Countering browser fingerprinting techniques: Constructing a fake profile with google chrome

U Fiore, A Castiglione, A De Santis… - … on Network-Based …, 2014 - ieeexplore.ieee.org
While Web browsers are fundamental components in the Internet nowadays, the widespread
availability of several techniques that can be used to detect the individual browser …

A novel methodology to acquire live big data evidence from the cloud

A Castiglione, G Cattaneo, G De Maio… - … Transactions on Big …, 2017 - ieeexplore.ieee.org
In the last decade Digital Forensics has experienced several issues when dealing with
network evidence. Collecting network evidence is difficult due to its volatility. In fact, such …

Efficiently mitigating face-swap-attacks: compressed-PRNU verification with sub-zones

A Hassani, H Malik, J Diedrich - Technologies, 2022 - mdpi.com
Face-swap-attacks (FSAs) are a new threat to face recognition systems. FSAs are essentially
imperceptible replay-attacks using an injection device and generative networks. By placing …

Automated production of predetermined digital evidence

A Castiglione, G Cattaneo, G De Maio… - IEEE Access, 2013 - ieeexplore.ieee.org
Digital evidence is increasingly used in juridical proceedings. In some recent legal cases,
the verdict has been strongly influenced by the digital evidence proffered by the defense …

Cases study and analysis of the court judgement of cybercrimes in Taiwan

JR Sun, ML Shih, MS Hwang - International Journal of Law, Crime and …, 2015 - Elsevier
With the development of information technology and Internet, the criminal model has been
changed. The Internet has become an instrument of crime as a new type of criminal means …

Windows 7 antiforensics: a review and a novel approach

B Eterovic‐Soric, KKR Choo… - Journal of forensic …, 2017 - Wiley Online Library
In this paper, we review literature on antiforensics published between 2010 and 2016 and
reveal the surprising lack of up‐to‐date research on this topic. This research aims to …

On asynchronous enforcement of security policies in “Nomadic” storage facilities

I You, L Catuogno, A Castiglione… - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
The fast advance in networked and ubiquitous computing leads to remarkable innovation
also in data storage technologies. The classical local/remote storage dichotomy has been …

[PDF][PDF] New challenges in digital forensics: online storage and anonymous communication

M Mulazzani - 2014, 2014 - publications.sba-research.org
This thesis is based on seven publications related to the area of digital forensics which were
published at conferences or in journals by ACM, IEEE, USENIX and IFIP. Digital forensics as …

Cyber threats monitoring: Experimental analysis of malware behavior in cyberspace

CM Colombini, A Colella, M Mattiucci… - Security Engineering and …, 2013 - Springer
Cyberspace is a borderless new universe in which all actors, including States, share
information and communications technologies, now indispensable to the modern lifestyle …

Efficient face-swap-verification using PRNU

A Hassani, H Malik - … on Data Science and Machine Learning …, 2022 - ieeexplore.ieee.org
Facial recognition is becoming the go-to method of identifying users for convenience
applications. While great advances have occurred in achieving strong false acceptance and …