Skip to content

Statistical Methods for Analyzing Event Time-Series Data in Digital Forensics

Type: Webinar
Research Area: Digital

This CSAFE webinar was presented by Dr. Padhraic Smyth from University of California, Irvine on September 28, 2017.

Description:
Time-series of user-generated events are routinely captured and logged on devices such as computers and mobile phones. This type of data is of increasing interest in forensic investigations. There has been relatively little use of statistical thinking in this context, for a variety of reasons. In this talk we will discuss recent work at UC Irvine (under CSAFE) that has begun to develop statistical techniques to answer basic questions about such data, building on methods such as marked point processes. We will outline the methodological approach and describe results to date on both simulated and real-world data. The talk will conclude with a brief discussion of challenges in this area as well as some thoughts on future research directions.

Related Resources

Source Camera Identification with Multi-Camera Smartphones

Source Camera Identification with Multi-Camera Smartphones

An overview of source camera identification on multi-camera smartphones, and introduction to the new CSAFE multi-camera smartphone image database, and a summary of recent results on the iPhone 14 Pro’s.
An Anti-Fuzzing Approach for Android Apps

An Anti-Fuzzing Approach for Android Apps

One of significant mobile app forensic analysis problems is the app evidence extraction from the device. Given the fact that mobile apps could generate more than 19K files in a…
Forensic Analysis of Android Cryptocurrency Wallet Applications

Forensic Analysis of Android Cryptocurrency Wallet Applications

Crypto wallet apps that integrate with various block-chains allow the users to make digital currencies transaction with QR codes. According to reports from financesonline [3], there is over 68 million…
Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information

Variations and Extensions of Information Leakage Metrics with Applications to Privacy Problems with Imperfect Statistical Information

The conventional information leakage metrics assume that an adversary has complete knowledge of the distribution of the mechanism used to disclose information correlated with the sensitive attributes of a system.…