The Community for Technology Leaders
2013 IEEE Security and Privacy Workshops (2013)
San Francisco, CA, USA USA
May 23, 2013 to May 24, 2013
ISBN: 978-1-4799-0458-7
pp: 119-122
Forensic  analysis  of  a  suspect program is a  daily challenge encounters forensic analysts and law-enforcement. It requires determining the behavior of a suspect program found in  a  computer system subject  to  investigation  and  attempting to reconstruct actions that have been invoked in the system.   In this research paper, a forensic analysis approach for suspect programs  in an  executable binary  form  is introduced.  The proposed  approach aims to reconstruct  high level forensic actions and approximate action arguments from  low level machine  instructions; That is, reconstructed actions will assist in forensic inferences  of evidence and traces caused by  an action invocation in a system subject to forensics investigation.

A. F. Shosha, L. Tobin and P. Gladyshev, "Digital Forensic Reconstruction of a Program Action," 2013 IEEE Security and Privacy Workshops(SPW), San Francisco, CA, USA USA, 2013, pp. 119-122.
87 ms
(Ver 3.3 (11022016))