scholarly journals Detection of Suspicious Timestamps in NTFS using Volume Shadow Copies

Author(s):  
ALJI Mohamed ◽  
◽  
CHOUGDALI Khalid

When a computer gets involved in a crime, it is the mission of the digital forensic experts to extract the left binary artifacts on that device. Among those artifacts, there may be some volume shadow copy files left on the Windows operating system. Those files are snapshots of the volume recorded by the system in case of a needed restore to a specific past date. Before this study, we did not know if the valuable forensic information hold within those snapshot files can be exploited to locate suspicious timestamps in an NTFS formatted partition. This study provides the reader with an intersnapshot time analysis for detecting file system timestamp manipulation. In other words, we will leverage the presence of the time information within multiples volume shadow copies to detect any suspicious tampering of the file system timestamps. A detection algorithm of the suspicious timestamps is contributed. Its main role is to assist the digital investigator to spot the manipulation if it has occurred. In addition, a virtual environment has been set up to validate the use of the proposed algorithm for the detection.

Author(s):  
Randall Spain ◽  
Benjamin Goldberg ◽  
Jeffrey Hansberger ◽  
Tami Griffith ◽  
Jeremy Flynn ◽  
...  

Recent advances in technology have made virtual environments, virtual reality, augmented reality, and simulations more affordable and accessible to researchers, companies, and the general public, which has led to many novel use cases and applications. A key objective of human factors research and practice is determining how these technology-rich applications can be designed and applied to improve human performance across a variety of contexts. This session will demonstrate some of the distinct and diverse uses of virtual environments and mixed reality environments in an alternative format. The session will begin with each demonstrator providing a brief overview of their virtual environment (VE) and a description of how it has been used to address a particular problem or research need. Following the description portion of the session, each VE will be set-up at a demonstration station in the room, and session attendees will be encouraged to directly interact with the virtual environment and ask demonstrators questions about their research and inquire about the effectiveness of using VE for research, training, and evaluation purposes. The overall objective of this alternative session is to increase the awareness of how human factors professionals use VE technologies and increase the awareness of the capabilities and limitations of VE in supporting the work of HF professionals.


2019 ◽  
Vol 1 (1) ◽  
pp. 574-582
Author(s):  
Paweł Gburzyński ◽  
Elżbieta Kopciuszewska

AbstractWe present a software platform for designing and testing wireless networks of sensors and actuators (WSNs). The platform consists of three components: an operating system for small-footprint microcontrollers (dubbed PicOS), a software development kit (SDK) amounting to a C-based, event-oriented (reactive) programming language, and a virtual execution platform (VUE2) capable of emulating complete deployment environments for WSNs and thus facilitating their rapid development.1 Its most recent incarnation introduced in the present paper is a component of the WSN lab being currently set up at Vistula in collaboration with Olsonet Communications Corporation.2 We highlight the platform’s most interesting features within the context of a production WSN installed at independent-living facilities.


2014 ◽  
Vol 15 (1) ◽  
pp. 50-58 ◽  
Author(s):  
Karim Claudio ◽  
Vincent Couallier ◽  
Cyril Leclerc ◽  
Yves Le Gat ◽  
Jérôme Saracco

Automatic water meter reading (AMR) is now the best kind of technology to supply real time information on water consumption. Complete equipment of a district metered area enables the assessment of the total consumption of a finite size population, for a time scale sometimes as short as an hour. However, its cost for generalization can generate high capital expenditures (CAPEX), unaffordable for the utility, in which case sampling techniques have to be set up. With the purpose of total consumption estimation, this article describes standard methods of survey techniques applied to water networks and proposes a methodology for implementation of an operational sample. The methodology, which includes some constraints on the estimator precision, proposes a smart AMR equipment plan of the population, while reducing CAPEX. Finally, estimation of the total consumption, in addition to the knowledge of supplied volume, enables more accurate loss assessment and potential detection of new leaks.


2014 ◽  
Vol 519-520 ◽  
pp. 833-837
Author(s):  
Hui Yan Qu ◽  
Wei Zhao

In order to solve the virtual objects intersect problem in virtual environment, real-time fast CD application must be used in virtual environment. Collision detection algorithm based on a SIMD parallel was proposed. For ordered lists we used methods for N processors to search ordered sequence simultaneously, to select a valid range through an iterative, to retain the public segment as an iterative sequence so that to complete the division of the interval and data selection. It can improve the reconstruction of the bounding box of the data selected when these two algorithms applied to the detection of the CD. Experimental results show that compared with the classical reconstruction algorithm, the proposed algorithm has better time complexity and improve the efficiency of the CD.


2016 ◽  
Vol 844 ◽  
pp. 31-37
Author(s):  
Łukasz Sobaszek ◽  
Arkadiusz Gola ◽  
Jozef Varga

The number of companies that decide to employ industrial robots to facilitate their production process is on the constant increase. Implementation of such solutions requires deep analysis of manifold aspects of such an endeavour. Apart from the economical face of the problem, there appear issues connected with integration of robots with the existing manufacturing infrastructure. Hence software enabling simulation and analysis of a robot work in the future environment is in demand. The following article is devoted to the problem of virtual designing of robotic workstations. The work presents basic information regarding application of robots in manufacturing companies and introduces typical software for simulation and programming of industrial robots. What is more, the process of designing a virtual environment and conducting analysis of robot work analysis is presented based on the laboratory set-up with Kawasaki RS003N robot. Finally, other examples of virtually designed robotic workstations are introduced.


2013 ◽  
Vol 373-375 ◽  
pp. 1587-1590
Author(s):  
Bo Qu

This paper describes the design and implementation of tiny TTY for an ARM based multi-process mono-kernel, including overview of TTY, and implementation of the TTY routines such as data structure of TTY, TTY input, TTY read, TTY write, TTY waiting and TTY signal setting. A demo example is also provided at the final of the paper to show the effect. The mono-kernel is developed by the author of this paper on Linux with GNU tool chain from scratch, for which the tiny TTY is designed. Based on this mono-kernel, other components can be added such as file system, network management, etc. to form a more powerful embedded operating system.


2003 ◽  
Vol 12 (5) ◽  
pp. 481-494 ◽  
Author(s):  
Kristine L. Nowak ◽  
Frank Biocca

We report on an experiment that examined the influence of anthropomorphism and perceived agency on presence, copresence, and social presence in a virtual environment. The experiment varied the level of anthropomorphism of the image of interactants: high anthropomorphism, low anthropomorphism, or no image. Perceived agency was manipulated by telling the participants that the image was either an avatar controlled by a human, or an agent controlled by a computer. The results support the prediction that people respond socially to both human and computer-controlled entities, and that the existence of a virtual image increases tele-presence. Participants interacting with the less-anthropomorphic image reported more copresence and social presence than those interacting with partners represented by either no image at all or by a highly anthropomorphic image of the other, indicating that the more anthropomorphic images set up higher expectations that lead to reduced presence when these expectations were not met.


Sign in / Sign up

Export Citation Format

Share Document