Posts for category: Forensics Weekly Executive Summmaries

Importance of Digital Forensics Process Models: Some Examples

Introduction The field of digital forensics faces many challenges, and one of the most important is the field’s need for models with regards to the procedures of investigations and ...

Smart/IoT Devices as Evidence Sources

Introduction The increasingly pervasive presence of smart and Internet-of-Things (IoT) devices across multiple environments such as home, office, and public places means that they are in a ...

Applications and Challenges of Artificial Intelligence for Digital Forensics

Introduction Artificial Intelligence (AI) is a rapidly growing technology with many potential applications in many different fields, and digital forensics is one of those fields. Here, AI has the ...

Challenges in Digital Forensics for the Internet of Things

Introduction The continued growth and development of the Internet of Things (IoT) has led to its usage and application across an increasingly broad range of situations to facilitate services. ...

Digital Forensics and the Smart City: An Overview

Introduction The increasing ubiquity of the Internet of Things (IoT), drones, remote sensors, artificial intelligence (AI) and other relatively new networked technologies has led to their ...

Using AI to advance the Digital Forensics Process

Introduction As AI increases its prevalence for public and general usage, novel use cases are becoming more accessible. General model tools such as ChatGPT and Stable Diffusion have forced AI ...

Malware Reverse Engineering for Digital Forensics

Introduction A key component of any digital forensic investigation is malware reverse engineering (MRE). MRE involves locating malware on a system, decompiling that malware, and then breaking ...

Forensics Processing: Indicators of Compromise

Introduction Indicators of Compromise (IOCs) are a key feature to detect if a network or system was subject to a cyber-attack. They can give information about when a cyber-attack occurred, what ...

CVE-2023-5217 Explained: VP8 and Memory Buffer Overflow

Introduction CVE-2023-5217 is a recently identified exploit of the VP8 codec within the libvpx library. This exploit relies on memory corruption and heap buffer overflow. By utilizing a crafted ...

Real-Time Forensics: Hunting with Wireshark

Introduction Wireshark is a powerful network traffic analysis tool that is useful in digital forensics. By setting up Wireshark on a portable disk, real-time forensics can be performed to assist ...