development of information and communication technology. Applications that can hide confused videos are constantly circulating around the market and community sites. As a result, field investigators and professional analysts are experiencing difficulties in collecting and analyzing evidence. In this paper, we propose an evidence collection and analysis framework for illegal shooting cases in order to give practical help to illegal shooting investigation. We also proposed a system that can detect hidden applications, which is one of the main obstacles in evidence collection and analysis. We developed a detection tool to evaluate the effectiveness of the proposed system and confirmed the feasibility and scalability of the system through experiments using commercially available concealed apps.