Proceedings of the 5 Australian Digital Forensics Conference
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Google Android
Google Android 2008/3/10 NemusTech, Inc. Lee Seung Min 네무스텍㈜ Agenda Introduction Mobile Platform Overview Background : Current Linux Mobile Platform What is Android? Features Architecture Technical Detail Android SDK Porting Android to Real Target Future of Android A conceptual model for mobile software Software Stack Kernel the core of the SW (HW drivers, memory, filesystem, and process management) Middleware The set of peripheral software libraries (messaging and communication engines, WAP renders, codecs, etc) Application Execution Environment An application manager and set APIs UI framework A set of graphic components and an interaction framework Application Suite The set of core handset application ( IDLE screen, dialer, menu screen, contacts, calendar, etc) Mobile Platforms Feature Phone Vendor Platform : Mocha, PDK, WAVE, WISE, KX, etc...... Carrier Platform : SKTelecom TPAK, NTT i-Mode (WAP), Java, WIPI, BREW, etc…… 3rd Party Solution : TAT Cascade, Qualcomm uiOne Smart Phone MicroSoft Windows Mobile Nokia : Symbian, Series 60 Apple, iPhone – OSX 10.5 Leopard Linux Customers & Licensees Not all customers or licensees are shown Source:vendor data Smartphone OS Market Share by Region Smartphone OS market share by region, 2006 Source : Canalys Current Linux Mobile Platforms LiMo Foundation https://www.limofoundation.org/sf/sfmain/do/home TrollTech Qtopia GreenPhone Acquired by Nokia OpenMoko : GNU/Linux based software development platform http://www.openmoko.org , http://www.openmoko.com Linux -
Steganography- a Data Hiding Technique
International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 Steganography- A Data Hiding Technique Arvind Kumar Km. Pooja Assistant Professor Vankateshwara institute of computer Vidya College of engineering, Meerut, India Science and technology, Meerut, India ABSTRACT In steganography, the possible cover carriers are innocent looking Steganography is the art of hiding information and an effort to carriers (images, audio, video, text, or some other digitally conceal the existence of the embedded information. It serves as a representative code) which will hold the hidden information. A better way of securing message than cryptography which only message is the information hidden and may be plaintext, cipher text, conceals the content of the message not the existence of the message. images, or anything that can be embedded into a bit stream. Together Original message is being hidden within a carrier such that the the cover carrier and the embedded message create a stego-carrier. changes so occurred in the carrier are not observable. In this paper we Hiding information may require a stego key which is additional secret will discuss how digital images can be used as a carrier to hide information, such as a password, required for embedding the messages. This paper also analyses the performance of some of the information. For example, when a secret message is hidden within a steganography tools. Steganography is a useful tool that allows covert cover image, the resulting product is a stego-image. transmission of information over an over the communications A possible formula of the process may be represented as: cover channel. -
Steganography & Steganalysis
June 6, 2003 Steganography & Steganalysis SpyHunter www.spy-hunter.com [email protected] 1 AgendaAgenda X Steganography – What is Steganography? – History – Steganography today – Steganography tools X Steganalysis – What is Steganalysis? – Identification of Steganographic files – Cracking Steganographic files – What’s in the future? 