作者
David Lillis, Frank Breitinger, Mark Scanlon
发表日期
2017/10/7
研讨会论文
9th EAI International Conference on Digital Forensics and Cybercrime (ICDF2C)
出版商
Springer
简介
Perhaps the most common task encountered by digital forensic investigators consists of searching through a seized device for pertinent data. Frequently, an investigator will be in possession of a collection of “known-illegal” files (e.g. a collection of child pornographic images) and will seek to find whether copies of these are stored on the seized drive. Traditional hash matching techniques can efficiently find files that precisely match. However, these will fail in the case of merged files, embedded files, partial files, or if a file has been changed in any way.
In recent years, approximate matching algorithms have shown significant promise in the detection of files that have a high bytewise similarity. This paper focuses on MRSH-v2. A number of experiments were conducted using Hierarchical Bloom Filter Trees to dramatically reduce the quantity of pairwise comparisons that must be made between known …
引用总数
2017201820192020202120222023202416387533
学术搜索中的文章
D Lillis, F Breitinger, M Scanlon - Digital Forensics and Cyber Crime: 9th International …, 2018
D Lillis, F Breitinger, M Scanlon - arXiv preprint arXiv:1712.04544, 2017