National Repository of Grey Literature 33 records found  previous11 - 20nextend  jump to record: Search took 0.02 seconds. 
Forensic Analysis of Bitcoin Network
Drozda, Tomáš ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
This thesis is focused on Bitcoin forensic analysis. Main goal of this thesis was to design and implement system tool for forensic analysis. Theoretical part of this thesis is dedicated to Bitcoin network. Requirements and existing tools are described in following chapters. Rest of the thesis is concerned about implementation of such a tool itself. Implemented system is presented as web application, which allows user to search through blockchain, vizualize financials, display profile pages of Bitcoin users and their Bitcoin wallets. 
Forensic Analysis in Linux OS
Beneš, Martin ; Rychlý, Marek (referee) ; Očenášek, Pavel (advisor)
This thesis deals with possibilities of forensic analysis on Linux operating system investigation. Forensic investigation is performed on test installation of Xubuntu using BackTrack distribution and tools included on it. The thesis is divided into chapters, starting with operating system Linux basics, continuing with requirements for investigator and his equipment to tools used for analysis. All discussed tools are available for free, their size vary from simple and small tools to complex frameworks. Theoretical knowledge is applied to real system and usage of tools is shown. This thesis ends with forensic report, which summarizes all findings gathered during investigation.
Porting of Plaso Extractors to the Apache Spark Platform
Baláž, Miroslav ; Burget, Radek (referee) ; Rychlý, Marek (advisor)
The theoretical part discusses the functioning and architecture of the Plaso tool. The thesis further explores current tools that implement distributed computational models. It describes their architecture, data abstracts and how they work. The thesis also describes current tools that implement distributed storage. The work includes the creation of the Plasospark tool, which converts the computation of the Plaso tool to the Spark platform and uses the Hadoop HDFS storage for forensic data.
The impact of chimerism in DNA-based forensic analysis
Kalousková, Martina ; Šimková, Halina (advisor) ; Vaněk, Daniel (referee)
The presence of two or more zygotically distinct lineages in a single person refers to chimerism. All types of chimerism have positive as well as negative impact on health of human chimeras. Both congenital and acquired chimerism must be taken into account in diagnostics, genetics but also in the forensic DNA analysis. This phenomenon has impact on the results of individual identification and kinship determination. With the forensic analysis it is possible to detect chimerism of people under investigation. Even though these situations are rare, some cases of wrong identification proving the consequences of the chimerism are recorded.
Evidence securing in virtual environment
Havlová, Miluše ; Malina, Lukáš (referee) ; Martinásek, Zdeněk (advisor)
The bachelor thesis deals with evidence securing in virtual environment. The main goal is to suggest suitable virtual environment for evidence securing which can be used in prosecution. As the next the tools that are suitable for safe securing of evidence are described. With the help of selected tools the sample of malware is secured and then the sample is analyzed and described. The suggested environment is used to evidence gathering within the frame of simulated security incident.
Security Analysis of Immersive Virtual Reality and Its Implications
Vondráček, Martin ; Ryšavý, Ondřej (referee) ; Pluskal, Jan (advisor)
Virtuální realita je v současné době využívána nejen pro zábavu, ale i pro práci a sociální interakci, kde má soukromí a důvěrnost informací vysokou prioritu. Avšak bohužel, bezpečnostní opatření uplatňovaná dodavateli softwaru často nejsou dostačující. Tato práce přináší rozsáhlou bezpečnostní analýzu populární aplikace Bigscreen pro virtuální realitu, která má více než 500 000 uživatelů. Byly využity techniky analýzy síťového provozu, penetračního testování, reverzního inženýrství a dokonce i metody pro application crippling. Výzkum vedl k odhalení kritických zranitelností, které přímo narušovaly soukromí uživatelů a umožnily útočníkovi plně převzít kontrolu nad počítačem oběti. Nalezené bezpečnostní chyby umožnily distribuci škodlivého softwaru a vytvoření botnetu pomocí počítačového červa šířícího se ve virtuálních prostředích. Byl vytvořen nový kybernetický útok ve virtální realitě nazvaný Man-in-the-Room. Dále byla objevena bezpečnostní chyba v Unity engine. Zodpovědné nahlášení objevených chyb pomohlo zmírnit rizika pro více než půl milionu uživatelů aplikace Bigscreen a uživatele všech dotčených aplikací v Unity po celém světě.
Forensic Analysis of Cryptocurrency Mining Servers
Kelečéni, Jakub ; Grégr, Matěj (referee) ; Veselý, Vladimír (advisor)
This thesis focuses on the mining of cryptocurrency with emphasis on analysis of communication between miner and server. It describes basic principles of cryptocurrencies, mining and employed communication protocols. The next part of thesis is about design and implement modification of existing system (catalogue). This modification will add temporality to the catalog, what increase reliability of stored metadata. Description, functionality and purpose of existing system is included in the next text.
Forensic Malware Analysis
Král, Benjamin ; Trchalík, Roman (referee) ; Očenášek, Pavel (advisor)
This master's thesis describes methodologies used in malware forensic analysis including methods used in static and dynamic analysis. Based on those methods a tool intended to be used by Computer Security Incident Response Teams (CSIRT) is designed to allow fast analysis and decisions regarding malware samples in security incident investigations. The design of this tool is thorougly described in the work along with the tool's requirements on which the tool design is based on. Based on the design a ForensIRT tool is implemented and then used to analyze a malware sample Cridex to demonstrate its capabilities. Finally the analysis results are compared to those of other comparable available malware forensics tools.
Forenzní analýza mobilních telefonů s OS Android
CHALOUPKA, Jiří
Thesis Forensic analysis of mobile devices running Android is focused on analysis of selected few communication applications running on OS Android, which is currently the most used OS for mobile devices. Main goal of this thesis is to find, analyse and document locations of data that can be potentially used as evidence.
Analýza bezpečnosti jednotlivých druhů mobilních telefonů
KOUTSKÝ, Vojtěch
This bachelor thesis deals with forensic analysis of different kinds of mobile phones. Theoretical part describes two most common mobile operating systems - Android and iOS. Furthermore it contains definition of forensic analysis and digital footprints. Practical part consists of forensic analysis of chosen phones itself and of evaluated results. Based on these results, security risks and their possible solutions were formed.

National Repository of Grey Literature : 33 records found   previous11 - 20nextend  jump to record:
Interested in being notified about new results for this query?
Subscribe to the RSS feed.