File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/CSA.2009.5404206
- Scopus: eid_2-s2.0-80655124326
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Hard disk integrity check by hashing with combinatorial group testing
Title | Hard disk integrity check by hashing with combinatorial group testing |
---|---|
Authors | |
Keywords | Combinatorial group testing Execution time Hash value Integrity check Computer science |
Issue Date | 2009 |
Publisher | IEEE. |
Citation | The 2009 International Workshop on Forensics for Future Generation Communication Environments (F2GC-09) in conjunction with CSA 2009, Jeju Island, Korea, 10-12 December 2009. In Proceedings of CSA, 2009, p. 1-6 How to Cite? |
Abstract | In this paper, we describe the problem of verifying the integrity of a hard disk especially for forensics investigation after the computer of a suspect has been seized. Existing solutions do not provide a satisfactory solution to solve the problem. They either require a huge amount of storage to store the hash values of the sectors or may not be able to cope with the situation in an effective way in case some sectors have been modified (e.g. become bad sectors or deleted due to being part of the Legal Professional Privilege items). We introduce to use Thierry-Mieg[15]'s combinatorial group testing scheme, which seems to be an unrelated topic, to design a scheme to compute the hash values for the sectors of a hard disk. The storage for hash values in our scheme can be significantly fewer than the best existing solution while requiring similar amount of execution time. And our scheme can accurately point out the sectors which have been modified while existing solutions cannot guarantee this. © 2009 IEEE. |
Persistent Identifier | http://hdl.handle.net/10722/125711 |
ISBN | |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Fang, J | en_HK |
dc.contributor.author | Jiang, ZL | en_HK |
dc.contributor.author | Yiu, SM | en_HK |
dc.contributor.author | Hui, LCK | en_HK |
dc.date.accessioned | 2010-10-31T11:47:27Z | - |
dc.date.available | 2010-10-31T11:47:27Z | - |
dc.date.issued | 2009 | en_HK |
dc.identifier.citation | The 2009 International Workshop on Forensics for Future Generation Communication Environments (F2GC-09) in conjunction with CSA 2009, Jeju Island, Korea, 10-12 December 2009. In Proceedings of CSA, 2009, p. 1-6 | en_HK |
dc.identifier.isbn | 978-1-4244-4946-0 | - |
dc.identifier.uri | http://hdl.handle.net/10722/125711 | - |
dc.description.abstract | In this paper, we describe the problem of verifying the integrity of a hard disk especially for forensics investigation after the computer of a suspect has been seized. Existing solutions do not provide a satisfactory solution to solve the problem. They either require a huge amount of storage to store the hash values of the sectors or may not be able to cope with the situation in an effective way in case some sectors have been modified (e.g. become bad sectors or deleted due to being part of the Legal Professional Privilege items). We introduce to use Thierry-Mieg[15]'s combinatorial group testing scheme, which seems to be an unrelated topic, to design a scheme to compute the hash values for the sectors of a hard disk. The storage for hash values in our scheme can be significantly fewer than the best existing solution while requiring similar amount of execution time. And our scheme can accurately point out the sectors which have been modified while existing solutions cannot guarantee this. © 2009 IEEE. | en_HK |
dc.language | eng | en_HK |
dc.publisher | IEEE. | - |
dc.relation.ispartof | Proceedings of the International Conference on Computer Science and Its Applications, CSA 2009 | en_HK |
dc.rights | ©2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. | - |
dc.subject | Combinatorial group testing | - |
dc.subject | Execution time | - |
dc.subject | Hash value | - |
dc.subject | Integrity check | - |
dc.subject | Computer science | - |
dc.title | Hard disk integrity check by hashing with combinatorial group testing | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.email | Yiu, SM:smyiu@cs.hku.hk | en_HK |
dc.identifier.email | Hui, LCK:hui@cs.hku.hk | en_HK |
dc.identifier.authority | Yiu, SM=rp00207 | en_HK |
dc.identifier.authority | Hui, LCK=rp00120 | en_HK |
dc.description.nature | published_or_final_version | - |
dc.identifier.doi | 10.1109/CSA.2009.5404206 | en_HK |
dc.identifier.scopus | eid_2-s2.0-80655124326 | en_HK |
dc.identifier.hkuros | 182441 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-80655124326&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.spage | 1 | - |
dc.identifier.epage | 6 | - |
dc.description.other | The 2009 International Workshop on Forensics for Future Generation Communication Environments (F2GC-09) in conjunction with CSA 2009, Jeju Island, Korea, 10-12 December 2009. In Proceedings of CSA, 2009, p. 1-6 | - |
dc.identifier.scopusauthorid | Fang, J=36132767400 | en_HK |
dc.identifier.scopusauthorid | Jiang, ZL=24344329800 | en_HK |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_HK |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | en_HK |