Computer and Intrusion Forensics
Computer and Intrusion Forensics
Unifying Computer Forensics Modeling Approaches: A Software Engineering Perspective
SADFE '05 Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering on Systematic Approaches to Digital Forensic Engineering
Digital Forensics: Exploring Validation, Verification and Certification
SADFE '05 Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering on Systematic Approaches to Digital Forensic Engineering
A DCT Quantization-Based Image Authentication System for Digital Forensics
SADFE '05 Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering on Systematic Approaches to Digital Forensic Engineering
Software Verification and Validation: An Engineering and Scientific Approach
Software Verification and Validation: An Engineering and Scientific Approach
Digital Forensics: Validation and Verification in a Dynamic Work Environment
HICSS '07 Proceedings of the 40th Annual Hawaii International Conference on System Sciences
A hierarchical, objectives-based framework for the digital investigations process
Digital Investigation: The International Journal of Digital Forensics & Incident Response
Hi-index | 0.00 |
The process of using automated software has served law enforcement and the courts very well, and experienced detectives and investigators have been able to use their well-developed policing skills, in conjunction with the automated software, so as to provide sound evidence. However, the growth in the computer forensic field has created a demand for new software (or increased functionality to existing software) and a means to verify that this software is truly ''forensic'' i.e. capable of meeting the requirements of the 'trier of fact'. In this work, we present a scientific and systemical description of the computer forensic discipline through mapping fundamental functions required in the computer forensic investigation process. Based on the function mapping, we propose a more detailed functionality orientated validation and verification framework of computer forensic tools. We focus this paper on the searching function. We specify the requirements and develop a corresponding reference set to test any tools that possess the searching function.