Proceedings of the Conference on Digital Forensics, Security and Law 2014 Richmond, Virginia May 28-29
Total Page:16
File Type:pdf, Size:1020Kb
Proceedings of the Conference on Digital Forensics, Security and Law 2014 Richmond, Virginia May 28-29 Richmond, Virginia May 28-29, 2014 Conference Chairs Diane Barrett Glenn Dardick [email protected] [email protected] Co-Chair Co-Chair Bloomsburg University Longwood University Pennsylvania, USA Virginia, USA Association of Digital Forensics, Security and Law Copyright © 2014 ADFSL, the Association of Digital Forensics, Security and Law. Permission to make digital or printed copies of all or any part of this journal is granted without fee for personal or classroom use only and provided that such copies are not made or distributed for profit or commercial use. All copies must be accompanied by this copyright notice and a full citation. Permission from the ADFSL is required to make digital or printed copies of all or any part of this journal for- profit or commercial use. Permission requests should be sent to Dr. Glenn S. Dardick, Association of Digital Forensics, Security and Law, 1642 Horsepen Hills Road, Maidens, Virginia 23102 or emailed to [email protected]. ISSN 1931-7379 ADFSL Conference on Digital Forensics, Security and Law, 2014 Thank You to Our Sponsors 2 ADFSL Conference on Digital Forensics, Security and Law, 2014 Contents Committee .............................................................................................................................................. 4 Schedule ................................................................................................................................................. 5 Keynote Speaker: Mark Pollitt ............................................................................................................ 9 Awareness of Scam E-mail: An Exploratory Research Study .......................................................... 11 Tejashree D. Datar*, Kelly Anne Cole, and Marcus K. Rogers* Why Penetration Testing is a Limited Use Choice for Sound Cyber Security Practice, or If I Say I Can Kill You, Murder It is Then ................................................................................... 35 Craig Valli*, Andrew Woodward, Peter Hannay, and Mike Johnstone LiFE (Logical iOS Forensics Examiner): An Open Source iOS Backup Forensics Examination Tool ................................................................................................................................. 41 Ibrahim Baggili*, Shadi Al Awawdeh, and Jason Moore Using Internet Artifacts to Profile a Child Pornography Suspect ................................................... 53 Kathryn C. Seigfried-Spellar* and Marcus K. Rogers* Internet Addiction to Child Pornography ......................................................................................... 63 Rachel Sitarz*, Marcus K. Rogers*, Lonnie Bentley, and Eugene Jackson Generation and Handling of Hard Drive Duplicates as Piece of Evidence ..................................... 73 T. Kemmerich, F. Junge, N. Kuntze*, C. Rudolph, B. Endicott-Popovsky*, and L. Großkopf Testing the Harmonised Digital Forensic Investigation Process in Post Mortem Digital Investigation ......................................................................................................................................... 83 Emilio Raymond Mumba* and H.S. Venter* The Federal Rules of Civil Procedure: Politics in the 2013-2014 Revision ...................................... 99 John W. Bagby, Byron Granda, Emily Benoit, Alexander Logan, Ryan Snell, & Joseph J. Schwerha* Applying Memory Forensics to Rootkit Detection .......................................................................... 115 Igor Korkin* and Ivan Nesterov Computer Forensics for Accountants ............................................................................................... 143 Grover Kearns* Development and Dissemination of a New Multidisciplinary Undergraduate Curriculum in Digital Forensics ............................................................................................................................ 161 Masooda Bashir*, Jenny A. Applequist, Roy H. Campbell, Lizanne DeStefano, Gabriela L. Garcia, and Anthony Lang Botnet Forensic Investigation Techniques and Cost Evaluation ................................................... 171 Brian O. Cusack* Visualizing Instant Messaging Author Writeprints for Forensic Analysis ................................... 191 Angela Orebaugh*, Jason Kinser, and Jeremy Allnutt Application of Toral Automorphisms to Preserve Confidentiality Principle in Video Live Streaming ........................................................................................................................ 