Analysing Privacy-Invasive Software Using Computer Forensic Methods

نویسندگان

  • Martin Boldt
  • Bengt Carlsson
چکیده

User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. We present a computer forensic investigation method for detecting and analysing PIS. In an experiment we use this method to evaluate both the evolution of PIS and associated countermeasures, over a four year period. Background information on both PIS and countermeasure techniques are also presented, followed by discussions on legal disputes between developers of PIS and vendors of countermeasures.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Preventing Privacy-Invasive Software Using Collaborative Reputation Systems

Privacy-invasive software, loosely labeled spyware, is an increasingly common problem for today’s computer users, one to which there is no absolute cure. Most of the privacy-invasive software are positioned in a legal gray zone, as the user accepts the malicious behaviour when agreeing to the End User License Agreement. This paper proposes the use of a specialized reputation system to gather an...

متن کامل

Computer Forensics between the Italian Legislation and Pragmatic Questions

Over the last few years, analysing a computer or a digital device has become a necessity in the field of criminal investigations. However, during the forensic analysis, some ordinary mistakes are often made. The aim of this paper is to define a new approach to the problem of evidence examination, analysing and studying practical experiences of case studies within the Italian legal system concer...

متن کامل

On the Investigation of Application Specific Data within Digital Forensics

Microsoft Word and Skype are widespread applications in our daily IT life. Up to now, if a computer forensic examination is required, the majority of forensic investigators tends to use commercial software to analyse this application-specific data. However, commercial software is rather expensive and typically closed-source. This paper aims at exploring if an applicationspecific forensic invest...

متن کامل

Engineering Adaptive Digital Investigations using Forensic Requirements

A digital forensic investigation aims to collect and analyse the evidence necessary to demonstrate a potential hypothesis of a digital crime. Despite the availability of several digital forensics tools, investigators still approach each crime case from scratch, postulating potential hypotheses and analysing large volumes of data. This paper proposes to explicitly model forensic requirements in ...

متن کامل

A Collaborative Distributed Virtual Platform for Forensic Analysis of Malicious Code

Malicious software is prevalent in many forms with the potential for many types of malware to be downloaded while browsing the Internet using an unprotected system. The potential impact can be irreparable harm to a computer file system or even place a person in a situation where they could be charged for a criminal act, if the perpetrator assumes control of their system. Understanding contempor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006