Towards Increasing Trust In Expert Evidence Derived From Malware
Forensic Tools
- URL: http://arxiv.org/abs/2010.07188v1
- Date: Wed, 14 Oct 2020 16:01:53 GMT
- Title: Towards Increasing Trust In Expert Evidence Derived From Malware
Forensic Tools
- Authors: Ian Kennedy, Arosha Bandara, Blaine Price
- Abstract summary: The post of the Forensic Science Regulator was created in 2008.
One of the key strategies deployed to achieve this is the push to incorporate a greater level of scientific conduct in the various fields of forensic practice.
Currently there is no statutory requirement for practitioners to become accredited to continue working with the Criminal Justice System of England and Wales.
The Forensic Science Regulator is lobbying the UK Government to make this mandatory.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Following a series of high profile miscarriages of justice in the UK linked
to questionable expert evidence, the post of the Forensic Science Regulator was
created in 2008. The main objective of this role is to improve the standard of
practitioner competences and forensic procedures. One of the key strategies
deployed to achieve this is the push to incorporate a greater level of
scientific conduct in the various fields of forensic practice. Currently there
is no statutory requirement for practitioners to become accredited to continue
working with the Criminal Justice System of England and Wales. However, the
Forensic Science Regulator is lobbying the UK Government to make this
mandatory. This paper focuses upon the challenge of incorporating a scientific
methodology to digital forensic investigations where malicious software
('malware') has been identified. One aspect of such a methodology is the
approach followed to both select and evaluate the tools used to perform dynamic
malware analysis during an investigation. Based on the literature, legal,
regulatory and practical needs we derive a set of requirements to address this
challenge. We present a framework, called the 'Malware Analysis Tool Evaluation
Framework' (MATEF), to address this lack of methodology to evaluate software
tools used to perform dynamic malware analysis during investigations involving
malware and discuss how it meets the derived requirements.
Related papers
- A Survey on Large Language Models for Critical Societal Domains: Finance, Healthcare, and Law [65.87885628115946]
Large language models (LLMs) are revolutionizing the landscapes of finance, healthcare, and law.
We highlight the instrumental role of LLMs in enhancing diagnostic and treatment methodologies in healthcare, innovating financial analytics, and refining legal interpretation and compliance strategies.
We critically examine the ethics for LLM applications in these fields, pointing out the existing ethical concerns and the need for transparent, fair, and robust AI systems.
arXiv Detail & Related papers (2024-05-02T22:43:02Z) - Adversarial Attack and Defense for Medical Image Analysis: Methods and
Applications [57.206139366029646]
We present a comprehensive survey on advances in adversarial attack and defense for medical image analysis.
We provide a unified theoretical framework for different types of adversarial attack and defense methods for medical image analysis.
For a fair comparison, we establish a new benchmark for adversarially robust medical diagnosis models.
arXiv Detail & Related papers (2023-03-24T16:38:58Z) - Understanding metric-related pitfalls in image analysis validation [59.15220116166561]
This work provides the first comprehensive common point of access to information on pitfalls related to validation metrics in image analysis.
Focusing on biomedical image analysis but with the potential of transfer to other fields, the addressed pitfalls generalize across application domains and are categorized according to a newly created, domain-agnostic taxonomy.
arXiv Detail & Related papers (2023-02-03T14:57:40Z) - Entity Graph Extraction from Legal Acts -- a Prototype for a Use Case in
Policy Design Analysis [52.77024349608834]
This paper presents a prototype developed to serve the quantitative study of public policy design.
Our system aims to automate the process of gathering legal documents, annotating them with Institutional Grammar, and using hypergraphs to analyse inter-relations between crucial entities.
arXiv Detail & Related papers (2022-09-02T10:57:47Z) - Adversarial Scrutiny of Evidentiary Statistical Software [32.962815960406196]
U.S. criminal legal system increasingly relies on software output to convict and incarcerate people.
We propose robust adversarial testing as an audit framework to examine the validity of evidentiary statistical software.
arXiv Detail & Related papers (2022-06-19T02:08:42Z) - Metrics reloaded: Recommendations for image analysis validation [59.60445111432934]
Metrics Reloaded is a comprehensive framework guiding researchers in the problem-aware selection of metrics.
The framework was developed in a multi-stage Delphi process and is based on the novel concept of a problem fingerprint.
Based on the problem fingerprint, users are guided through the process of choosing and applying appropriate validation metrics.
arXiv Detail & Related papers (2022-06-03T15:56:51Z) - An Uncommon Task: Participatory Design in Legal AI [64.54460979588075]
We examine a notable yet understudied AI design process in the legal domain that took place over a decade ago.
We show how an interactive simulation methodology allowed computer scientists and lawyers to become co-designers.
arXiv Detail & Related papers (2022-03-08T15:46:52Z) - Compliance Challenges in Forensic Image Analysis Under the Artificial
Intelligence Act [8.890638003061605]
We review why the use of machine learning in forensic image analysis is classified as high-risk.
Under the draft AI act, high-risk AI systems for use in law enforcement are permitted but subject to compliance with mandatory requirements.
arXiv Detail & Related papers (2022-03-01T14:03:23Z) - A proactive malicious software identification approach for digital
forensic examiners [0.6845629632971971]
This paper investigates the behaviour of malware upon various Windows operating system versions in order to determine and correlate the relationship between malicious software and OS artifacts.
This will enable an investigator to be more efficient in identifying the presence of new malware and provide a starting point for further investigation.
arXiv Detail & Related papers (2021-09-20T14:22:58Z) - A Smart and Defensive Human-Machine Approach to Code Analysis [0.0]
We propose a method that employs the use of virtual assistants to work with programmers to ensure that software are as safe as possible.
The pro- posed method employs a recommender system that uses various metrics to help programmers select the most appropriate code analysis tool for their project.
arXiv Detail & Related papers (2021-08-06T20:42:07Z) - Profiling the Cybercriminal: A Systematic Review of Research [2.66512000865131]
There is lack of a common definition of profiling for cyber-offenders.
One of the primary types of cybercriminals that studies have focused on is hackers.
This article produces an up-to-date characterisation of the field.
arXiv Detail & Related papers (2021-05-06T19:56:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.