
Date: Friday October 28, 2022
Time: 5:30pm MDT
Room: Zoom zoom.us, Meeting ID 926 9565 5625, passcode 488975
The talk will be held in Speare Hall room 19 for the CSE 585 class
|
Abstract: The era of information technology has, unfortunately, contributed to the tremendous rise in the number of cybercriminal activities. As everybody is on the Internet nowadays, many perpetrators are invading our lives and stealing private information, credit card numbers, and copyrighted material, and even threatening innocent people and committing physical and digital crimes. Locating criminals and proving them guilty might involve tracing their GPS locations, IP addresses, Port Numbers, Used Applications, Potential Communications, etc. This might involve a direct investigation of their digital devices to look for artifacts that would associate them with the crime and prove them guilty in a court of law. Therefore, Digital Forensics (DF) is vital for providing digital artifacts for crimes involving digital devices. The goal is to locate the digital artifacts that can be utilized in convicting cybercriminals and exposing their malicious activities. Digital forensics involves scientific methods that seek digital evidence by following standard methodologies that are admitted in a court of law. However, until recently, investigators had only been interested in extracting pieces of evidence from permanent storage devices such as hard disks (HD) and solid-state drives (SSD). However, Main Memory or RAM forensics has been proven powerful in investigations. Various operations such as reading or writing to files need to go through the RAM, moreover, recent network connections, IP addresses, URLs, Port numbers, and chat messages are often RAM residents only; not to be found in permanent storage media. Therefore, RAM contains vital information about the current state of a system and its running applications such as processes, network connections, IPs, Port Numbers, Chat Messages, opened files, etc. In fact, some of this information cannot be found elsewhere. The RAM, though volatile, can be inspected for evidence and digital artifacts. Therefore, Memory Forensics (RAM Forensics) is a very important subdivision of Digital Forensics. Even though it is volatile, RAM might embody important information about the perpetrators’ activities, and often can direct the investigation and make it more focused on the relevant resources. In this talk, I will introduce you to the field of digital forensics and memory forensics. Additionally, I will explain some of the research projects and research papers that I was involved with in relation to memory forensics. |
Ziad Al-Sharif is an Associate Professor of Computer Science and Software Engineering at Jordan University of Science and Technology (JUST). He received his Ph.D. degree in Computer Science from the Dept. of Computer Science at the University of Idaho, Idaho, USA, in December 2009. His Master's degree in Computer Science is from the Dept. of Computer Science at New Mexico State University (NMSU), New Mexico, USA, in August of 2005. Both his Master's thesis and Ph.D. dissertation were conducted with the consolidation of Prof. Clinton L. Jeffery; Professor Emeritus at the University of Idaho; now Professor and Chair of the Computer Science and Engineering Department at New Mexico Tech (NMT). His primary research interest lies in the areas of: 1) Software Engineering including Software Testing, Debugging, Monitoring, Visualization, and Performance analysis, 2) Information Security including Digital Forensics, Memory Forensics, and Malware analysis, and 3) Machine Learning & Deep Learning techniques including their applications in the area of Information Security and Software Engineering.