Intensional Cyberforensics
نویسنده
چکیده
Intensional Cyberforensics Serguei A. Mokhov, Ph.D.Concordia University, 2013 This work focuses on the application of intensional logic to cyberforensic analysis and itsbenefits and difficulties are compared with the finite-state-automata approach. This workextends the use of the intensional programming paradigm to the modeling and implemen-tation of a cyberforensics investigation process with backtracing of event reconstruction, inwhich evidence is modeled by multidimensional hierarchical contexts, and proofs or disproofsof claims are undertaken in an eductive manner of evaluation. This approach is a practical,context-aware improvement over the finite state automata (FSA) approach we have seen inprevious work. As a base implementation language model, we use in this approach a new di-alect of the Lucid programming language, called Forensic Lucid, and we focus on defininghierarchical contexts based on intensional logic for the distributed evaluation of cyberforensicexpressions. We also augment the work with credibility factors surrounding digital evidenceand witness accounts, which have not been previously modeled.The Forensic Lucid programming language, used for this intensional cyberforensicanalysis, formally presented through its syntax and operational semantics. In large part, thelanguage is based on its predecessor and codecessor Lucid dialects, such as GIPL, Index-ical Lucid, Lucx, Objective Lucid, MARFL and JOOIP bound by the underlyingintensional programming paradigm.
منابع مشابه
Towards Automated Deduction in Blackmail Case Analysis with Forensic Lucid
This work-in-progress focuses on the refinement of application of the intensional logic to cyberforensic analysis and its benefits are compared with the finite-state automata approach. This work extends the use of the scientific intensional programming paradigm onto modeling and implementation of a cyberforensics investigation process with the backtrace of event reconstruction, modeling the evi...
متن کاملCyberforensics: Bridging the Law/ Technology Divide
Preparing the books to read every day is enjoyable for many people. However, there are still many people who also don't like reading. This is a problem. But, when you can support others to start reading, it will be better. One of the books that can be recommended for new readers is cyberforensics bridging the law technology divide. This book is not kind of difficult book to read. It can be read...
متن کاملTowards a Unified Theory of Intensional Logic Programming
Intensional Logic Programming is a new form of logic programming based on intensional logic and possible-worlds semantics. Intensional logic allows us to use logic programming to specify nonterminating computations and to capture the dynamic aspects of certain problems in a natural and problem-oriented style. The meanings of formulas of an intensional firstorder language are given according to ...
متن کاملIntensional Programming Languages
This article introduces the basic notions behind the intensional programming paradigm. Intensional Logic—which is the underlying theoretical framework of intensional languages is described and motivated by examples. One-dimensional and multidimensional intensional languages are discussed and existing intensional systems are surveyed. The article concludes with a presentation of the most success...
متن کاملIntensional objects
We summarize the interaction between the theory behind intensional programming, as seen in Lucid; and intensional versioning, as seen in Lemur, Intensional HTML, ISE, VMAKE, etc. These two concepts can be seen to be duals of each other, and they rely on dual notions of store, the warehouse for caching values, and the catalog for providing definitions. Catalogs contain intensional objects, which...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1312.0466 شماره
صفحات -
تاریخ انتشار 2013