2014 Eighth International Conference on IT Security Incident Management & IT Forensics

12-14 May 2014

Filter Results

Displaying Results 1 - 17 of 17
  • [Front cover]

    Publication Year: 2014, Page(s): C4
    Request permission for reuse | PDF file iconPDF (473 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2014, Page(s): i
    Request permission for reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2014, Page(s): iii
    Request permission for reuse | PDF file iconPDF (190 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2014, Page(s): iv
    Request permission for reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2014, Page(s): v
    Request permission for reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2014, Page(s):vi - vii
    Request permission for reuse | PDF file iconPDF (99 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organization

    Publication Year: 2014, Page(s):viii - ix
    Request permission for reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2014, Page(s):x - xi
    Request permission for reuse | PDF file iconPDF (193 KB)
    Freely Available from IEEE
  • The Humming Hum: Background Noise as a Carrier of ENF Artifacts in Mobile Device Audio Recordings

    Publication Year: 2014, Page(s):3 - 13
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (3733 KB) | HTML iconHTML

    Audio forensics based on fluctuations in the electrical network frequency (ENF) has become one of the major approaches for the authentication of digital audio recordings. Yet little is known about the circumstances and preconditions under which battery-powered devices leave ENF artifacts in their recordings. Our study with multiple mobile recording devices confirms the hypothesis that background n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AFAUC -- Anti-forensics of Storage Devices by Alternative Use of Communication Channels

    Publication Year: 2014, Page(s):14 - 26
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    Since the end of the 1990ies side channel attacks became a very prominent branch of cryptography. In other areas of computer security, however, side channels are not well studied. It is the primary goal of this paper to raise the awareness of the community about the potential existence of side channels during a forensic investigation. We present a concept called AFAUC - anti-forensics of data stor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Security Incident Management: Identified Practice in Large Organizations

    Publication Year: 2014, Page(s):27 - 46
    Cited by:  Papers (3)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (254 KB) | HTML iconHTML

    This paper presents a case study on current practice of information security incident management in three large organizations. Qualitative interviews, document studies, and a survey have been performed. Our analysis shows that the organizations have plans and procedures in place, however, not all of these are well established throughout the organizations. Some challenges were prominent in all thre... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Information Security Incident Management: Planning for Failure

    Publication Year: 2014, Page(s):47 - 61
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    This paper reports on an interview study on information security incident management that has been conducted in organizations operating industrial control systems that are highly dependent on conventional IT systems. Six distribution service operators from the power industry have participated in the study. We have investigated current practice regarding planning and preparation activities for inci... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Post-Mortem Memory Analysis of Cold-Booted Android Devices

    Publication Year: 2014, Page(s):62 - 75
    Cited by:  Papers (10)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    As recently shown in 2013, Android-driven smartphones and tablet PCs are vulnerable to so-called cold boot attacks. With physical access to an Android device, forensic memory dumps can be acquired with tools like FROST that exploit the remanence effect of DRAM to read out what is left in memory after a short reboot. While FROST can in some configurations be deployed to break full disk encryption, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assuming a State of Compromise: A Best Practise Approach for SMEs on Incident Response Management

    Publication Year: 2014, Page(s):76 - 84
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (755 KB) | HTML iconHTML

    Up-to-date studies and surveys regarding IT security show, that companies of every size and branch nowadays are faced with the growing risk of cyber crime. Many tools, standards and best practices are in place to support enterprise IT security experts in dealing with the upcoming risks, whereas meanwhile especially small and medium sized enterprises(SMEs) feel helpless struggling with the growing ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hierarchical Model for the Description of Internet-Based Communication

    Publication Year: 2014, Page(s):85 - 94
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (314 KB) | HTML iconHTML

    With this paper we aim to support network traffic management and incident management processes. Hence this paper introduces a model to classify different types of internet-based communication and to establish homogenous representations for various forms of internet-based communication. To achieve these aims an approach to project different types of communications onto a comparable template is pres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2014, Page(s): 95
    Request permission for reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • [Publisher's information]

    Publication Year: 2014, Page(s): 96
    Request permission for reuse | PDF file iconPDF (125 KB)
    Freely Available from IEEE