The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March/April (2009 vol.7)
pp: 18-25
Michael A. Caloyannides , Northrop Grumman
ABSTRACT
Computer forensics' presumed usefulness against anyone with computer savvy is minimal because such persons can readily defeat forensics techniques. Because computer forensics can't show who put the data where forensics found it, it can be evidence of nothing.
INDEX TERMS
digital forensics, legal, law, data, chain of custody, security
CITATION
Michael A. Caloyannides, "Forensics Is So "Yesterday"", IEEE Security & Privacy, vol.7, no. 2, pp. 18-25, March/April 2009, doi:10.1109/MSP.2009.37
REFERENCES
1. R. Anderson and M. Kuhn, "Soft Tempest: Hidden Data Transmission using Electromagnetic Emanations," Information Hiding 1998, LNCS 1525, Springer, 1998, pp. 124–142; www.cl.cam.ac.uk/~mgk25ih98-tempest.pdf.
2. M. Kuhn, "Time-Domain Eavesdropping Risks or CRT Displays," 2002; www.cl.cam.ac.uk/~mgk25ieee02-optical.pdf .
3. J. Alex Halderman et al., "Lest We Remember: Cold Boot Attacks on Encryption Keys." Proc. Usenix Security Symp., Usenix Assoc., 2008; http://citp.princeton.edumemory/.
4. M. Caloyannides, Desktop Witness, John Wiley, 2002.
5. T. Kohno, A. Broido, and K. Claffy, "Remote Physical Device Fingerprinting," 2000, www.caida.org/publications/papers/2005/fingerprinting KohnoBroidoClaffy05-devicefingerprinting.pdf .
117 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool