SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The International Conference in Information Security and Digital Forensics (ISDF2014)
-
Risk Analysis in Skype Software Security
Skype software is considered as a common and important communication service that is used these days. This research aims to investigate the security issues related to the Skype. The unsolved issues ...Authors: Afnan AlOmrani, Rasheed AlZahrani and Eyas ElQawasmeh
Year Published: Dec. 2014 | 1-6 | ISDF2014 -
Anti-forensic Tool Use and their Impact on Digital Forensic Investigations: a South African Perspective
Digital evidence is becoming an integral part of most cases presented to court. From computers, to mobile phones, ATMs and surveillance cameras, our daily life is so inextricably entwined with ...Authors: Jean-Paul Van Belle, Richard de Beer and Adrie Stander
Year Published: Dec. 2014 | 7-20 | ISDF2014 -
Best Practices for Cybercrime Evidence Collection Projects
One important phase related to a cybercrime investigation is evidence collection. If the investigator lacks a standard, robust approach to properly conduct crime scene research, some important ...Authors: Lilian Noronha Nassif
Year Published: Dec. 2014 | 21-28 | ISDF2014 -
Cyber-Physical Systems: Survey
The cyber-physical systems are the combination of computational elements and physical entities that can interact with humans through many modalities. The security includes the malicious attempts by ...Authors: Yenumula B Reddy
Year Published: Dec. 2014 | 29-41 | ISDF2014 -
Mobile Forensics: Evidence Collection and Malicious Activity Identification in PPDR Systems
During the last decade, smartphones have shown increased computational and networking capabilities. With the high bandwidth supported by Fourth Generation/ Long-Term Evolution (4G/LTE) technology, ...Authors: Konstantia Barbatsalou, Edmundo Monteiro and Paulo Simoes
Year Published: Dec. 2014 | 42-48 | ISDF2014 -
Security Correlation Analysis System for Insider Threat Detection of Industrial Control System
The security accident is increasing in industrial infrastructure. The security of industrial control system is caused not only by deliberate acts of external attacker but also by sometimes ...Authors: Young-jun Heo, Seon-gyoung Sohn, Jung-chan Na and Beom-hwan Chang
Year Published: Dec. 2014 | 49-53 | ISDF2014 -
Using Supply Voltage Metal Layers as Low Cost Means to Hinder Several Types of Physical Attacks
In this paper, we describe the idea of using the metallization layers used for supplying ICs with VDD and GND as a low-cost countermeasure for semi-invasive front-side attacks. The core of our idea ...Authors: Christian Wittke, Zoya Dyka, Frank Vater, Anton Datsuk and Peter Langendoerfer
Year Published: Dec. 2014 | 54-62 | ISDF2014 -
Security Issues of Contemporary Multimedia Implementations: The Case of Sonos and SonosNet
Exploiting vulnerabilities on multimedia devices and implementations that are made for Small Office Home Office (SOHO) environments induce new risk trends. This happens due to usability and user ...Authors: Stylianos P. Kavalaris, Emmanouil Serrelis
Year Published: Dec. 2014 | 63-74 | ISDF2014 -
Money Laundering as Specific Form of Fraud Management
Money laundering is the legalization of capital and money obtained from crime and core activity of fraud management. This activity is carried out through financial transactions that obscure the ...Authors: Dusko Tomic, Jelena Dinic
Year Published: Dec. 2014 | 75-80 | ISDF2014 -
Circuit Testing Method Based on Wavelets
The paper presents the comparison of waveforms for the input stimulus of a circuit under test, using a testing system incorporated in an FPGA, relying on a method based on wavelet transformation of ...Authors: Sotirios Pouros, D. K. Papakostas and V. Vassios
Year Published: Dec. 2014 | 81-84 | ISDF2014 -
Preparing for Malware that Uses Covert Communication Channels: The Case of Tor-based Android Malware
The usage of the Tor network, has introduced a new malware paradigm that could also threaten mobile security and privacy. In the recent past months there have been only two cases of Tor-enabled ...Authors: Fragkiskos – Emmanouil Kioupakis, Emmanouil Serrelis
Year Published: Dec. 2014 | 85-96 | ISDF2014 -
Extracting IDS Rules from Honeypot Data: A Decision Tree Approach
This work uses data collected by honeypots to create rules and signatures for intrusion detec-tion systems. The rules are extracted from deci-sion trees constructed based on the data of a real ...Authors: Pedro Henrique Matheus, Leandro Nunes de Castro
Year Published: Dec. 2014 | 97-109 | ISDF2014 -
Balanced Design in Information Systems Security Planning
Information security is traditionally understood to involve technical security measures, such as intrusion prevention systems, to establish a secure perimeter around an organization’s sensitive ...Authors: Daniel A. Stern
Year Published: Dec. 2014 | 110-120 | ISDF2014