2 Steganography 3 SteganographySteganography -- DefinitionDefinition X Steganography – from the Greek word steganos meaning “covered” – and the Greek word graphie meaning “writing” X Steganography is the process of hiding of a secret message within an ordinary message and extracting it at its destination X Anyone else viewing the message will fail to know it contains hidden/encrypted data 4 SteganographySteganography -- HistoryHistory X Greek history – warning of invasion by scrawling it on the wood underneath a wax tablet. To casual observers, the tablet appeared blank. X Pirate legends tell of the practice of tattooing secret information, such as a map, on the head of someone, so that the hair would conceal it. 5 SteganographySteganography X Both Axis and Allied spies during World War II used such measures as invisible inks -- using milk, fruit juice or urine which darken when heated. X Invisible Ink is also a form of steganography 6 SteganographySteganography X The U.S. government is concerned about the use of Steganography. X Common uses in include the disguising of corporate espionage. X It’s possible that terrorist cells may use it to secretly communicate information X It’s also a very good Anti-forensics mechanism to mitigate the effectiveness of a forensics investigation 7 SteganographySteganography Terror groups hide behind Web encryption By Jack Kelley, USA TODAY AP WASHINGTON — Hidden in the X-rated pictures on several pornographic Web sites and the posted comments on sports chat rooms may lie the encrypted blueprints of the next terrorist attack against the United States or its allies. -
PDA Users Guide
130 Family of Seismic Recorders PFC_130 Users Guide (Version 1.2.4.40) Refraction Technology PFC_130 Users Guide 130-PFC-001-K December 18, 2006 Refraction Technology, Inc. 1600 Tenth Street, Suite A Plano, Texas 75074 USA Voice: 214-440-1265 Fax: 972-578-0045 EMAIL: [email protected] FTP: ftp.reftek.com WWW: http://reftek.com ©Copyright 2003-2006 Refraction Technology, Inc. All rights reserved. Printed in USA ii 130-PFC-001-K PFC_130 Users Guide Preface All references to a PDA in this guide refer to any type of device that is compatible with the Palm™ operating system (OS) with RS232 (i.e., Palm IIIe™, Palm IIIxe™, Palm V™, Palm VII™, Palm M105™, Handspring Visor™, TRG Pro™, etc.) REF TEK Support and update notifications As a valued user of REF TEK equipment we would like to provide the best support possible by keeping you up to date with our product updates. If you would like to be notified of any REF TEK product updates please spend a couple of minutes to register with the reftek customer support team. To Register, either send an email to [email protected] giving us your name and REF TEK product you currently have or fill out our online registration form at www.reftek.com/registration Once we register your contact we will only send necessary notifications via email. The same notifications will be shown on our website’s www.reftek.com/support page Thanks, Your REF TEK support team PFC_130 Users Guide 130-PFC-001-K iii Revision History Rev Date Reason for change Affected Pages 0.1 1/12/02 Initial release A 10/04/02 Release of 1.0 130 -
Steganography: Forensic, Security, and Legal Issues
Journal of Digital Forensics, Security and Law Volume 3 Number 2 Article 2 2008 Steganography: Forensic, Security, and Legal Issues Merrill Warkentin Mississippi State University Ernst Bekkering Northeastern State University Mark B. Schmidt St. Cloud State University Follow this and additional works at: https://commons.erau.edu/jdfsl Part of the Computer Engineering Commons, Computer Law Commons, Electrical and Computer Engineering Commons, Forensic Science and Technology Commons, and the Information Security Commons Recommended Citation Warkentin, Merrill; Bekkering, Ernst; and Schmidt, Mark B. (2008) "Steganography: Forensic, Security, and Legal Issues," Journal of Digital Forensics, Security and Law: Vol. 3 : No. 2 , Article 2. DOI: https://doi.org/10.15394/jdfsl.2008.1039 Available at: https://commons.erau.edu/jdfsl/vol3/iss2/2 This Article is brought to you for free and open access by the Journals at Scholarly Commons. It has been accepted for inclusion in Journal of Digital Forensics, Security and Law by an authorized administrator of (c)ADFSL Scholarly Commons. For more information, please contact [email protected]. Journal of Digital Forensics, Security and Law, Vol. 3(2) Steganography: Forensic, Security, and Legal Issues Merrill Warkentin Mississippi State University [email protected] Ernst Bekkering Northeastern State University [email protected] Mark B. Schmidt St. Cloud State University [email protected] ABSTRACT Steganography has long been regarded as a tool used for illicit and destructive purposes such as crime and warfare. Currently, digital tools are widely available to ordinary computer users also. Steganography software allows both illicit and legitimate users to hide messages so that they will not be detected in transit. -
