James Madison's research while affiliated with James Madison University and other places

Publications (4)

Article
Steganography is a useful tool that allows covert transmission of information over an overt communications channel. Combining covert channel exploitation with the encryption methods of substitution ciphers and/or one time pad cryptography, steganography enables the user to transmit information masked inside of a file in plain view. The hidden data...
Article
In this paper we address the problem of translating timestamps found on multiple computing systems to a common reference time. We describe results from experiments where we observed the clock of a simple computing system, and then present a computer clock model. The model we introduce addresses certain shortcomings of an earlier model by Stevens an...
Article
A good forensics examiner should be aware of the techniques that an attacker, intruder, malicious program, virus, or worm is capable of utilizing. Indeed, a significant body of knowledge will be required to track down the steps taken by an adversary, piece together the puzzle of events, and successfully defend conclusions in a court of law. While n...

Citations

... All previous file systems do not delete data completely [12,13]. In other word, file systems do not remove data from storage media because it is time-consuming [14]. In this research, the structure of the NTFS file system has been studied because of the system spreads around the world and the desirability of many users [15,16]. ...
... Finally, what are some methods to defeat the use of steganography even if it cannot be reliably detected. [2] The main concern of the paper is using the Least Significant Bit (LSB) technique to conceal encrypted messages using image. The system enhanced the technique by random generated bits of the encrypt message in the image and prevent unauthorized access of intruder to extract the original message [3]. ...
... Generating such a unified timeline across multiple sources of digital evidence presents many challenges [25,30,116,182,198]. Broadly speaking, some of these challenges are: ...