• Deutsch
Login

Open Access

  • Home
  • Search
  • Browse
  • Publish/report a document
  • Help

Refine

Has Fulltext

  • yes (5)

Author

  • Breitinger, Frank (5)
  • Zhang, Xiaolu (5)
  • Baggili, Ibrahim (3)
  • Knieriem, Brandon (1)
  • Levine, Philip (1)
  • Luechinger, Engelbert (1)
  • O'Shaughnessy, Stephen (1)
  • Quick, Darren (1)

Year of publication

  • 2022 (1)
  • 2021 (1)
  • 2018 (1)
  • 2017 (1)
  • 2016 (1)

Document Type

  • Article (4)
  • Conference Proceeding (1)

Language

  • English (5)

Institute

  • Fakultät für Angewandte Informatik (5)
  • Institut für Informatik (5)
  • Lehrstuhl für Cybersicherheit (5)

5 search hits

  • 1 to 5
  • 10
  • 20
  • 50
  • 100

Sort by

  • Year
  • Year
  • Title
  • Title
  • Author
  • Author
A forensic analysis of rclone and rclone's prospects for digital forensic investigations of cloud storage (2022)
Breitinger, Frank ; Zhang, Xiaolu ; Quick, Darren
Organizations and end users are moving their data into the cloud and trust Cloud Storage Providers (CSP) such as pCloud, Dropbox, or Backblaze. Given their popularity, it is likely that forensic examiners encounter one or more online storage types that they will have to acquire and analyze during an investigation. To access cloud storage, CSPs provide web-interfaces, proprietary software solutions (e.g., Dropbox client for Windows) as well as APIs allowing third-party access. One of these third-party applications is rclone which is an open-source tool to access many common CSPs through a command line interface. In this article, we look at rclone from two perspectives: First, we perform a forensic analysis on rclone and discuss aspects such as password recovery of the configuration file, encryption, and JA3 fingerprints. Second, we discuss rclone as a prospect to be a forensic tool which includes its read-only mount feature and sample cases. Under the circumstances tested, rclone is suitable for forensic practitioners as it is open-source, documented, and includes some essential functionality frequently needed but practitioners need to be aware of the caveats.
Android application forensics: a survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations (2021)
Zhang, Xiaolu ; Breitinger, Frank ; Luechinger, Engelbert ; O'Shaughnessy, Stephen
Android obfuscation techniques include not only classic code obfuscation techniques that were adapted to Android, but also obfuscation methods that target the Android platform specifically. This work examines the status-quo of Android obfuscation, obfuscation detection and deobfuscation. Specifically, it first summarizes obfuscation approaches that are commonly used by app developers for code optimization, to protect their software against code theft and code tampering but are also frequently misused by malware developers to circumvent anti-malware products. Secondly, the article focuses on obfuscation detection techniques and presents various available tools and current research. Thirdly, deobfuscation (which aims at reinstating the original state before obfuscation) is discussed followed by a brief discussion how this impacts forensic investigation. We conclude that although obfuscation is widely used in Android app development (benign and malicious), available tools and the practices on how to deal with obfuscation are not standardized, and so are inherently lacking from a forensic standpoint.
Breaking into the vault: privacy, security and forensic analysis of Android vault applications (2017)
Zhang, Xiaolu ; Baggili, Ibrahim ; Breitinger, Frank
Rapid Android Parser for Investigating DEX files (RAPID) (2016)
Zhang, Xiaolu ; Breitinger, Frank ; Baggili, Ibrahim
An overview of the usage of default passwords (2018)
Knieriem, Brandon ; Zhang, Xiaolu ; Levine, Philip ; Breitinger, Frank ; Baggili, Ibrahim
  • 1 to 5

OPUS4 Logo

  • Contact
  • Imprint
  • Sitelinks