20 results where keywords includes forensics.
[All entries] This page as [Text] or [Bibtex]

  • @inproceedings{Levine:2017,
    Author = { Brian Neil Levine and Marc Liberatore and Brian Lynn and Matthew Wright},
    Booktitle = {Proceedings Third IEEE International Workshop on Privacy Engineering},
    Keywords = {security; forensics; peer-to-peer; anonymity; Child sexual exploitation},
    Month = {May},
    Pages = {25--32},
    Title = {{Statistical Detection of Downloaders in Freenet}},
    Url = {http://ceur-ws.org/Vol-1873/IWPE17_paper_12.pdf},
    Year = {2017},
    Bdsk-Url-1 = {http://ceur-ws.org/Vol-1873/IWPE17_paper_12.pdf}}

    [link][PDF]

  • @article{Bissias:2015a,
    Author = { George Bissias and Brian Neil Levine and Marc Liberatore and Brian Lynn and Juston Moore and Hanna Wallach and Janis Wolak},
    Doi = {http://dx.doi.org/10.1016/j.chiabu.2015.10.022},
    Journal = {Elsevier Child Abuse \& Neglect},
    Keywords = {forensics; peer-to-peer;Child sexual exploitation;Journal Paper},
    Month = {February},
    Pages = {185--199},
    Sponsors = {2011-MC-CX-0001},
    Title = {{Characterization of Contact Offenders and Child Exploitation Material Trafficking on Five Peer-to-Peer Networks}},
    Url = {http://forensics.umass.edu/pubs/bissias.ChildAbuseNeglect.2015.pdf},
    Volume = {52},
    Year = {2016},
    Bdsk-Url-2 = {http://dx.doi.org/10.1016/j.chiabu.2015.10.022}}

    [link][PDF]

  • @article{Bissias:2015,
    Author = { George Bissias and Brian Neil Levine and Marc Liberatore and Swagatika Prusty},
    Journal = {IEEE Transactions on Dependable and Secure Computing},
    Keywords = {forensics; peer-to-peer; anonymity; Journal Paper},
    Month = {Accepted for publication in},
    Sponsors = {CNS-1018615},
    Title = {{Forensic Identification of Anonymous Sources in OneSwarm}},
    Url = {http://forensics.umass.edu/pubs/bissias.tdsc.2015.pdf},
    Year = {2015},
    Bdsk-Url-1 = {http://forensics.umass.edu/pubs/prusty.ccs.2011.pdf}}

    [link][PDF]

  • @inproceedings{Varma:2014,
    Author = { Saksham Varma and Robert J. Walls and Brian Lynn and Brian Neil Levine},
    Booktitle = {Proc.\ ACM Workshop on Security and Privacy in Smartphones and Mobile Devices},
    Keywords = {forensics},
    Month = {November},
    Slides_Url = {http://forensics.umass.edu/pubs/slides/walls.spsm.2014.slides.pdf},
    Source_Code_Url = {http://forensics.umass.edu/projects.php},
    Sponsors = {NPS-N00244-12-1-0057},
    Title = {{Efficient Smart Phone Forensics Based on Relevance Feedback}},
    Url = {http://forensics.umass.edu/pubs/varma.spsm.2014.pdf},
    Year = {2014},
    Bdsk-Url-1 = {http://forensics.umass.edu/pubs/varma.spsm.2014.pdf}}

    [link][PDF]

  • @article{Liberatore:2014,
    Author = { Marc Liberatore and Brian Neil Levine and Clay Shields and Brian Lynn},
    Journal = {IEEE Transactions on Dependable and Secure Computing},
    Keywords = {forensics; peer-to-peer; Journal Paper; Child sexual exploitation},
    Month = {September},
    Number = {5},
    Pages = {425--439},
    Sponsor = {CNS-1018615 CNS-0905349, CNS-1018615, DUE-0830876, 2008-CE-CX-K005.},
    Title = {{Efficient Tagging of Remote Peers During Child Pornography Investigations}},
    Url = {http://forensics.umass.edu/pubs/Liberatore.tdsc.2014.pdf},
    Volume = {11},
    Year = {2014},
    Bdsk-Url-1 = {http://forensics.umass.edu/pubs/Liberatore.tdsc.2014.pdf}}

    [link][PDF]

