Skip to main content

Showing 1–14 of 14 results for author: James, J I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2001.04574  [pdf

    cs.CY

    Preliminary Study of a Google Home Mini

    Authors: Min Jin Park, Joshua I. James

    Abstract: Many artificial intelligence (AI) speakers have recently come to market. Beginning with Amazon Echo, many companies producing their own speaker technologies. Due to the limitations of technology, most speakers have similar functions, but the way of handling the data of each speaker is different. In the case of Amazon echo, the API of the cloud is open for any developers to develop their API. The A… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

    Comments: 12 pages, 6 figures, 3 tables

    Journal ref: Journal of Digital Forensics 13-3: 163-174 (2019). https://kdfs.jams.or.kr/jams/download/KCI_FI002513079.pdf

  2. A Feature Comparison of Modern Digital Forensic Imaging Software

    Authors: Jiyoon Ham, Joshua I. James

    Abstract: Fundamental processes in digital forensic investigation, such as disk imaging, were developed when digital investigation was relatively young. As digital forensic processes and procedures matured, these fundamental tools, that are the pillars of the reset of the data processing and analysis phases of an investigation, largely stayed the same. This work is a study of modern digital forensic imaging… ▽ More

    Submitted 1 January, 2020; originally announced January 2020.

    Comments: 6 pages, 1 figure

    Journal ref: The Journal of The Institute of Internet, Broadcasting and Communication 19-6: 15-20 (2019)

  3. Update Thresholds of More Accurate Time Stamp for Event Reconstruction

    Authors: Joshua I. James, Yunsik Jang

    Abstract: Many systems rely on reliable timestamps to determine the time of a particular action or event. This is especially true in digital investigations where investigators are attempting to determine when a suspect actually committed an action. The challenge, however, is that objects are not updated at the exact moment that an event occurs, but within some time-span after the actual event. In this work… ▽ More

    Submitted 21 March, 2018; originally announced March 2018.

    Comments: 13 pages, 7 figures

    Journal ref: James, J. I., & Jang, Y. (2017). Update Thresholds of More Accurate Time Stamp for Event Reconstruction. The Journal of the Institute of Internet Broadcasting and Communication, 17(2), 7-13. https://doi.org/10.7236/JIIBC.2017.17.2.7

  4. arXiv:1711.04502  [pdf

    cs.CY

    United Nations Digital Blue Helmets as a Starting Point for Cyber Peacekeeping

    Authors: Nikolay Akatyev, Joshua I. James

    Abstract: Prior works, such as the Tallinn manual on the international law applicable to cyber warfare, focus on the circumstances of cyber warfare. Many organizations are considering how to conduct cyber warfare, but few have discussed methods to reduce, or even prevent, cyber conflict. A recent series of publications started developing the framework of Cyber Peacekeeping (CPK) and its legal requirements.… ▽ More

    Submitted 13 November, 2017; originally announced November 2017.

    Journal ref: European Conference on Information Warfare and Security, ECCWS. p.8-16 (2017)

  5. arXiv:1711.04500  [pdf

    cs.CY

    A Case Study of the 2016 Korean Cyber Command Compromise

    Authors: Kyong Jae Park, Sung Mi Park, Joshua I. James

    Abstract: On October 2016 the South Korean cyber military unit was the victim of a successful cyber attack that allowed access to internal networks. Per usual with large scale attacks against South Korean entities, the hack was immediately attributed to North Korea. Also, per other large-scale cyber security incidents, the same types of 'evidence' were used for attribution purposes. Disclosed methods of att… ▽ More

    Submitted 13 November, 2017; originally announced November 2017.

    Journal ref: European Conference on Information Warfare and Security, ECCWS. p.315-321 (2017)

  6. Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE

    Authors: Joshua I. James, Ahmed F. Shosha, Pavel Gladyshev

    Abstract: As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are concerned. Security experts, however, must still be able to acquire and analyze data in a methodical, rigorous and forensically sound manner. This… ▽ More

    Submitted 18 February, 2015; originally announced February 2015.

    Comments: 13 pages, 3 figures, 3 tables, 5th International Conference on Digital Forensics and Cyber Crime; Digital Forensics and Cyber Crime, pp. 223-236, 2014

  7. Measuring Accuracy of Automated Parsing and Categorization Tools and Processes in Digital Investigations

    Authors: Joshua I. James, Alejandra Lopez-Fernandez, Pavel Gladyshev

    Abstract: This work presents a method for the measurement of the accuracy of evidential artifact extraction and categorization tasks in digital forensic investigations. Instead of focusing on the measurement of accuracy and errors in the functions of digital forensic tools, this work proposes the application of information retrieval measurement techniques that allow the incorporation of errors introduced by… ▽ More

    Submitted 18 February, 2015; originally announced February 2015.

