MAPPING THE LAWS WHICH APPLY TO INTERCEPTING WIRELESS COMMUNICATIONS IN A WESTERN AUSTRALIAN LEGAL CONTEXT The rapid evolution and deployment of WiFi
ثبت نشده
چکیده
The prevalence of Android smartphones and the immense growth of Android malware create significant numbers of malware incidents that require forensics handling. Certain smartphone forensic tool has incorporated anti-virus databases in their device for malware detection process. However, examiners should be aware that most of anti-virus application uses known patterns or signatures for malware detection that might not be effective for unknown malware. Moreover, many advanced malware are known using specific techniques to hide its presence from anti-virus detection and for antiforensics technique. Beside the malware detection requirement, the examiner needs to do the Malware Profiling for obtaining the information such as a purpose of malware and how to achieve it and any other information. Many tools and techniques for Android malware analysis can be used for Malware Profiling process. However, this procedure should consider the forensically sound process. The research shows several tools and techniques for supporting the process and proposes the workflow for Malware Profiling. The research uses Zeus-in-the-Mobile (ZitMO) as the malware sample for showing how examiner can perform the Malware Profiling based on the proposed workflow.
منابع مشابه
Police Interpreting: A View from the Australian Context
In the global village of today, more people have been moving and migrating than ever before creating a need for better communication. Thus community interpreting rose as a specialization serving the needs of members of the community who are unable to communicate with the system. Within this broad field of interpreting the specialist area of legal interpreting assumed a high position. However, l...
متن کاملQuasi Random Deployment Strategy for Reliable Communication Backbones in Wireless Sensor Networks
Topology construction and topology maintenance are significant sub-problems of topology control. Spanning tree based algorithms for topology control are basically transmission range based type construction algorithms. The construction of an effective backbone, however, is indirectly related to the placement of nodes. Also, the dependence of network reliability on the communication path undertak...
متن کاملDesign and evaluation of two distributed methods for sensors placement in Wireless Sensor Networks
Adequate coverage is one of the main problems for distributed wireless sensor networks and The effectiveness of that highly depends on the sensor deployment scheme. Given a finite number of sensors, optimizing the sensor deployment will provide sufficient sensor coverage and save power of sensors for movement to target location to adequate coverage. In this paper, we apply fuzzy logic system to...
متن کاملDesign and evaluation of two distributed methods for sensors placement in Wireless Sensor Networks
Adequate coverage is one of the main problems for distributed wireless sensor networks and The effectiveness of that highly depends on the sensor deployment scheme. Given a finite number of sensors, optimizing the sensor deployment will provide sufficient sensor coverage and save power of sensors for movement to target location to adequate coverage. In this paper, we apply fuzzy logic system to...
متن کاملLPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015