  • @article{Wolak:2014,
    Author = { Janis Wolak and Marc Liberatore and Brian Neil Levine},
    Journal = {Elsevier Child Abuse \& Neglect},
    Keywords = {Peer-to-peer; Child sexual exploitation; Journal Paper; forensics},
    Month = {February},
    Number = 2, Pages = {347--356},
    Sponsors = {CNS-1016788, CNS-1018615, 2008-CE-CX-K005},
    Title = {{Measuring a year of child pornography trafficking by US computers on a peer-to-peer network}},
    Url = {http://dx.doi.org/10.1016/j.chiabu.2013.10.018},
    Volume = 38, Year = {2014},
    Bdsk-Url-1 = {http://dx.doi.org/10.1016/j.chiabu.2013.10.018}}

    [link][PDF]

  • @inproceedings{Hurley:2013,
    Author = { Ryan Hurley and Swagatika Prusty and Hamed Soroush and Robert J. Walls and Jeannie Albrecht and Emmanuel Cecchet and Brian Neil Levine and Marc Liberatore and Brian Lynn and Janis Wolak},
    Booktitle = {Proc. Intl. World Wide Web Conference (WWW)},
    Keywords = {forensics; peer-to-peer; Award Paper; Child sexual exploitation},
    Month = {May},
    Slides_Url = {http://forensics.umass.edu/pubs/slides/walls.www.2013.slides.pdf},
    Sponsors = {CNS-1018615; CNS-0905349; 2008-CE-CX-K005},
    Techreport_Url = {http://web.cs.umass.edu/publication/docs/2013/UM-CS-2013-007.pdf},
    Title = {{Measurement and Analysis of Child Pornography Trafficking on P2P Networks (Runner-Up, Best Paper Award)}},
    Url = {http://forensics.umass.edu/pubs/hurley.www.2013.pdf},
    Year = {2013},
    Bdsk-Url-1 = {http://forensics.umass.edu/pubs/hurley.www.2013.pdf}}

    [link][PDF]

  • @inproceedings{Yang:2013,
    Author = { Sookhyun Yang and Jim Kurose and Brian Neil Levine},
    Booktitle = {Proc. IEEE INFOCOM Mini-Conference},
    Keywords = {forensics; wireless; Synthesis project},
    Month = {April},
    Pages = {5},
    Sponsors = {CNS-0905349},
    Title = {{Disambiguation of Residential Wired and Wireless Access in a Forensic Setting}},
    Url = {http://forensics.umass.edu/pubs/yang.infocom-mini.2013.pdf},
    Year = {2013},
    Bdsk-Url-1 = {http://forensics.umass.edu/pubs/yang.infocom-mini.2013.pdf}}

    [link][PDF]

  • @inproceedings{Prusty:2011,
    Author = { Swagatika Prusty and Brian Neil Levine and Marc Liberatore},
    Booktitle = {Proc. ACM Conference on Computer \& Communications Security (CCS)},
    Keywords = {forensics; peer-to-peer; anonymity},
    Month = {October},
    Pages = {201--214},
    Slides_Url = {http://forensics.umass.edu/pubs/slides/prusty.ccs.2011.slides.pdf},
    Sponsors = {CNS-1018615},
    Title = {{Forensic Investigation of the OneSwarm Anonymous Filesharing System}},
    Url = {http://forensics.umass.edu/pubs/prusty.ccs.2011.pdf},
    Year = {2011},
    Bdsk-Url-1 = {http://forensics.umass.edu/pubs/prusty.ccs.2011.pdf}}

    [link][PDF]

  • @inproceedings{Walls:2011a,
    Audio_Url = {http://forensics.umass.edu/pubs/Walls.hotsec.2011.mp3},
    Author = { Robert J. Walls and Brian Neil Levine and Marc Liberatore and Clay Shields},
    Booktitle = {Proc.\ USENIX Workshop on Hot Topics in Security (HotSec)},
    Keywords = {forensics; security},
    Month = {August},
    Slides_Url = {http://forensics.umass.edu/pubs/rjwalls.hotsec.2011.slides.pdf},
    Sponsors = {CNS-1018615, CNS-0905349, DUE-0830876, 2008-CE-CX-K005},
    Title = {{Effective Digital Forensics Research is Investigator-Centric}},
    Url = {http://forensics.umass.edu/pubs/Walls.hotsec.2011.pdf},
    Video_Url = {http://forensics.umass.edu/pubs/Walls.hotsec.2011.mp4},
    Year = {2011},
    Bdsk-Url-1 = {http://forensics.umass.edu/pubs/Walls.hotsec.2011.pdf}}

    [link][PDF]