Die Meilensteine Der Computer-, Elek
Das Poster der digitalen Evolution – Die Meilensteine der Computer-, Elektronik- und Telekommunikations-Geschichte bis 1977 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 und ... Von den Anfängen bis zu den Geburtswehen des PCs PC-Geburt Evolution einer neuen Industrie Business-Start PC-Etablierungsphase Benutzerfreundlichkeit wird gross geschrieben Durchbruch in der Geschäftswelt Das Zeitalter der Fensterdarstellung Online-Zeitalter Internet-Hype Wireless-Zeitalter Web 2.0/Start Cloud Computing Start des Tablet-Zeitalters AI (CC, Deep- und Machine-Learning), Internet der Dinge (IoT) und Augmented Reality (AR) Zukunftsvisionen Phasen aber A. Bowyer Cloud Wichtig Zählhilfsmittel der Frühzeit Logarithmische Rechenhilfsmittel Einzelanfertigungen von Rechenmaschinen Start der EDV Die 2. Computergeneration setzte ab 1955 auf die revolutionäre Transistor-Technik Der PC kommt Jobs mel- All-in-One- NAS-Konzept OLPC-Projekt: Dass Computer und Bausteine immer kleiner, det sich Konzepte Start der entwickelt Computing für die AI- schneller, billiger und energieoptimierter werden, Hardware Hände und Finger sind die ersten Wichtige "PC-Vorläufer" finden wir mit dem werden Massenpro- den ersten Akzeptanz: ist bekannt. Bei diesen Visionen geht es um die Symbole für die Mengendarstel- schon sehr früh bei Lernsystemen. iMac und inter- duktion des Open Source Unterstüt- möglichen zukünftigen Anwendungen, die mit 3D-Drucker zung und lung. Ägyptische Illustration des Beispiele sind: Berkley Enterprice mit neuem essant: XO-1-Laptops: neuen Technologien und Konzepte ermöglicht Veriton RepRap nicht Ersatz werden. -
1 Star Trac Pro Partner – Training Partner Operations Manual Table of Contents I. Introduction II. Selecting Workout Partner
Star Trac Pro Partner – Training Partner Operations Manual Table of Contents I. Introduction II. Selecting Workout Partner a. Creating a Custom Workout III. Creating a Pro or Elite Treadmill Custom Workout a. Naming Your Workout b. Entering Weight/Time c. Designing Your Incline Profile d. Designing Your Speed Profile IV. Creating a Pro Bike Custom Workout a. Naming Your Workout b. Entering Weight/Time c. Designing Your Resistance Profile V. Accessing a Custom Workout VI. Beaming a Custom Workout a. Beaming to a Pro or Elite Treadmill b. Beaming to a Pro Bike c. Beaming to a PDA Device VII. Editing a Custom Workout VIII. Deleting a Custom Workout IX. Reviewing a Completed Workout X. Collecting an Existing Workout from a Pro or Elite Treadmill or Pro Bike XI. Appendix A: List of PDAs Compatible with Pro Partner 1 I. Introduction Thank you for choosing Star Trac for your fitness needs. Are you ready to take your clients’ workout to a new level? The Star Trac Pro Partner software program will make your Palm-powered PDA (Personal Digital Assistant) an integral part of your personal training experience when using a Star Trac Pro or Elite Treadmill or Pro Bike. Personalized workouts and tracking client workout data are now all in the palm of your hand! In this manual you will learn how to use the Training Partner application to design custom workouts and track workout information for your clients for a more personal approach. It’s simple! Just follow the steps in this user manual and you’re one step closer to making your personal training more efficient. -
Palm Covers4
