Scheduled System Maintenance
On Tuesday, December 18, IEEE Xplore will undergo scheduled maintenance from 1:00-5:00 PM ET
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

2017 5th International Symposium on Digital Forensic and Security (ISDFS)

26-28 April 2017

Filter Results

Displaying Results 1 - 25 of 28
  • [Front cover]

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (179 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (42 KB)
    Freely Available from IEEE
  • Detection of compromised email accounts used for spamming in correlation with origin-destination delivery notification extracted from metadata

    Publication Year: 2017, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB) | HTML iconHTML

    Fifty-four percent of the global email traffic in October 2016 was spam and phishing messages. Those emails were commonly sent from compromised email accounts. Previous research has primarily focused on detecting incoming junk mail but not locally generated spam messages. State-of-the-art spam detection methods generally require the content of the email to be able to classify it as either spam or ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic behavior evaluation for malware detection

    Publication Year: 2017, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (186 KB) | HTML iconHTML

    The number of malicious applications, their diversity and complexity is continuously growing. To provide the best protection against these advanced threats, there is a need to develop proactive detection solutions, that are able to detect malware based on their behavior. One of the essential concerns when developing such solutions is identifying specific actions based on which malicious applicatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal security design in the Internet of Things

    Publication Year: 2017, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (183 KB) | HTML iconHTML

    Internet of Things (IoT) is a rapidly developing technology that provides comfort, safety, and economy in humans' everyday life. Due to its close relation with humans' living environment, this technology may submit the private life to increased threats. Therefore, security is a key factor in IoT. In this work, we propose a mechanism that, by applying threat and risk modeling, provides a tool for t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards a neural language model for signature extraction from forensic logs

    Publication Year: 2017, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    Signature extraction is a critical preprocessing step in forensic log analysis because it enables sophisticated analysis techniques to be applied to logs. Currently, most signature extraction frameworks either use rule-based approaches or handcrafted algorithms. Rule-based systems are error-prone and require high maintenance effort. Hand-crafted algorithms use heuristics and tend to work well only... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Some remarks on a set of information theory features used for on-line signature verification

    Publication Year: 2017, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    Recently a new set consisting of six information theory features was proposed for on-line signature verification by Rosso, Ospina and Frery. The proposed features were evaluated on the MCYT-100 on-line signature database resulting in the best performance ever measured on that dataset. In this paper we repeat their measurements and show that their result is erroneous. In addition, we evaluate the p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Semantic cyber-physical cloud systems

    Publication Year: 2017, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (501 KB) | HTML iconHTML

    Due to its computing power and storage capacity, the Cloud has been integrated with Cyber-physical systems, thus creating complex and powerful Cyber-physical Cloud platforms. It is important that these systems have proper security and clear specifications in order to be trustworthy and reliable. To address these requirements and issues we propose a semantic, ontology-based architecture for Cyber-p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure lightweight context-driven data logging for bodyworn sensing devices

    Publication Year: 2017, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB) | HTML iconHTML

    Rapid advancement in wearable technology has unlocked a tremendous potential of its applications in the medical domain. Among the challenges in making the technology more useful for medical purposes is the lack of confidence in the data thus generated and communicated. Incentives have led to attacks on such systems. We propose a novel lightweight scheme to securely log the data from bodyworn sensi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementation of SIMON and SPECK lightweight block ciphers on programmable logic controllers

    Publication Year: 2017, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (286 KB) | HTML iconHTML

    Programmable Logic Controllers (PLCs) are the key components of SCADA systems, controlling different industrial processes, while handling the communication with other systems via different communication protocols, which are subject to security attacks. The introduction of cryptography at the PLC's application level could represent a first step in providing the needed security for such systems. How... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System safety of human centrifuge and solving angular velocity of main arm with artificial neural network

    Publication Year: 2017, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (946 KB) | HTML iconHTML

    In high-performance military aircraft, high centrifugal forces result in sharp turns and such emergency maneuvers significantly affect the pilot's physiological condition and performance. The human centrifuge system is a dynamic flight simulator used to generate artificial G forces realistically. One of the objectives of this study is to underline the significance of system safety of human centrif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic network configuration in the Internet of Things

    Publication Year: 2017, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (684 KB) | HTML iconHTML

    We present an approach to dynamically reconfigure the network in the Internet of Things. The approach leverages the new enabling technologies from the Software Defined Networks, and provides a network controller capable to interact with the network switches, to detect faults, and to issue a new network setup. The network setup is defined as the set of communication flows and their associated forwa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A succinct survey on (Pseudo)-random number generators from a cryptographic perspective

