Entity

Time filter

Source Type

San Jose, California, United States

Cohen F.B.,California science Institute
Proceedings of the Annual Hawaii International Conference on System Sciences | Year: 2010

This paper presents advances in and limits on the attribution of messages to sources in digital forensics cases. It overviews current attribution technologies, the limits of those technologies, identifies ways in which attributions are made today and their limits, and discusses available methods for attribution within the legal system and the limits of digital forensic evidence for use in these purposes. It then presents a set of tools for message attribution now in use and identifies how they are being used and the limits of their applicability to forensics. The present and historical situation show a need for improved attribution, and clearly there is a long way to go before a sound scientific basis for attributions of messages to sources will be definitive. © 2010 IEEE. Source


Cohen F.,California science Institute | Cohen F.,Fred Cohen & Associates
5th International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2010 | Year: 2010

Like other latent evidence that cannot be directly perceived by people, bit sequences have to be presented through tools. Presentations of digital forensic evidence often involve the presentation of text versions of bit sequences representing traces of events that took place within digital systems. This paper is about creating fonts for the examination and presentation of particular classes of bit sequences presented in particular ways in legal situations. Unlike fonts used for other purposes, fonts for forensics are less about the beauty of the presentation and more about the tradeoff between readability and being definitive about what is present. In other words, what you see is what you get, rather than what you see is what looks nice. © 2010 IEEE. Source


Cohen F.,California science Institute
IEEE Security and Privacy | Year: 2010

In the US, tens of millions of "smart meters," which are vulnerable to remote exploitation, viruses, worms, malicious upgrades, and all manner of other attacks, have been deployed. Attackers can and already have used these meters, on a small scale, to disable the power infrastructure and cause both long-term physical damage to it and harm to the public. These deployments and other related control mechanisms will be expanded in the coming years, as a necessary step toward better energy efficiency and to enable the next generation of electrical systems to integrate into the grid. The question is, how can we make this deployment safe and secure? © 2010 IEEE. Source


Cohen F.,Fred Cohen & Associates | Cohen F.,California science Institute
Computers and Security | Year: 2010

This paper examines technical underpinnings for the notion of control as identified in laws and regulations in order to provide a technical basis for performing forensic analysis of digital forensic evidence in cases where taking control over systems or mechanisms is the issue. © 2010 Elsevier Ltd. All rights reserved. Source


Cohen F.,California science Institute
IEEE Security and Privacy | Year: 2010

Virtualization is increasingly being touted and used as the solution to the many ills we have in securing operating systems. But for many, it's just a case of "back to the future" with a twist. The twist could be good or bad for security, depending on how we use it. If history has anything to teach us, it's that what can go wrong will go wrongin the worst possible way. But there's always hope, if we can just figure out how to couch it. © 2006 IEEE. Source

Discover hidden collaborations