• Title/Summary/Keyword: forensic technology

Search Result 302, Processing Time 0.029 seconds

Android Log Cat Systems Research for Privacy (개인정보보호를 위한 안드로이드 로그캣 시스템 연구)

  • Jang, Hae-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.101-105
    • /
    • 2012
  • Various social problems through violating personal information and privacy are growing with the rapid spread of smartphones. For this reason, variety of researches and technology developments to protect personal information being made. The smartphone, contains almost all of the personal information, can cause data spill at any time. Collecting or analyzing evidence is not an easy job with forensic analyzing tool. Android forensics research has been focused on techniques to collect and analyze data from non-volatile memory but research for volatile data is very slight. Android log is the non-volatile data that can be collected by volatile storage. It is enough to use as a material to track the usage of the Android phone because all of the recent driven records from system to application are stored. In this paper, we propose a method to respond to determining the existence of personal information leakage by filtering logs without forensic analysis tools.

Simultaneous Determination of Cannabidiol, Cannabinol, and ${\Delta}^9-Tetrahydrocannabinol$ in Human Hair by Gas Chromatography-Mass Spectrometry

  • Kim Jin Young;Suh Sung Ill;In Moon Kyo;Paeng Ki-Jung;Chung Bong Chul
    • Archives of Pharmacal Research
    • /
    • v.28 no.9
    • /
    • pp.1086-1091
    • /
    • 2005
  • An analytical method was developed for evaluating the cannabidiol (CBO), cannabinol (CBN), ${\Delta}^9-tetrahydrocannabinol$ $({\Delta}^9-THC)$ level in human hair using gas chromatography-mass spectrometry (GC-MS). Hair samples (50mg) were washed with isopropyl alcohol and cut into small fragments (< 1mm). After adding a deuterated internal standard, the hair samples were incubated in 1.0M NaOH for 10 min at $95^{\circ}C$. The analytes from the resulting hydrolyzed samples were extracted using a mixture of n-hexane-ethyl acetate (75:25, v/v). The extracts were then evaporated, derivatized, and injected into the GC-MS. The recovery ranges of CBD, CBN, and ${\Delta}^9-THC$ at three concentration levels were $37.9-94.5\%$ with good correlation coefficients $(r^2>0.9989)$. The intra-day precision and accuracy ranged from $-9.4\%\;to\;17.7\%$, and the inter-day precision and accuracy ranged from $-15.5\%\;to\;14.5\%$, respectively. The limits of detection (LOD) for CBD, CBN, and ${\Delta}^9-THC$ were 0.005, 0.002, and 0.006 ng/mg, respectively. The applicability of this method of analyzing the hair samples from cannabis abusers was demonstrated.

Analyzing Past User History through Recovering Deleted $UsnJrnl file (삭제된 $UsnJrnl 파일 복구를 통한 과거 사용자 행위 확인)

  • Kim, Dong-Geon;Park, Seok-Hyeon;Jo, Ohyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.5
    • /
    • pp.23-29
    • /
    • 2020
  • These days, digital forensic technologies are being used frequently at crime scenes. There are various electronic devices at the scene of the crime, and digital forensic results of these devices are used as important evidence. In particular, the user's action and the time when the action took place are critical. But there are many limitations for use in real forensics analyses because of the short cycle in which user actions are recorded. This paper proposed an efficient method for recovering deleted user behavior records and applying them to forensics investigations, then the proposed method is compared with previous methods. Although there are difference in recovery result depending on the storage, the results have been identified that the amount of user history data is increased from a minimum of 6% to a maximum of 539% when recovered user behavior was utilized to forensics investigation.

