Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Publications

Search Title, Abstract, Conference, Citation, Keyword or Author
Published Date
Displaying 201 - 225 of 540

Emerging techniques for the detection of pyrotechnic residues from seized postal packages containing fireworks

January 24, 2020
Author(s)
John Gillen, Thomas Forbes, Jennifer R. Verkouteren, Shannon T. Krauss, Karlijn Bezemer, Arian C. van Asten, Peter J. Shoenmakers, Mattijs Koeberg
High volume screening of parcels with the aim to trace the illegal distribution and selling of fireworks using postal services is challenging. Inspection services have limited manpower and means to perform extensive visual inspection. In this study, the

Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments

January 6, 2020
Author(s)
Changwei Liu, Anoop Singhal, Duminda Wijesekera
Due to the increasing cyber-activities and the use of diverse devices offered on cloud environments, post-attack cloud forensic investigations must deal with data in diverse formats and quantities from emerging attackable interfaces. The process of

Pilot Study on Deformed Bullet Correlation

January 1, 2020
Author(s)
Zhe Chen, Jun-Feng Song, Johannes A. Soons, Robert M. Thompson, Xuezeng Zhao
Most studies on bullet identification address test fire bullet that have near pristine striation marks on the land engraved areas (LEAs). However, in case work, bullets found at a crime scene may be severely deformed or fragmented. The resulting missing

D4I-Digital forensics framework for reviewing and investigating cyber attacks

December 26, 2019
Author(s)
Athanasios Dimitriadis, Boonserm Kulvatunyou, Nenad Ivezic, Ioannis Mavridis
Many companies have cited lack of cyber-security as the main barrier to Industrie 4.0 or digitalization. Security functions include protection, detection, response and investigation. Cyber-attack investigation is important as it can support the mitigation

Standardization of File Recovery Classification and Authentication

December 1, 2019
Author(s)
Eoghan Casey, Alexander J. Nelson, Jessica Hyde
Digital forensics can no longer tolerate software that cannot be relied upon to perform specific functions such as file recovery. The root of this problem is a lack of clearly defined software requirements, which compels users and tool testers to make

Sensitive Method for the Confident Identification of Genetically Variant Peptides in Human Hair

October 31, 2019
Author(s)
Zheng Zhang, Meghan Burke, William E. Wallace, Yuxue Liang, Sergey L. Sheetlin, Yuri Mirokhin, Dmitrii Tchekhovskoi, Stephen Stein
Recent reports have demonstrated that genetically variant peptides (GVPs) derived from human hair shaft proteins can be used to differentiate individuals of different biogeographic origin (Parker, G.J.; et al. PLos One. 2016, e0160653). We report a direct

NIST Big Data Interoperability Framework: Volume 4, Security and Privacy

October 21, 2019
Author(s)
Wo L. Chang, Arnab Roy, Mark Underwood
Big Data is a term used to describe the large amount of data in the networked, digitized, sensor-laden, information-driven world. While opportunities exist with Big Data, the data can overwhelm traditional technical approaches and the growth of data is

Discriminative potential of ion mobility spectrometry for the detection of fentanyl and fentanyl analogues relative to confounding environmental interferents

September 27, 2019
Author(s)
Thomas Forbes, Jeffrey Lawrence, Jennifer R. Verkouteren, R. Michael Verkouteren
The opioid crisis and emergence of fentanyl, fentanyl analogues, and other synthetic opioids has highlighted the need for sensitive and robust detection for interdiction at screening points, notably vehicles at border crossings and packages at postal

Report from the STRAND Working Group on the 2019 STR Sequence Nomenclature Meeting

September 21, 2019
Author(s)
Katherine Gettings, David Ballard, Martin Bodner, Lisa Borsuk, Jonathan King, Walther Parson, Christopher Phillips
This report summarizes topics discussed at the STR sequence nomenclature meeting hosted by the STRAND Working Group in April 2019. Invited attendees for this meeting included researchers known-to-us to be developing STR sequence-based nomenclature schemata

Preparation and calibration of a Protactinium-231 reference material

August 22, 2019
Author(s)
Richard Essex, Ross W. Williams, Kerri C. Treinen, Ronald Colle, Ryan P. Fitzgerald, Raphael Galea, John Keightley, Jerome LaRosa, Lizbeth Laureano-Perez, Svetlana Nour, Leticia Pibida
A 231Pa reference material has been characterized for amount of Pa. This reference material is primarily intended for calibration of 233Pa tracers produced for 231Pa - 235U model age measurements associated with nuclear forensics and nuclear safeguards

Understanding the Impact of Drug Background Levels in Forensic Laboratories

August 13, 2019
Author(s)
Edward Sisco, Marcela N. Najarro, Amber Burns, Robert Kirkby
As drugs become increasingly potent and analytical instrumentation becomes more sensitive, the need to understand and monitor drug background levels is becoming imperative. Background monitoring is commonplace in many other industries but has been largely

Determining Forensic Data Requirements for Detecting Hypervisor Attacks

August 7, 2019
Author(s)
Changwei Liu, Anoop Singhal, Ramaswamy Chandramouli, Duminda Wijesekera
Hardware/Server virtualization is a key feature of data centers used for cloud computing services and enterprise computing that enables ubiquitous access to shared system resources. Server virtualization is typically performed by a hypervisor, which

2018 MediFor Challenge

July 23, 2019
Author(s)
Jonathan G. Fiscus, Haiying Guan, Andrew Delgado, Timothee N. Kheyrkhah, Yooyoung Lee, Daniel F. Zhou, Amy Yates
Media forensics is the science and practice of determining the authenticity and establishing the integrity of audio and visual media. DARPA's Media Forensics (MediFor) program brings together world-class researchers to develop technologies for the

Manipulation Data Collection and Annotation Tool for Media Forensics

June 17, 2019
Author(s)
Eric Robertson, Haiying Guan, Mark Kozak, Yooyoung Lee, Amy Yates, Andrew Delgado, Daniel F. Zhou, Timothee N. Kheyrkhah, Jeff Smith, Jonathan G. Fiscus
With the increasing diversity and complexity of media forensics techniques, the evaluation of state-of-the-art detectors are impeded by lacking the metadata and manipulation history ground-truth. This paper presents a novel image/video manipulation

A Methodology for Enabling Forensic Analysis Using Hypervisor Vulnerabilities Data

June 5, 2019
Author(s)
Ramaswamy Chandramouli, Anoop Singhal, Duminda Wijesekera, Changwei Liu
Hardware/Server Virtualization is a key feature of data centers used for cloud computing services and enterprise computing that enables ubiquitous access to shared system resources. Server virtualization is typically performed by a hypervisor, which

A Synchrotron X-ray Micro-Spectroscopy Study of the Explosive Melt Glass Derived From the Trinity Nuclear Test

April 28, 2019
Author(s)
Bruce Ravel, Daniel E. Crean, Daniel J. Bailey, M. C. Stennett, Claire L. Corkhill, Ryan Tappero, N. C. Hyatt
Trinitite, the explosive melt glass derived from the Trinity nuclear test, is of interest as a model material for nuclear forensics investigation. However, there remains uncertainty as to the mechanism of trinitite formation. In this study, new insight is
Was this page helpful?