EditorialThe internet of things: Interconnected digital dust
Section snippets
Landscape
Embedded computing is so pervasive that it in many cases fades into the background, or is hidden behind the provision of common services. Many people do not think about the systems behind common daily activities until security breaches of large retailers involving payment card systems. The mere identification that there is a computing device present, and the identification of the forensic impacts of the application of that computing is a valuable contribution to the body of knowledge. The paper
Technique
Digital video is an application area significantly represented in the embedded area. In particular CCTV and mobile phone based video recordings represent an important source of intelligence and evidence in digital investigations. Challenges here include the proliferation of poorly documented, bespoke file system formats and the need to recover partially deleted fragments of such video recordings in storage constrained devices.
In “Reverse engineering a CCTV system, a case study”, Tobin et al.,
References (0)
Cited by (2)
Forensic framework to identify local vs synced artefacts
2018, Digital InvestigationCitation Excerpt :Today, the Internet of Things (IoT) adds a layer of complexity when it comes to analyzing devices with cloud evidence, especially as it relates to the application of the framework proposed in this paper. IoT devices have different operating systems and filesystems, and because of its ubiquitous syncing of data between devices, there is less certainty in where the data originated (Schatz et al., 2014; Lillis et al., 2016). In (Shavers, 2013), Shavers talks about creating timelines with either log2timeline or with a forensic tool, and visualizing it with a visual tool or a spreadsheet application.
Forensic framework to identify local vs synced artefacts
2008, DFRWS 2018 EU - Proceedings of the 5th Annual DFRWS Europe