The Community for Technology Leaders
RSS Icon
Subscribe
San Francisco, CA
May 23, 2013 to May 24, 2013
ISBN: 978-1-4799-0458-7
pp: 119-122
ABSTRACT
Forensic  analysis  of  a  suspect program is a  daily challenge encounters forensic analysts and law-enforcement. It requires determining the behavior of a suspect program found in  a  computer system subject  to  investigation  and  attempting to reconstruct actions that have been invoked in the system.   In this research paper, a forensic analysis approach for suspect programs  in an  executable binary  form  is introduced.  The proposed  approach aims to reconstruct  high level forensic actions and approximate action arguments from  low level machine  instructions; That is, reconstructed actions will assist in forensic inferences  of evidence and traces caused by  an action invocation in a system subject to forensics investigation.
CITATION
Ahmed F. Shosha, Lee Tobin, Pavel Gladyshev, "Digital Forensic Reconstruction of a Program Action", SPW, 2013, 2013 IEEE CS Security and Privacy Workshops (SPW2013), 2013 IEEE CS Security and Privacy Workshops (SPW2013) 2013, pp. 119-122, doi:10.1109/SPW.2013.17
29 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool