Author image not provided
 Brian D Carrier

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article13.15
Citation Count171
Publication count13
Publication years2004-2010
Available for download2
Average downloads per article2,918.50
Downloads (cumulative)5,837
Downloads (12 Months)106
Downloads (6 Weeks)14
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


13 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 13 of 13
Sort by:

1
August 2010 Digital Investigation: The International Journal of Digital Forensics & Incident Response: Volume 7, August, 2010
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 0

In this paper, we examine the potential to hide data in an ISO9660 file system, which is used to store data on CD-ROMs. By design, this file system allows for multiple directory trees and different byte orderings of essential data. We describe how data could be hidden in an ISO9660 ...
Keywords: Data Hiding, File System Forensic Analysis, Tool Testing

2
March 2009 Computing in Science and Engineering: Volume 7 Issue 2, March 2009
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 1

In response to another article in this special issue, "Forensics Is So 'Yesterday,'" the author proposes that although digital forensics does face challenges, it works, so digital investigations shouldn't stop as long as they follow the law.
Keywords: digital forensics, digital investigations, security and privacy

3
March 2009 IEEE Security and Privacy: Volume 7 Issue 2, March 2009
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 0

In response to another article in this special issue, "Forensics Is So 'Yesterday,'" the author proposes that although digital forensics does face challenges, it works, so digital investigations shouldn't stop as long as they follow the law.
Keywords: security and privacy, digital forensics, digital investigations

4

5
August 2007
Bibliometrics:
Citation Count: 0

Praise for Forensic Discovery"Farmer and Venema do for digital archaeology what Indiana Jones did for historical archaeology. Forensic Discovery unearths hidden treasures in enlightening and entertaining ways, showing how a time-centric approach to computer forensics reveals even the cleverest intruder. I highly recommend reading this book."--Richard Bejtlich, TaoSecurityPraise for Real ...

6
September 2006 Digital Investigation: The International Journal of Digital Forensics & Incident Response: Volume 3, September, 2006
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 3

Several digital forensic frameworks have been proposed, yet no conclusions have been reached about which are more appropriate. This is partly because each framework may work well for different types of investigations, but it hasn't been shown if any are sufficient for all types of investigations. To address this problem, ...
Keywords: Digital evidence, Digital investigation frameworks, Computer history model, Digital investigations, Event reconstruction

7 published by ACM
February 2006 Communications of the ACM - Next-generation cyber forensics: Volume 49 Issue 2, February 2006
Publisher: ACM
Bibliometrics:
Citation Count: 14
Downloads (6 Weeks): 13,   Downloads (12 Months): 92,   Downloads (Overall): 3,558

Full text available: HtmlHtml  PDFPDF
Live analysis tools have made a significant difference in capturing evidence during forensic investigations. Such tools, however, are far from infallible.

8
January 2006
Bibliometrics:
Citation Count: 12

This work formally defines a digital forensic investigation and categories of analysis techniques. The definitions are based on an extended finite state machine (FSM) model that was designed to include support for removable devices and complex states and events. The model is used to define the concept of a computer's ...

9
June 2005 Digital Investigation: The International Journal of Digital Forensics & Incident Response: Volume 2 Issue 2, June, 2005
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 0

As storage requirements increase, it is becoming more common for computers to use disk spanning techniques to make multiple disks look like one large disk, called a logical volume. This impacts an investigator because she must be able to recreate the logical volume so that the computer can be analyzed. ...
Keywords: Digital forensics, Volume analysis, Logical volumes

10
March 2005
Bibliometrics:
Citation Count: 93

The Definitive Guide to File System Analysis: Key Concepts and Hands-on TechniquesMost digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has ...

11 published by ACM
August 2004 ACM Transactions on Information and System Security (TISSEC): Volume 7 Issue 3, August 2004
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 1,   Downloads (12 Months): 14,   Downloads (Overall): 2,279

Full text available: PDFPDF
In this paper we present the Session Token Protocol (STOP), a new protocol that can assist in the forensic analysis of a computer involved in malicious network activity. It has been designed to help automate the process of tracing attackers who log on to a series of hosts to hide ...
Keywords: TCP traceback, auditing and intrusion detection, privacy, digital investigations, Digital forensics

12
March 2004 CERIAS '04: Proceedings of the 5th Annual Information Security Symposium
Publisher: CERIAS - Purdue University
Bibliometrics:
Citation Count: 0

The procedures for a physical crime scene are applied to the digital crime scene.

13
February 2004 Digital Investigation: The International Journal of Digital Forensics & Incident Response: Volume 1 Issue 1, February, 2004
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 42

The acquisition of volatile memory from a compromised computer is difficult to perform reliably because the acquisition procedure should not rely on untrusted code, such as the operating system or applications executing on top of it. In this paper, we present a procedure for acquiring volatile memory using a hardware ...
Keywords: Computer forensics, Incident response, Digital investigations, Volatile data acquisition, Digital evidence



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us