By Topic

Using JavaTM to Design Forensically Resistant Applications

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Jeannot, C.J. ; Comput. Eng. & Comput. Sci. Dept., Univ. of Louisville, Louisville, KY, USA ; Imam, I.N. ; Elmaghraby, A.S.

Over the years, JavaTM has become a popular language for standalone as well as Web based applications. Portability and security are the major reasons for JavaTM success and increased level of adoption in various application domains. When evaluating security, Forensics is another area with continuous increasing interest. With research progress of the previous years efficient tools for reconstructing data from improperly deleted documents are available and opened the door for a whole new set of concerns to look at to insure security. In this paper we are describing our work in progress that is related to establishing a JavaTM framework that evaluates the traces left by JavaTM applications in order to then be able to design forensics resistant JavaTM applications.

Published in:

Systematic Approaches to Digital Forensic Engineering, 2009. SADFE '09. Fourth International IEEE Workshop on

Date of Conference:

21-21 May 2009