    Comments: 17 pages, 2 appendices, 1 figure, 5th International Conference on Digital Forensics and Cyber Crime; Digital Forensics and Cyber Crime, pp. 147-169, 2014

  8. Practical and Legal Challenges of Cloud Investigations

    Authors: Joshua I. James, Yunsik Jang

    Abstract: An area presenting new opportunities for both legitimate business, as well as criminal organizations, is Cloud computing. This work gives a strong background in current digital forensic science, as well as a basic understanding of the goal of Law Enforcement when conducting digital forensic investigations. These concepts are then applied to digital forensic investigation of cloud environments in b… ▽ More

    Submitted 4 February, 2015; originally announced February 2015.

    Comments: 7 pages

    ACM Class: K.4.1; K.4.2

    Journal ref: The Journal of The Institute of Internet, Broadcasting and Communication, 14(6), 33-39, 2014

  9. Automated Inference of Past Action Instances in Digital Investigations

    Authors: Joshua I. James, Pavel Gladyshev

    Abstract: As the amount of digital devices suspected of containing digital evidence increases, case backlogs for digital investigations are also increasing in many organizations. To ensure timely investigation of requests, this work proposes the use of signature-based methods for automated action instance approximation to automatically reconstruct past user activities within a compromised or suspect system.… ▽ More

    Submitted 21 July, 2014; originally announced July 2014.

    Comments: International Journal of Information Security

  10. Measuring digital crime investigation capacity to guide international crime prevention strategies

    Authors: Joshua I. James, Yunsik Jake Jang

    Abstract: This work proposes a method for the measurement of a country's digital investigation capacity and saturation for the assessment of future capacity expansion. The focus is on external, or international, partners being a factor that could negatively affect the return on investment when attempting to expand investigation capacity nationally. This work concludes with the argument that when dealing wit… ▽ More

    Submitted 29 August, 2013; originally announced August 2013.

    Comments: 7 pages, 3 figures, Presented at FutureTech 2013

    Journal ref: Future Information Technology. Springer Berlin Heidelberg, 2014. 361-366

  11. arXiv:1307.0076  [pdf, ps, other

    cs.CY

    An Assessment Model for Cybercrime Investigation Capacity

    Authors: Joshua I. James, Yunsik Jake Jang

    Abstract: Digital technologies are constantly changing, and with it criminals are finding new ways to abuse these technologies. Cybercrime investigators, then, must also keep their skills and knowledge up to date. This work proposes a holistic training development model - specifically focused on cybercrime investigation - that is based on improving investigator capability while also considering the capacity… ▽ More

    Submitted 29 June, 2013; originally announced July 2013.

    Comments: 1 figure, World Crime Forum 1st Asian Regional Conference - Information Society and Cybercrime: Challenges for Criminology and Criminal Justice

  12. arXiv:1303.4498  [pdf

    cs.CY

    Challenges with Automation in Digital Forensic Investigations

    Authors: Joshua I. James, Pavel Gladyshev

    Abstract: The use of automation in digital forensic investigations is not only a technological issue, but also has political and social implications. This work discusses some challenges with the implementation and acceptance of automation in digital forensic investigation, and possible implications for current digital forensic investigators. Current attitudes towards the use of automation in digital forensi… ▽ More

    Submitted 19 March, 2013; originally announced March 2013.

    Comments: 17 pages, 1 figure

  13. Signature Based Detection of User Events for Post-Mortem Forensic Analysis

    Authors: Joshua I. James, Pavel Gladyshev, Yuandong Zhu

    Abstract: This paper introduces a novel approach to user event reconstruction by showing the practicality of generating and implementing signature-based analysis methods to reconstruct high-level user actions from a collection of low-level traces found during a post-mortem forensic analysis of a system. Traditional forensic analysis and the inferences an investigator normally makes when given digital eviden… ▽ More

    Submitted 10 February, 2013; originally announced February 2013.

    Comments: 15 pages, 4 figures, 5 tables, 1 appendix, 2nd International Conference on Digital Forensics and Cyber Crime

    Journal ref: James, J.I., P. Gladyshev, Y. Zhu. (2011) "Signature Based Detection of User Events for Post-Mortem Forensic Analysis". Digital Forensics and Cyber Crime. Vol 53. pp 96-109. Springer

  14. Analysis of Evidence Using Formal Event Reconstruction

    Authors: Joshua I. James, Pavel Gladyshev, Mohd Taufik Abdullah, Yuandong Zhu

    Abstract: This paper expands upon the finite state machine approach for the formal analysis of digital evidence. The proposed method may be used to support the feasibility of a given statement by testing it against a relevant system model. To achieve this, a novel method for modeling the system and evidential statements is given. The method is then examined in a case study example.

    Submitted 10 February, 2013; originally announced February 2013.

    Comments: 10 pages, 11 figures, Presented at the 1st International Conference on Digital Forensics & Cyber Crime

    Journal ref: James, J.I., P. Gladyshev, M. Abdullah, Y. Zhu (2010) "Analysis of Evidence Using Formal Event Reconstruction". Digital Forensics and Cyber Crime. Vol 31. pp 85-98. Springer