  • @inproceedings{Walls:2011,
    Audio_Url = {http://forensics.umass.edu/pubs/Walls.usenixSecurity.2011.mp3},
    Author = { Robert J. Walls and Erik Learned-Miller and Brian Neil Levine},
    Booktitle = {Proc.\ USENIX Security Symposium},
    Keywords = {forensics; Synthesis project},
    Month = {August},
    Slides_Url = {http://forensics.umass.edu/pubs/rjwalls.usenixSecurity.2011.slides.pdf},
    Source_Code_Url = {http://forensics.umass.edu/projects.php},
    Sponsors = {DUE-0830876},
    Title = {{Forensic Triage for Mobile Phones with DEC0DE}},
    Url = {http://forensics.umass.edu/pubs/Walls.usenixSecurity.2011.pdf},
    Video_Url = {http://forensics.umass.edu/pubs/Walls.usenixSecurity.2011.mp4},
    Year = {2011},
    Bdsk-Url-1 = {http://forensics.umass.edu/pubs/Walls.usenixSecurity.2011.pdf}}

    [link][PDF]

  • @inproceedings{Liberatore:2010b,
    Author = { Marc Liberatore and Brian Neil Levine and Clay Shields},
    Booktitle = {Proc.\ ACM Conference on Future Networking Technologies (CoNEXT)},
    Keywords = {forensics; peer-to-peer; Child sexual exploitation},
    Month = {November},
    Slides_Url = {http://forensics.umass.edu/pubs/liberatore.conext.2010.slides.pdf},
    Sponsors = {DUE-0830876, CNS-1018615, and 2008-CE-CX-K005 CNS-0905349},
    Title = {{Strengthening Forensic Investigations of Child Pornography on P2P Networks}},
    Url = {http://forensics.umass.edu/pubs/liberatore.conext.2010.pdf},
    Year = {2010},
    Bdsk-Url-1 = {http://forensics.umass.edu/pubs/liberatore.conext.2010.pdf}}

    [link][PDF]

  • @inproceedings{Tuttle:2010,
    Author = { John Tuttle and Robert J. Walls and Erik Learned-Miller and Brian Neil Levine},
    Booktitle = {Proc.\ ACM Workshop on Insider Threats},
    Keywords = {forensics},
    Month = {October},
    Sponsors = {CNS-0905349 and DUE-0830876},
    Title = {{Reverse Engineering for Mobile Systems Forensics with Ares}},
    Url = {http://forensics.umass.edu/pubs/tuttle.ares.2010.pdf},
    Workshop_Url = {http://www.csiir.ornl.gov/ccsw2010/},
    Year = {2010},
    Bdsk-Url-1 = {http://forensics.umass.edu/pubs/tuttle.ares.2010.pdf}}

    [link][PDF]

  • @inproceedings{Liberatore:2010,
    Author = { Marc Liberatore and Robert Erdely and Thomas Kerle and Brian Neil Levine and Clay Shields},
    Booktitle = {Proc.\ DFRWS Annual Digital Forensics Research Conference},
    Correction_Url = {http://forensics.umass.edu/pubs/liberatore.dfrws2010.correction.pdf},
    Keywords = {forensics; peer-to-peer; Child sexual exploitation},
    Month = {August},
    Sponsors = {2008-CE-CX-K005, CNS-0905349, and DUE-0830876},
    Title = {{Forensic Investigation of Peer-to-Peer File Sharing Networks}},
    Url = {http://forensics.umass.edu/pubs/liberatore.dfrws2010.pdf},
    Year = {2010},
    Bdsk-Url-1 = {http://forensics.umass.edu/pubs/liberatore.dfrws2010.pdf}}

    [link][PDF]

  • @inproceedings{Levine:2009a,
    Author = { Brian Neil Levine and Marc Liberatore},
    Booktitle = {Proc. of DFRWS Annual Conference},
    Conference_Url = {http://dfrws.org/2009/},
    Keywords = {forensics},
    Month = {August},
    Source_Code_Url = {http://forensics.umass.edu/projects.php},
    Sponsors = {DUE-0830876 and 2008-CE-CX-K005},
    Title = {{DEX: Digital Evidence Provenance Supporting Reproducibility and Comparison}},
    Url = {http://forensics.umass.edu/pubs/levine.dfrws.2009.pdf},
    Year = {2009},
    Bdsk-Url-1 = {http://forensics.umass.edu/pubs/levine.dfrws.2009.pdf}}

    [link][PDF]

