Categories of Digital Forensic Investigation Techniques
Brian Carrier - Purdue University
Feb 08, 2006Size: 190.6MB
Download: MP4 Video
Watch in your Browser Watch on YouTube
AbstractThis talk examines formal concepts of digital forensic investigations. To date, the field has had an applied focus and little theory exists to formally define analysis techniques and requirements. This work defines an extended finite state machine (FSM) model and uses it to describe a computer's history, which contains the primitive and abstract states and events that existed and occurred. Using this model, categories of analysis techniques can be defined. This talk describes the model, describes the categories of analysis techniques, and compares the existing tools to the analysis technique categories.
About the SpeakerBrian Carrier is the author of \"File System Forensic Analysis\" and several digital forensic analysis tools, including The Sleuth Kit and the Autopsy Forensic Browser. He is completing his Ph.D. in computer science at Purdue University. Previously, Brian was a Research Scientist at @stake in Boston, MA, and the lead for the @stake Response Team and Digital Forensic Labs. Brian has been involved with the European Commission\'s CTOSE project on Digital Evidence, is a member of the Honeynet Project, a referee for the Journal of Digital Investigation, and on the committees of several conferences, workshops, and technical working groups.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.