A Study of Using the Car's Black Box to generate Real-time Forensic Data (자동차의 블랙박스를 이용한 실시간 포렌식 자료 생성 연구)

  • Park, Dea-Woo;Seo, Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.253-260
    • /
    • 2008
  • This paper is based on the ubiquitous network of telematics technology, equipped with a black box to the car by a unique address given to IPv6. The driver's black box at startup and operation of certification, and the car's driving record handling video signals in real-time sensor signals handling to analyze the records. Through the recorded data is encrypted transmission, and the Ubiquitous network of base stations, roadside sensors through seamless mobility and location tracking data to be generated. This is a file of Transportation Traffic Operations Center as a unique address IPv6 records stored in the database. The car is equipped with a black box used on the road go to Criminal cases, the code automotive black boxes recovered from the addresses and IPv6, traffic records stored in a database to compare the data integrity verification and authentication via secure. This material liability in the courtroom and the judge Forensic data are evidence of the recognition as a highly secure. convenient and knowledge in the information society will contribute to human life.

  • PDF

A Study of Real Time Security Cooperation System Regarding Hacker's Attack (해커의 공격에 대한 실시간 보안공조시스템 연구)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.285-288
    • /
    • 2010
  • Chinese hackers hack the e-commerce site by bypass South Korea IP to connect to the third country, finance damaging a violation incident that fake account. 7.7.DDoS attack was the case of a hacker attack that paralyzed the country's main site. In this paper, the analysis is about vulnerabilities that breaches by hackers and DDoS attacks. Hacker's attacks and attacks on the sign of correlation analysis is share the risk rating for in real time, Red, Orange, Yellow, Green. Create a blacklist of hackers and real-time attack will be studied security and air conditioning systems that attacks and defend. By studying generate forensic data and confirmed in court as evidence of accountability through IP traceback and detection about packet after Incident, contribute to the national incident response and development of forensic techniques.

  • PDF

Assembly of Magnetic Nano-Fe3O4@GSH-Au NCs Core-Shell Microspheres for the Visualization of Latent Fingerprints

  • Huang, Rui;Tang, Tingting
    • Nano
    • /
    • v.13 no.11
    • /
    • pp.1850128.1-1850128.10
    • /
    • 2018
  • Glutathione (GSH), the protective agent and reducing agent, has been widely used to prepare gold nanoclusters (GSH-Au NCs) with stable fluorescence properties and negative charge of the surface. Meanwhile, polyethyleneimine (PEI) was used as the modification agent to synthesize magnetic ferroferric oxide nanoparticles ($Fe_3O_4$) with fantastic dispersibility and positive charge of the surface. Based on the electrostatic adsorption force, magnetic nano-$Fe_3O_4@GSH-Au$ NCs core-shell microspheres composed of magnetic $Fe_3O_4$ nanoparticles modified by PEI as the core and GSH-Au NCs as the shell were assembled. The prepared $Fe_3O_4@GSH-Au$ NCs microspheres harbored a uniform size (88.6 nm), high magnetization (29.2 emu/g) and excellent fluorescence. Due to the coordination bond action between Au atom and sulfhydryl (-SH), amino ($-NH_2$), carboxyl (-COOH) in sweat, $Fe_3O_4@GSH-Au$ NCs could combine with latent fingerprints. In addition, $Fe_3O_4@GSH-Au$ NCs with good fluorescence and magnetism could detect fingerprints on various objects. Significantly, the powders were not easy to suspend in the air, which avoided the damage to the health of forensic experts and the fingerprints by only powder contacting. Above all, $Fe_3O_4@GSH-Au$ NCs was successfully applied to the latent fingerprint visualization, which has great potential in forensic science.

A Study on IoT based Forensic Policy for Early Warning System of Plant & Animal as A Subsystem of National Disaster Response and Management (국가재난형 동·식물 조기경보시스템을 위한 IOT기반의 포렌식 정책 연구)

  • Chung, Ho-jin;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.295-298
    • /
    • 2014
  • In recently, a climatic change(such as subtropical climate and frequent unusual high temperature) and the open-trade policies of agricultural & livestock products are increasing the outbreak risk of highly pathogenic avian influenza(HPAI) and foot and mouth disease(FMD), and accordingly the socio-economic damage and impacts are also increasing due to the cases such as damage from the last 5 times of FMD outbreak(3,800 billion won), from 10 years public control cost of Pine Wilt Disease (PWD)(238.3 billion won), and from the increased invasive pests of exotic plant like isoptera. Therefore, the establishment of new operation strategy of IoT(Internet of Things) based satellite early warning system(SEWS) for plants and animals as a subsystem of national disaster response and management system is being required, where the forensic technology & measures should be applied as a government policy to estimate the post compensation and to carry out the legal responsibility.