  • @incollection{Levine:2009,
    Author = { Brian Neil Levine and Gerome Miklau},
    Booktitle = {{Encyclopedia of Database Systems}},
    Editor = {M. Tamer A-Zsu and Ling Liu},
    Keywords = {forensics; database security;},
    Month = {June},
    Publisher = {Springer-Verlag},
    Table_Of_Contents_Url = {brian.php?id=1212},
    Title = {{Auditing and Forensic Analysis}},
    Year = {2009}}

    [link]

  • @techreport{DeBonis:2008,
    Appendix_D_Url = {http://forensics.umass.edu/pubs/ISTTF_Final_Report-APPENDIX_D_TAB_and_EXHIBITS.pdf},
    Author = {DeBonis, Laura and Adida, Ben and Bradner, Scott and Farid, Hany and Hollaar, Lee and Inskeep, Todd and Levine, Brian Neil and Mcabian, Adi and Morgan, R.L. and Nguyen, Lam and Schiller, Jeff and Weitzner, Danny},
    Full_Report_Url = {http://cyber.law.harvard.edu/pubrelease/isttf/},
    Institution = {Internet Safety Technical Task Force to the Multi-State Working Group on Social Networking of State Attorneys General of the United States},
    Keywords = {peer-to-peer; forensics},
    Month = {December},
    Title = {{Enhancing Child Safety \& Online Technologies. Appendix D: Technology Advisory Board Report}},
    Year = {2008}}

    [link]

  • @inproceedings{Stahlberg:2007,
    Author = {Stahlberg, Patrick and Miklau, Gerome and Levine, Brian Neil},
    Booktitle = {Proc. ACM Intl Conf. on Management of Data (SIGMOD)},
    Keywords = {forensics; database security; Privacy},
    Month = {June},
    Pages = {91--102},
    Title = {{Threats to Privacy in the Forensic Analysis of Database Systems}},
    Url = {http://forensics.umass.edu/pubs/stahlberg07forensicDB.pdf},
    Year = {2007},
    Bdsk-Url-1 = {http://forensics.umass.edu/pubs/stahlberg07forensicDB.pdf}}

    [link][PDF]

  • @inproceedings{Miklau:2007a,
    Author = {Miklau, Gerome and Levine, Brian Neil and Stahlberg, Patrick},
    Booktitle = {Biennial ACM/VLDB Conference on Innovative Data Systems Research (CIDR)},
    Keywords = {database security; forensics},
    Month = {January},
    Pages = {387--396},
    Presentation_Url = {http://forensics.umass.edu/pubs/slides/mikalu.cidr2007.pdf},
    Title = {{Securing History: Privacy and Accountability in Database Systems}},
    Url = {http://forensics.umass.edu/pubs/mikalu.cidr2007.pdf},
    Year = {2007},
    Bdsk-Url-1 = {http://forensics.umass.edu/pubs/mikalu.cidr2007.pdf}}

    [link][PDF]

  • @inproceedings{Liberatore:2006,
    Abstract = {We examine the effectiveness of two traffic analysis techniques for identifying encrypted HTTP streams. The techniques are based upon classification algorithms, identifying encrypted traffic on the basis of similarities to features in a library of known profiles. We show that these profiles need not be collected immediately before the encrypted stream; these methods can be used to identify traffic observed both well before and well after the library is created. We give evidence that these techniques will exhibit the scalability necessary to be effective on the Internet. We examine several methods of actively countering the techniques, and we find that such countermeasures are effective, but at a significant increase in the size of the traffic stream. Our claims are substantiated by experiments and simulation on over 400,000 traffic streams we collected from 2,000 distinct web sites during a two month period.},
    Author = {Liberatore, Marc and Levine, Brian Neil},
    Booktitle = {Proc. ACM conference on Computer and Communications Security (CCS)},
    Keywords = {security; privacy; anonymity; forensics},
    Month = {October},
    Pages = {255--263},
    Slides_Url = {http://forensics.umass.edu/pubs/slides/liberatore.ccs2006.slides.pdf},
    Sponsors = {NSF-0133055 and NSF-0325868},
    Title = {{Inferring the Source of Encrypted HTTP Connections}},
    Traces_Url = {http://traces.cs.umass.edu},
    Url = {http://forensics.umass.edu/pubs/liberatore.ccs2006.pdf},
    Year = {2006},
    Bdsk-Url-1 = {http://forensics.umass.edu/pubs/liberatore.ccs2006.pdf}}

    [link][PDF]

 
Keywords
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996