Computer Forensics
This project explores the critical role of pattern matching in computer forensics, focusing on prevention, detection, and analysis techniques used in various fields such as law enforcement, journalism, and advanced projects like human genome sequencing. The aim is to develop a pattern matching program leveraging tools like PX Binary Viewer and MD5 algorithms. Case studies, including notable incidents like the Iranian News photo released in 2008, will be analyzed to understand the impact and applications of pattern matching in digital forensics.
Computer Forensics
E N D
Presentation Transcript
Computer Forensics CSI CSCI Pattern Matching Andrew Burns Brian Norton
Forensics:Broad areas of study • Prevention • Detection • Analysis • Steganography
Examples of Pattern Matching: • Steganography/Cryptology • Use in everyday End-User computers • Use in sophisticated projects such as human genome sequencing, law enforcement, journalism • Pattern Matching - our area of study in this project
Iranian News photo(s) released to Agence France-Presse July 2008 Major US news outlets issue retractions days later.
Project Description • Where we hope to go: • To develop a Pattern Matching program • For now: • Use of PX Binary Viewer • Preview of C Program • Later Steps: • MD5 Algorithms • System Baselining similar to a photograph - used as comparison tool.
References • Computer Forensics Laboratory and Tools, G. A. Francia III and K. Clinton: Jacksonville State University - JCSC 20, 6 (June 2005) • Network Forensics, “Surviving Network Attacks” Ben Laurie, AL Digital, Queue, June 2004, pp 50-56 • Criminal Computer Forensics Management Ray Yeager, Kennesaw State University pp 168-174 • Wikipedia • “The role of key loggers in computer-based assessment forensics” • “System Baseling - A Forensic Perspective” K. Monroe, D Bailey • Invitation to Computer Science 3rd Ed. Schneider and Gersting