2021
DOI: 10.1016/j.scijus.2020.10.002
|View full text |Cite
|
Sign up to set email alerts
|

Can computer forensic tools be trusted in digital investigations?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 26 publications
(19 citation statements)
references
References 14 publications
0
18
0
1
Order By: Relevance
“…Twitch is a proprietary and closed-source software, which means knowledge of its implementation (such as source code, programming language used, and engineering design employed) is not publicly available. Therefore, we developed a methodology based on blackbox testing principles for this study [46,47]. This methodology aims to identify forensically relevant streaming functions of Twitch, prepare test-cases for their execution, and list possible evidences of execution of each test-case that are expected to be identified and extracted during forensic analysis.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Twitch is a proprietary and closed-source software, which means knowledge of its implementation (such as source code, programming language used, and engineering design employed) is not publicly available. Therefore, we developed a methodology based on blackbox testing principles for this study [46,47]. This methodology aims to identify forensically relevant streaming functions of Twitch, prepare test-cases for their execution, and list possible evidences of execution of each test-case that are expected to be identified and extracted during forensic analysis.…”
Section: Methodsmentioning
confidence: 99%
“…Twitch is a proprietary and closed‐source software, which means knowledge of its implementation (such as source code, programming language used, and engineering design employed) is not publicly available. Therefore, we developed a methodology based on black‐box testing principles for this study [46,47].…”
Section: Methodsmentioning
confidence: 99%
“…VigoVideo is a proprietary and closed source software, which means the knowledge of its implementation (such as source code, programming language, engineering design and so on) is unknown. As a result, white-box testing principles are not appropriate, and therefore, we developed a methodology based on black-box testing principles (Bhat et al, 2021), which is listed below: 1. Acquisition of application (a) In this step, the application is acquired from Google Playstore and a unique signature that identifies it is created so that any subsequent versions are not misinterpreted as already analysed.…”
Section: Methodsmentioning
confidence: 99%
“…With time and in the era of intelligent devices and technologies, the nature of cybercrimes has diversified. Identify theft and espionage [55], [111], [112], [113], intellectual property theft, information leakage, harassment, phishing, denial of services (DoS), and cyber defamation are some of the most common attacks nowadays [114].…”
Section: State-of-the-art Computer Forensic Toolsmentioning
confidence: 99%