215 Enrique García-Carbajal* and Clara Cruz-Ramos Work in Progress: An Architecture for Network Path Reconstruction via Backtraced OSPF LSDB Synchronization ....................................................................................... 223 Raymond Hansen* 3 ADFSL Conference on Digital Forensics, Security and Law, 2014 Investigative Techniques of N-Way Vendor Agreement and Network Analysis Demonstrated with Fake Antivirus ................................................................................................... 231 Gary Warner*, Michael Nagy, Kyle Jones, and Kevin Mitchem Hot Zone Identification: Analyzing Effects of Data Sampling on SPAM Clustering ................... 243 Rasib Hassan Khan, Mainul Mizan, Ragib Hasan, and Alan Sprague (presented by Gary Warner*) * Author Presenting and/or Attending 4 ADFSL Conference on Digital Forensics, Security and Law, 2014 Conference Committee The 2014 ADFSL Conference on Digital Forensics, Security and Law is pleased to have the following as co- chairs of the conference, chairs of the conference committee, and administrators of the conference: Diane Barrett Glenn Dardick [email protected] [email protected] Co-Chair Co-Chair Bloomsburg University Longwood University Pennsylvania, USA Virginia, USA Linda Lau Alexandra Greene [email protected] [email protected] Publications Editor Assistant Publications Editor Longwood University Longwood University Virginia, USA Virginia, USA The 2014 ADFSL Conference on Digital Forensics, Security and Law is pleased to have the following as members of the program committee: John Bagby Ibrahim Baggili David Biros Roy Campbell [email protected] [email protected] [email protected] [email protected] The Pennsylvania State University of New Haven Oklahoma State University University of Illinois University Connecticut, USA Oklahoma, USA Illinois, USA Pennsylvania, USA Mohamed Chawki Fred Cohen Roy Costello David Dampier [email protected] [email protected] [email protected] [email protected] International Association of California Sciences University of Nebraska - Mississippi State University Cybercrime Prevention Institute Lincoln Mississippi, USA (AILCC) France Livermore, CA, USA Nebraska, USA Gareth Davies Nick Vincent Flor Dr. Mike Johnstone Andy Jones [email protected] [email protected] [email protected] [email protected] University of South Wales University of New Mexico Edith Cowan University Edith Cowan University UK New Mexico, USA Western Australia, Australia Western Australia, Australia Gary Kessler Jigang Liu Huw Read John Riley [email protected] [email protected] [email protected] [email protected] Embry-Riddle Aeronautical Metropolitan State University of South Wales Bloomsburg University University University UK Pennsylvania, USA Florida, USA Minnesota, USA Marcus Rogers Joseph J. Schwerha IV Jill Slay Iain Sutherland [email protected] [email protected] [email protected] [email protected] Purdue University Owner, TraceEvidence, University of New South University of South Wales, UK Indiana, USA LLC Wales Noroff University College, California University of Canberra, Australia Norway Pennsylvania, USA Michael Tu Craig Valli Eli Weintraub Dr. Andrew Woodward [email protected] [email protected] [email protected] [email protected] Purdue University Edith Cowan University Afeka Tel Aviv Academic Edith Cowan University, Indiana, USA Western Australia, College of Engineering Western Australia, Australia Israel Australia 5 ADFSL Conference on Digital Forensics, Security and Law, 2014 Schedule Wednesday, May 28 08:00 AM CONTINENTAL BREAKFAST 08:00 AM On-site Registration 08:50 AM Introductions . Glenn S. Dardick, Director of the ADFSL 09:10 AM Keynote Speech . Mark Pollitt: Digital Forensics at the Crossroads 09:40 AM Paper 1 . Tejashree D. Datar: Awareness of Scam E-mail: An Exploratory Research Study 10:20 AM MORNING BREAK 10:40 AM Paper 2 . Craig Valli: Why Penetration Testing is a Limited Use Choice for Sound Cyber Security Practice, or If I Say I Can Kill You, Murder It is Then 11:20 AM Paper 3 . Ibrahim Baggili: LiFE (Logical iOS Forensics Examiner): An Open Source iOS Backup Forensics Examination Tool 12:00 PM LUNCH (provided) 01:00 PM Paper 4 . Kathryn C. Seigfried-Spellar and Marcus Rogers: Using Internet Artifacts to Profile a Child Pornography Suspect 01:40 PM Paper 5 . Rachel Sitarz: Internet Addiction to Child Pornography 02:20 PM AFTERNOON BREAK 02:40 PM Paper 6 . N. Kuntz, and B. Endicott-Popovsky: Generation and Handling of Hard Drive Duplicates as Piece of Evidence 03:20 PM Paper 7 . Emilio Raymond Mumba and H.S. Venter: Testing The Harmonised Digital Forensic Investigation Process in Post Mortem Digital Investigation 04:00 PM Paper 8 . Joseph J. Schwerha: The Federal Rules Of Civil Procedure: Politics In The 2013-2014 Revision 04:40