![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones
Mobile phone use – and mobile phone piracy – have increased dramatically during the last decade. Because of the profits that can be made, more than four hundred pirated brands of mobile phones are available in...
-
Chapter and Conference Paper
Forensic Analysis of Popular Chinese Internet Applications
When the Digital Evidence Search Kit (DESK) was first used in Mainland China, it was found to be inadequate because it did not support criminal investigations involving popular Internet applications such as QQ...
-
Chapter and Conference Paper
Identifying Volatile Data from Multiple Memory Dumps in Live Forensics
One of the core components of live forensics is to collect and analyze volatile memory data. Since the dynamic analysis of memory is not possible, most live forensic approaches focus on analyzing a single snap...
-
Chapter and Conference Paper
Improving Disk Sector Integrity Using K-Dimension Hashing
The integrity of data stored on a hard disk is typically verified by computing the chained hash value of disk sector data in a specific order. However, this technique fails when one or more sectors turn bad du...