ANNUAL REPORT 2002 < leadership, strength and commitment > the palm economy Through the success of our Palm OS® platform, Palm has created a large ecosystem of companies that create and sell a variety of software applications, peripherals and accessories for Palm OS based devices. This thriving community offers a wealth of solutions for consumer, professional and enterprise users and remains one of the key components in our value proposition to our present and future customers. < 225,000+ developers* and 14,000+ applications* > *As of 7/2002 Peripherals and expansion cards sold separately. As Palm started FY ’02, we faced three fundamental • We continued to enhance pro forma operating results challenges: throughout the year with two consecutive quarters of gross margini improvements and four consecutive • Competing business strategies: While we had begun quarters of operating expenseii improvements. Pro forma the process of licensing our Palm OS software to hand- gross margini grew from a low of 20% in Q2 FY ‘02 to held manufacturers to expand the Palm Economy, the 35% in Q4 FY ‘02, while pro forma operating expensesii perceived lack of independence and the opportunistic have declined by 36% from the end of Q4 FY ’01 to nature of our licensing activities limited the potential of the end of Q4 FY ’02. both our Palm Solutions business and our Palm OS software business and blurred the focus and clarity of We made the strategic decision to commit ourselves fully purpose of each; to the operating system software licensing business. This decision was anchored in the fundamental belief that • Operational problems: We needed to improve supply handheld devices will become part of our daily life, much chain management and product development. -
List of Palm OS Versions Included on Palm Handhelds, and Possible Upgrades
List of Palm OS versions included on Palm handhelds, and possible upgrades www.palm.com < Home < Support < Knowledge Library Article ID: 10714 List of Palm OS versions included on Palm handhelds, and possible upgrades Palm OS® is the operating system that drives Palm devices. In some cases, it may be possible to update your device with ROM upgrades or patches. Find your device below to see what's available for you: Centro Treo LifeDrive Tungsten, T|X Zire, Z22 Palm (older) Handspring Visor Questions & Answers about Palm OS upgrades Palm Centro™ smartphone Device Palm OS Handheld Palm OS version Palm Desktop & version (out- Upgrade/Update after HotSync Manager of-box) available? upgrade/update update Centro (AT&T) 5.4.9 No N/A No Centro (Sprint) 5.4.9 No N/A No Treo™ 755p smartphone Device Palm OS Handheld Palm OS version Palm Desktop & version (out- Upgrade/Update after HotSync Manager of-box) available? upgrade/update update Treo 755p (Sprint) 5.4.9 No N/A No Treo™ 700p smartphones Device Palm OS Handheld Palm OS version Palm Desktop & version (out- Upgrade/Update after HotSync Manager of-box) available? upgrade/update update Treo 700p (Sprint) Garnet Yes N/A No 5.4.9 Treo 700p (Verizon) Garnet No N/A No 5.4.9 Treo™ 680 smartphones Device Palm OS Handheld Palm OS version Palm Desktop & version (out- Upgrade/Update after HotSync Manager of-box) available? upgrade/update update Treo 680 (AT&T) Garnet Yes 5.4.9 No 5.4.9 Treo 680 (Rogers) Garnet No N/A No 5.4.9 Treo 680 (Unlocked) Garnet No N/A No 5.4.9 Treo™ 650 smartphones Device Palm OS -
Linux on Cellphones
Linux on cellphones Pavel Machek Phones are everywhere ● everyone has their cellphone ● and carries it whereever they go ● cellphones are not just phones any more ● they browse web ● can read mail ● play mp3s and videos ● play radio ● they show maps, and you can use them for navigation Phones are sensitive ● They contain your contacts ● ...your passwords ● ...your emails ● ...can eavesdrop on you ● ...can steal your money and transfer them to attacker ● Backups are important because they break down ● non-smart phones do not have adequate ways to backup more than contacts Phones are working against their owner ● Cellphone operators have „interesting“ requirements before they'll sell a cellphone ● Branded phones are actively evil here ● right button takes you right into provider's portal, and you pay for it ● without confirmation ● without chance to change that ● branding is non-removable, so you are stuck with looking at red wallpaper ● you can't use it with other operator ● MMS / push to talk are designed to be expensive ● Voice-over-IP is a big no-no for a phone Phones are working against their owner ● You can only transfer pictures out of a phone using MMS ● You can only download applications using GPRS ● You can't transfer pictures/apps/songs between phones ● Have to confirm actions even of your own apps Phones are limited ● (but maybe that's a good thing?) ● Java applications work everywhere ● but they can't do interresting stuff ● usually can't access microphone, camera ● can't go background ● can't interact with one another ● Symbian -