    Publication Year: 2017, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    Random numbers find their usefulness and utility in domains which have a significant role, sometimes even critical or obtaining some unpredictable results: Simulations based on Monte Carlo methods, simulations from mathematical modeling simulations, statistics, prime numbers generation, cryptography, spreaded spectrum communication, games, etc. In cryptography, the property of being random is fund... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Digital image forgery detection based on shadow HSV inconsistency

    Publication Year: 2017, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB) | HTML iconHTML

    During the last decade digital images have spread to all facets of human life. One of the main advantages of digital images is wide availability of powerful digital image processing tools. However, this power and availability also facilitates simplicity of forgery of digital images where it is very easy to insert part of one image into another image. Digital image forensics has to deal with such s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting the eye and its openness with Gabor filters

    Publication Year: 2017, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (493 KB) | HTML iconHTML

    Drivers fatigue is the major cause of traffic accidents all over the world. Advanced image processing technology processing the stream obtained from infrared cameras is able to supervise blinking rate and at the same time drowsiness of the vehicle driver. Such a system may warn not only the tired person, but also the passengers, whom the driver takes responsibility for. In this article we present ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Voice over IP forensic approaches: A review

    Publication Year: 2017, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    Voice over Internet Protocol (VoIP) is one of the highly used applications for voice and data communication purposes. The convenience of using VoIP applications, its acceptable quality, and the relatively low cost of usage have made it a potential replacement for landline and cellular communication. Along with these advantages, the vulnerability of using VoIP is usually considered the most cumbers... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improved digital evidence acquisition model for the Internet of Things forensic I: A theoretical framework

    Publication Year: 2017, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (445 KB) | HTML iconHTML

    Digital evidence plays a vital role in determining legal case admissibility in electronic- and cyber-oriented crimes. Considering the complicated level of the Internet of Things (IoT) technology, performing the needed forensic investigation will be definitely faced by a number of challenges and obstacles, especially in digital evidence acquisition and analysis phases. Based on the currently availa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anaysis of controller based IEEE 802.11 system with similarity measure clustering: Evaluation of channel allocation efficiency by change detection

    Publication Year: 2017, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (389 KB) | HTML iconHTML

    The efficiency of a WiFi system with dozens of base stations in relatively small physical area is determined by the optimal allocation of the radio channels to the mobile devices. Based on the increased penetration rate of the high traffic capable smartphones and accentuated usage of these devices in densely populated buildings intelligent hardware tools are needed to offer QoS level to the users.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Packet tracing and analysis of network cameras with Wireshark

    Publication Year: 2017, Page(s):1 - 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB) | HTML iconHTML

    Although people think that their identity is not revealed on the Internet, the confidentiality and protection of personal information on unreliable networks such as the internet is an important question. In this study, a sample application on network packet tracing and analysis of network cameras with Wireshark program is realized to show how partial access to personal information and location inf... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cyber attacks targeting Android cellphones

    Publication Year: 2017, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (644 KB) | HTML iconHTML

    Mobile attack approaches can be categorized as Application Based Attacks and Frequency Based Attacks. Application based attacks are reviewed extensively in the literature. However, frequency based attacks to mobile phones are not experimented in detail. In this work, we have experimentally succeeded to attack an Android smartphone using a simple software based radio circuit. We have developed a so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustering and visualization of mobile application permissions for end users and malware analysts

    Publication Year: 2017, Page(s):1 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1359 KB) | HTML iconHTML

    Application permissions at the core of Android security mechanism are the first leading transparent feature for users to assess any mobile application before download or installation and for experts to analyse any malware. Representing vast, dispersed permissions and achieving clarity is not a trivial matter. In this study, we first examined Android permissions, their groups and formal representat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A process-level analysis of private browsing behavior: A focus on Google Chromes Incognito mode

    Publication Year: 2017, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    With an increasing demand for online privacy, most mainstream Internet browsing applications now offer a service to prevent the local storage of browsing metadata. Termed `private browsing', this functionality has attracted much attention, both from the media and academic scientific research communities. The effectiveness of these privacy services has been frequently examined by digital forensic e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Turkish language based data leakage prevention system

    Publication Year: 2017, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (259 KB) | HTML iconHTML

    Data is the most valuable asset for organization and needs to be secured. Especially organizations should pay attention to data leakage issues because the leakage of sensitive data could give great damages or harm more than expected. There have been various factors causing data leakage but the recent research showed that the rate of insider attacks was the highest score and most of the data leakag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.