Skip to main content

Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper)

  • Conference paper
Information Security Practice and Experience (ISPEC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4464))

Abstract

With the increased use of Internet and information technology all over the world, there is an increased amount of criminal activities that involve computing and digital data. These digital crimes (e-crimes) impose new challenges on prevention, detection, investigation, and prosecution of the corresponding offences. Computer forensics (also known as cyberforensics) is an emerging research area that applies computer investigation and analysis techniques to help detection of these crimes and gathering of digital evidence suitable for presentation in courts. This new area combines the knowledge of information technology, forensics science, and law and gives rise to a number of interesting and challenging problems related to computer security and cryptography that are yet to be solved. In this paper, we present and discuss some of these problems together with two successful cases of computer forensics technology developed in Hong Kong that enable the law enforcement departments to detect and investigate digital crimes more efficiently and effectively. We believe that computer forensics research is an important area in applying security and computer knowledge to build a better society.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Adelstein, F.: Live forensics: Diagnosing your system without killing it first. Communications of the ACM 49(2), 63–66 (2006)

    Article  Google Scholar 

  2. Census and The Government of Hong Kong Special Administrative Region Statistics Department. Hong kong in figures, 2006 edition (2006)

    Google Scholar 

  3. Chow, K.P., et al.: A rule-based bt monitoring scheme for detecting copyright infringement activities. Manuscript in preparation (2007)

    Google Scholar 

  4. Chow, K.P., et al.: Digital evidence search kit. In: Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 187–194 (2005)

    Google Scholar 

  5. The Government of Hong Kong Special Administrative Region Hong Kong Police. Technology crime statistics in Hong Kong (2005)

    Google Scholar 

  6. IFPI. Ifpi external press pack (2005)

    Google Scholar 

  7. The Government of Hong Kong Special Administrative Region Intellectual Property Department. Awareness of protection of intellectual property rights increases (2006)

    Google Scholar 

  8. Karagiannis, T., et al.: Is P2P dying or just hiding? In: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM’04), vol. 3, pp. 1532–1538 (2004)

    Google Scholar 

  9. Moore, D., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. In: Proceedings of the 10th USENIX Security Conference, pp. 9–22 (2001)

    Google Scholar 

  10. Hong Kong Ordinances. Evidence ordinance. Chapter 8

    Google Scholar 

  11. Parker, A.: Peer-to-peer in 2005. CacheLogic Research (2005)

    Google Scholar 

  12. Schneier, B., Kelsey, J.: Secure audit logs to support computer forensics. ACM Transactions on Information and System Security 2(2), 159–176 (1999)

    Article  Google Scholar 

  13. Vixie, P., Sneeringer, G., Schleifer, M.: Event report. Events of 21-oct-2002 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ed Dawson Duncan S. Wong

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer Berlin Heidelberg

About this paper

Cite this paper

Hui, L.C.K., Chow, K.P., Yiu, S.M. (2007). Tools and Technology for Computer Forensics: Research and Development in Hong Kong (Invited Paper). In: Dawson, E., Wong, D.S. (eds) Information Security Practice and Experience. ISPEC 2007. Lecture Notes in Computer Science, vol 4464. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72163-5_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-72163-5_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-72159-8

  • Online ISBN: 978-3-540-72163-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics