University of Limerick Institutional Repository

Self-forensics through case studies of small-to-medium software systems.

DSpace Repository

You will not be able to submit new items to the ULIR while we upgrade to the new research repository. If you wish to add items, or have any questions about the new system, please contact the ULIR administrator at We are sorry for any inconvenience.

Show simple item record Mokhov, Serguei A. Vassev, Emil 2012-03-12T10:34:22Z 2012-03-12T10:34:22Z 2009
dc.description peer-reviewed en_US
dc.description.abstract The notion and definition of self-forensics was introduced by Mokhov to encompass software and hardware capabilities for autonomic and other systems to record their own states, events, and others encoded in a forensic form suitable for (potentially automated) forensic analysis, evidence modeling and specification, and event reconstruction for various system components. For self-forensics, “self-dissection” is possible for analysis using a standard language and decision making if the system includes such a self-forensic subsystem. The self-forensic evidence is encoded in a cyberforensic investigation case and event reconstruction language, Forensic Lucid. The encoding of the stories depicted by the evidence comprise a context as a first-class value of a Forensic Lucid “program”, after which an investigator models the case describing relationships between various events and pieces of information. It is important to get the context right for the case to have a meaning and the proper meaning computation, so we perform case studies of some small-to-medium, distributed and not, primarily academic open-source software systems. In this work, for the purpose of implementation of the small self-forensic modules for the data structures and event flow, we specify the requirements of what the context should be for those systems. The systems share in common the base programming language – Java, so our self-forensic logging of the Java data structures and events as Forensic Lucid context specification expressions is laid out ready for an investigator to examine and model the case. en_US
dc.language.iso eng en_US
dc.publisher IEEE Computer Society en_US
dc.relation.ispartofseries Proceedings of the 5th International Conference on IT Security Incident Management and IT Forensics;09/2009
dc.rights “© 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. en_US
dc.subject self-forensics en_US
dc.subject specification en_US
dc.subject context-aware forensic computing en_US
dc.subject intensional programming en_US
dc.title Self-forensics through case studies of small-to-medium software systems. en_US
dc.type Conference item en_US
dc.type.supercollection all_ul_research en_US
dc.type.supercollection ul_published_reviewed en_US
dc.type.restriction none en
dc.contributor.sponsor NSERC
dc.contributor.sponsor IRCSET
dc.contributor.sponsor SFI
dc.relation.projectid 03/CE2/I303_1
dc.relation.projectid EMPOWER

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search ULIR


My Account