![Page 1: Computer Forensics CSI CSCI Pattern Matching Andrew Burns Brian Norton](https://reader036.vdocuments.site/reader036/viewer/2022083008/56649f255503460f94c3bb67/html5/thumbnails/1.jpg)
Computer Forensics
CSI CSCI
Pattern Matching
Andrew Burns
Brian Norton
![Page 2: Computer Forensics CSI CSCI Pattern Matching Andrew Burns Brian Norton](https://reader036.vdocuments.site/reader036/viewer/2022083008/56649f255503460f94c3bb67/html5/thumbnails/2.jpg)
Forensics:Broad areas of study
• Prevention
• Detection
• Analysis
• Steganography
![Page 3: Computer Forensics CSI CSCI Pattern Matching Andrew Burns Brian Norton](https://reader036.vdocuments.site/reader036/viewer/2022083008/56649f255503460f94c3bb67/html5/thumbnails/3.jpg)
1. Steganography/Cryptology
2. Use in everyday End-User computers
3. Use in sophisticated projects such as human genome sequencing, law enforcement, journalism
4. Pattern Matching - our area of study in this project
Examples of Pattern Matching:
![Page 4: Computer Forensics CSI CSCI Pattern Matching Andrew Burns Brian Norton](https://reader036.vdocuments.site/reader036/viewer/2022083008/56649f255503460f94c3bb67/html5/thumbnails/4.jpg)
Iranian News photo(s) released to Agence France-Presse July 2008
Major US news outlets issue retractions days later.
![Page 5: Computer Forensics CSI CSCI Pattern Matching Andrew Burns Brian Norton](https://reader036.vdocuments.site/reader036/viewer/2022083008/56649f255503460f94c3bb67/html5/thumbnails/5.jpg)
Project Description
• Where we hope to go:• To develop a Pattern Matching program
For now: Use of PX Binary Viewer Preview of C Program
Later Steps: MD5 Algorithms
System Baselining similar to a photograph - used as comparison tool.
![Page 6: Computer Forensics CSI CSCI Pattern Matching Andrew Burns Brian Norton](https://reader036.vdocuments.site/reader036/viewer/2022083008/56649f255503460f94c3bb67/html5/thumbnails/6.jpg)
References
1. Computer Forensics Laboratory and Tools, G. A. Francia III and K. Clinton: Jacksonville State University - JCSC 20, 6 (June 2005)
2. Network Forensics, “Surviving Network Attacks” Ben Laurie, AL Digital, Queue, June 2004, pp 50-56
3. Criminal Computer Forensics Management Ray Yeager, Kennesaw State University pp 168-174
4. Wikipedia
5. “The role of key loggers in computer-based assessment forensics”
6. “System Baseling - A Forensic Perspective” K. Monroe, D Bailey
7. Invitation to Computer Science 3rd Ed. Schneider and Gersting