Towards Increasing Trust In Expert Evidence Derived From Malware
Forensic Tools
- URL: http://arxiv.org/abs/2010.07188v1
- Date: Wed, 14 Oct 2020 16:01:53 GMT
- Title: Towards Increasing Trust In Expert Evidence Derived From Malware
Forensic Tools
- Authors: Ian Kennedy, Arosha Bandara, Blaine Price
- Abstract summary: The post of the Forensic Science Regulator was created in 2008.
One of the key strategies deployed to achieve this is the push to incorporate a greater level of scientific conduct in the various fields of forensic practice.
Currently there is no statutory requirement for practitioners to become accredited to continue working with the Criminal Justice System of England and Wales.
The Forensic Science Regulator is lobbying the UK Government to make this mandatory.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Following a series of high profile miscarriages of justice in the UK linked
to questionable expert evidence, the post of the Forensic Science Regulator was
created in 2008. The main objective of this role is to improve the standard of
practitioner competences and forensic procedures. One of the key strategies
deployed to achieve this is the push to incorporate a greater level of
scientific conduct in the various fields of forensic practice. Currently there
is no statutory requirement for practitioners to become accredited to continue
working with the Criminal Justice System of England and Wales. However, the
Forensic Science Regulator is lobbying the UK Government to make this
mandatory. This paper focuses upon the challenge of incorporating a scientific
methodology to digital forensic investigations where malicious software
('malware') has been identified. One aspect of such a methodology is the
approach followed to both select and evaluate the tools used to perform dynamic
malware analysis during an investigation. Based on the literature, legal,
regulatory and practical needs we derive a set of requirements to address this
challenge. We present a framework, called the 'Malware Analysis Tool Evaluation
Framework' (MATEF), to address this lack of methodology to evaluate software
tools used to perform dynamic malware analysis during investigations involving
malware and discuss how it meets the derived requirements.
Related papers
- Medical Reasoning in the Era of LLMs: A Systematic Review of Enhancement Techniques and Applications [59.721265428780946]
Large Language Models (LLMs) in medicine have enabled impressive capabilities, yet a critical gap remains in their ability to perform systematic, transparent, and verifiable reasoning.<n>This paper provides the first systematic review of this emerging field.<n>We propose a taxonomy of reasoning enhancement techniques, categorized into training-time strategies and test-time mechanisms.
arXiv Detail & Related papers (2025-08-01T14:41:31Z) - Demystifying Large Language Models for Medicine: A Primer [50.83806796466396]
Large language models (LLMs) represent a transformative class of AI tools capable of revolutionizing various aspects of healthcare.
This tutorial aims to equip healthcare professionals with the tools necessary to effectively integrate LLMs into clinical practice.
arXiv Detail & Related papers (2024-10-24T15:41:56Z) - A Novel Reinforcement Learning Model for Post-Incident Malware Investigations [0.0]
This Research proposes a Novel Reinforcement Learning model to optimise malware forensics investigation during cyber incident response.
It aims to improve forensic investigation efficiency by reducing false negatives and adapting current practices to evolving malware signatures.
arXiv Detail & Related papers (2024-10-19T07:59:10Z) - A Survey on Large Language Models for Critical Societal Domains: Finance, Healthcare, and Law [65.87885628115946]
Large language models (LLMs) are revolutionizing the landscapes of finance, healthcare, and law.
We highlight the instrumental role of LLMs in enhancing diagnostic and treatment methodologies in healthcare, innovating financial analytics, and refining legal interpretation and compliance strategies.
We critically examine the ethics for LLM applications in these fields, pointing out the existing ethical concerns and the need for transparent, fair, and robust AI systems.
arXiv Detail & Related papers (2024-05-02T22:43:02Z) - Exploring the Potential of Large Language Models for Improving Digital Forensic Investigation Efficiency [0.1433758865948252]
The ever-increasing workload of digital forensic labs raises concerns about law enforcement's ability to conduct both cyber-related and non-cyber-related investigations promptly.
This article explores the potential and usefulness of integrating Large Language Models into digital forensic investigations to address challenges such as bias, explainability, censorship, resource-intensive infrastructure, and ethical and legal considerations.
arXiv Detail & Related papers (2024-02-29T17:13:44Z) - Survey on Adversarial Attack and Defense for Medical Image Analysis: Methods and Challenges [64.63744409431001]
We present a comprehensive survey on advances in adversarial attacks and defenses for medical image analysis.
For a fair comparison, we establish a new benchmark for adversarially robust medical diagnosis models.
arXiv Detail & Related papers (2023-03-24T16:38:58Z) - Entity Graph Extraction from Legal Acts -- a Prototype for a Use Case in
Policy Design Analysis [52.77024349608834]
This paper presents a prototype developed to serve the quantitative study of public policy design.
Our system aims to automate the process of gathering legal documents, annotating them with Institutional Grammar, and using hypergraphs to analyse inter-relations between crucial entities.
arXiv Detail & Related papers (2022-09-02T10:57:47Z) - Adversarial Scrutiny of Evidentiary Statistical Software [32.962815960406196]
U.S. criminal legal system increasingly relies on software output to convict and incarcerate people.
We propose robust adversarial testing as an audit framework to examine the validity of evidentiary statistical software.
arXiv Detail & Related papers (2022-06-19T02:08:42Z) - Metrics reloaded: Recommendations for image analysis validation [59.60445111432934]
Metrics Reloaded is a comprehensive framework guiding researchers in the problem-aware selection of metrics.
The framework was developed in a multi-stage Delphi process and is based on the novel concept of a problem fingerprint.
Based on the problem fingerprint, users are guided through the process of choosing and applying appropriate validation metrics.
arXiv Detail & Related papers (2022-06-03T15:56:51Z) - An Uncommon Task: Participatory Design in Legal AI [64.54460979588075]
We examine a notable yet understudied AI design process in the legal domain that took place over a decade ago.
We show how an interactive simulation methodology allowed computer scientists and lawyers to become co-designers.
arXiv Detail & Related papers (2022-03-08T15:46:52Z) - Compliance Challenges in Forensic Image Analysis Under the Artificial
Intelligence Act [8.890638003061605]
We review why the use of machine learning in forensic image analysis is classified as high-risk.
Under the draft AI act, high-risk AI systems for use in law enforcement are permitted but subject to compliance with mandatory requirements.
arXiv Detail & Related papers (2022-03-01T14:03:23Z) - A Smart and Defensive Human-Machine Approach to Code Analysis [0.0]
We propose a method that employs the use of virtual assistants to work with programmers to ensure that software are as safe as possible.
The pro- posed method employs a recommender system that uses various metrics to help programmers select the most appropriate code analysis tool for their project.
arXiv Detail & Related papers (2021-08-06T20:42:07Z) - Profiling the Cybercriminal: A Systematic Review of Research [2.66512000865131]
There is lack of a common definition of profiling for cyber-offenders.
One of the primary types of cybercriminals that studies have focused on is hackers.
This article produces an up-to-date characterisation of the field.
arXiv Detail & Related papers (2021-05-06T19:56:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.