Statistical Pattern Recognition for Audio Forensics -- Empirical
Statistical Pattern Recognition for Audio Forensics { Empirical Investigations on the Application Scenarios Audio Steganalysis and Microphone Forensics Dissertation zur Erlangung des akademischen Grades Doktoringenieur (Dr.-Ing.) angenommen durch die Fakult¨atf¨urInformatik der Otto-von-Guericke-Universit¨atMagdeburg von: Dipl.-Inform. Christian Kr¨atzer geboren am 12. Dezember 1978 in Halberstadt Gutachter: Prof. Dr. Jana Dittmann, Otto-von-Guericke Universit¨atMagdeburg, Magdeburg, Germany Prof. Dr. Stefan Katzenbeisser, Technische Universit¨atDarmstadt, Darmstadt, Germany Prof. Dr. Scott A. Craver, Binghamton University, Binghamton, NY, United States of America Magdeburg, Germany 23. Mai 2013 Abstract Media forensics is a quickly growing research field struggling to gain the same acceptance as traditional forensic investigation methods. Media forensics tasks such as proving image manipulations on digital images or audio manipulations on digital sound files are as relevant today as they were for their analogue counterparts some decades ago. The difference is that tools like Photoshop now allow a large number of people to manipulate digital media objects with a processing speed far beyond anything imaginable in times when image, audio or video manipulation of analogue media was a hardware- and labour-intensive task requiring skill and experience. Currently, there exists a large number of research prototypes but only a small number of accepted tools that are capable of answering specific questions regularly arising in court cases, such as the origin (source authenticity) of an image or recording, or the integrity of a media file. The reason for this discrepancy between the number of research prototypes and the number of solutions accepted in court has to be sought in the very nature of most judicial systems: Judges have to distinguish between valid bases for evidence and expert testimonies on the one hand, and `junk science' on the other hand. -
Mobile Phone Programming and Its Application to Wireless Networking
Mobile Phone Programming Mobile Phone Programming and its Application to Wireless Networking Edited by Frank H.P. Fitzek Aalborg University Denmark and Frank Reichert Agder University College Norway A C.I.P. Catalogue record for this book is available from the Library of Congress. ISBN 978-1-4020-5968-1 (HB) ISBN 978-1-4020-5969-8 (e-book) Published by Springer, P.O. Box 17, 3300 AA Dordrecht, The Netherlands. www.springer.com Printed on acid-free paper © 2007 Springer No part of this work may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, microfilming, recording or otherwise, without written permission from the Publisher, with the exception of any material supplied specifically for the purpose of being entered and executed on a computer system, for exclusive use by the purchaser of the work. To Sterica and Lilith. — Frank H.P. Fitzek I dedicate this book to Tim (WoW Level 70, mighty Undead Warrior), Max (Wow Level 70, fearless Tauren Hunter), and Aida (Reality Level 80++, loving Human Wife and Mother) — Frank Reichert (Level 64) Foreword Saila Laitinen Nokia The technology evolution has been once and for all beyond comparison during the past decade or two. Any of us can nowadays do numerous things with numerous devices to help in everyday life. This applies not least to mobile phones. If we compare the feature set of a mobile phone model in 1995 with the latest smartphone models the most visible difference is of course in the user interface, the mp3 player, integrated camera, and the access to the mobile Internet.