Research

Research Projects

To view the LC project archive list, follow this link.

Webmail Report Fall ’19

Finding the right email provider is important for everyone, both for personal communication and businesses of any size but all of these have different requirements. Our team set out on this project to determine what the best email provider is. [PDF]

Internet of Things Intrusion

This project looked at a list of popular “Internet of Things” devices and found which ones a malicious actor could extract data from, shut down service to or from, or take control of. [PDF]

Application Analysis

The mission of this project was to analyze some of the most popular desktop applications to see how much data they leave behind after they are uninstalled from the system and how secure that data is. This includes analyzing the safety of the user’s personal information and application metadata, notably that which can be used maliciously. [PDF]

Windows 10 Forensics

Windows 10 logo with Surface pro device, case, and pen with blue background

The mission of this project is to discover differences in the artifact locations of Windows 8 and Windows 10. It will also be within the scope of this to find and discover new artifacts that are linked to new features added to Windows 10. This is a two-part project series. [Part 1 / Part 2]

Cloud Forensics

cloud forensics LCDI project Dropbox, OneDrive, iCloud, and Google Drive logos

Cloud storage is a new technology that makes it possible for users to upload data to the web, allowing for instant accessibility and the ability to share data with others at any time. [PDF]

Pirate Browser Artifacts Report

In our experiment, we wanted to test the difference between PirateBrowser’s artifacts and its parents, Mozilla Firefox 23 and Firefox Portable. [PDF]

iPhone Artifacts

Six iPhones on a wooden table three white and three black

This report outlines our project in which we compare two of the more current versions of the iPhone, the iPhone 3GS and the iPhone 4, in order to see where applications store their files. [PDF]

Retrieving Data from Apple iOS Devices Using XRY

The following is a step-by-step walk-through for using Micro Sytemation’s product XRY to perform a logical data extraction on Apple iOS phones. [PDF].

Retrieving Data from Android OS Devices Using XRY

Mobile Forensics: Challenges in Obtaining, Analyzing and Applying Evidence

The following is a step-by-step walk-through for using Micro Sytemation’s product XRY to perform a logical data extraction for Android OS phones. [PDF].

IP Box User Tutorial

The IP Box is a comprehensive tool that brute forces iOS devices’ 4 digit passcodes. This device can act either as a standalone tool or be used with a computer running manufacturer specific software. [Link].

Mac OS X Forensic Artifact Locations Project Report

Mac Forensics Report OS X El Capitan

The goal of our research was to determine the default locations for artifacts in the newest releases of OS X, including new artifacts introduced with El Capitan. [Link].

Massively Multiplayer Online Role Playing Game Chat Project Report

The goal of this project is to determine what artifacts are left by World of Warcraft, Guild Wars 2, and PlanetSide 2 when using their in-game text chat systems. [Link].

Raspberry Pi Cyber Project Report

Raspberry Pi 2 Single Board Computer

This project assessed the Raspberry Pi, a low cost, credit card-sized computer that can connect to a standard display and utilize keyboard/mouse input, and the viability of it redefining how cyber security specialists view honeypots. [Link].

Raspberry Pi Forensics Project Report

The Raspberry Pi 2 Model B is a compact, programmable microcomputer designed to promote the education of basic computer science skills.  The goal of this project is to evaluate the digital forensic capabilities of these new computers by using them as portable imaging devices. [Link].

Malware Analysis Report

malware analysis skull and crossbones

Malware is the Swiss Army Knife of cybercrime, with capabilities ranging from compromising privileged information to infecting machines with network-crippling time bombs. This project was initiated to foster a more detailed understanding of how malware operates. [Link]