  • PDF

False positive and false negative reactions of acidic hydrogen peroxide for enhancing blood (Acidic hydrogen peroxide로 혈액을 증강할 때의 위양성 및 위음성 반응)

  • Lee, Wonyoung;Hong, Sungwook
    • Analytical Science and Technology
    • /
    • v.35 no.3
    • /
    • pp.124-128
    • /
    • 2022
  • Blood-sensitive reagents may exhibit false positives or negatives under the influence of substances other than blood. Since these reactions lead to the misinterpretation of blood evidence, it is essential to investigate the possibility of false-positive and -negative reactions of blood-sensitive reagents. Acidic hydrogen peroxide (AHP) is a recently discovered blood-sensitive reagent, and it is not yet known whether it causes false-positive or -negative reactions. To confirm this, 20 µL of blood was placed on metal surfaces, plastic surfaces, paper surfaces, paint surfaces, foods, vegetable oils, detergents, and petroleum hydrocarbons, and then AHP was applied. The blood was observed through an orange filter under a 505-nm light source, and no false-positive or false-negative reactions were observed with any of the substances/materials. However, it was confirmed that polyethylene terephthalate surfaces, polyvinylchloride surfaces, some paint surfaces, and foods exhibit their own photoluminescence under the conditions of blood observation, which interferes with blood observation.

The development of encoded porous silicon nanoparticles and application to forensic purpose (코드화 다공성 실리콘 나노입자의 개발 및 법과학적 응용)

  • Shin, Yeo-Ool;Kang, Sanghyuk;Lee, Joonbae;Paeng, Ki-Jung
    • Analytical Science and Technology
    • /
    • v.22 no.3
    • /
    • pp.247-253
    • /
    • 2009
  • Porous silicon films are electrochemically etched from crystalline silicon wafers in an aqueous solution of hydrofluoric acid(HF). Careful control of etching conditions (current density, etch time, HF concentration) provides films with precise, reproducible physical parameters (morphology, porosity and thickness). The etched pattern could be varied due to (1) current density controls pore size (2) etching time determines depth and (3) complex layered structures can be made using different current profiles (square wave, triangle, sinusoidal etc.). The optical interference spectrum from Fabry-Perot layer has been used for forensic applications, where changes in the optical reflectivity spectrum confirm the identity. We will explore a method of identifying the specific pattern code and can be used for identities of individual code with porous silicon based encoded nanosized smart particles.

A Study on Elemental Technology Identification of Sound Data for Audio Forensics (오디오 포렌식을 위한 소리 데이터의 요소 기술 식별 연구)

  • Hyejin Ryu;Ah-hyun Park;Sungkyun Jung;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.115-127
    • /
    • 2024
  • The recent increase in digital audio media has greatly expanded the size and diversity of sound data, which has increased the importance of sound data analysis in the digital forensics process. However, the lack of standardized procedures and guidelines for sound data analysis has caused problems with the consistency and reliability of analysis results. The digital environment includes a wide variety of audio formats and recording conditions, but current audio forensic methodologies do not adequately reflect this diversity. Therefore, this study identifies Life-Cycle-based sound data elemental technologies and provides overall guidelines for sound data analysis so that effective analysis can be performed in all situations. Furthermore, the identified elemental technologies were analyzed for use in the development of digital forensic techniques for sound data. To demonstrate the effectiveness of the life-cycle-based sound data elemental technology identification system presented in this study, a case study on the process of developing an emergency retrieval technology based on sound data is presented. Through this case study, we confirmed that the elemental technologies identified based on the Life-Cycle in the process of developing digital forensic technology for sound data ensure the quality and consistency of data analysis and enable efficient sound data analysis.