Lecturer in Cybersecurity and Digital Forensics
McKeown, S., Russell, G. & Leimich, P. (in press). Fast Filtering of Known PNG Files Using Early File Features. In Proceedings of the Conference on Digital Forensics, Security and LawISBN not yet known
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algor...
Leimich, P. & Bhogal, J. (2015). Editorial: TLAD 2015. In Proceedings TLAD 2015. 13th International Workshop on the Teaching, Learning and Assessment of DatabasesISBN 978 - 1 - 904839 - 79 - 8
No abstract available.
Leimich, P. & Monger, A. (2014). Editorial: TLAD 2014. In Proceedings TLAD 2014. 12th International Workshop on the Teaching, Learning and Assessment of DatabasesISBN 978-1-907207-51-8
No abstract avialable.
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
05 August 2016
In traditional digital forensics, analysts will examine static traces from hard disks, but increasingly the evidence is found within Cloud-based systems, where the trails of e...
Leimich, P. & Nelson, D. (2013). Editorial: TLAD 2013. In Proceedings TLAD 2013. 11th International Workshop on Teaching, Learning and Assessment of DatabasesISBN 978-1-907207-87-7
Leimich, P. & Byrne, B. (2012). Editorial: TLAD 2012. In Proceedings TLAD 2012. 10th International Workshop on Teaching, Learning and Assessment of DatabasesISBN 978-1-907207-57-0
Leimich, P. (2011). Editorial: TLAD 2011. In Proceedings TLAD 2011. 9th International Workshop on Teaching, Learning and Assessment of DatabasesISBN 978-0-9565220-5-4
Leimich, P. & Nelson, D. (2010). Editorial: TLAD 2010. In Proceedings TLAD 2010. 8th International Workshop on Teaching, Learning and Assessment of DatabasesISBN 978-0-9565220-009
Paterson, R. & Leimich, P. (2012). An investigation into PL/SQL Injection. ISBN 978-0-947649-97-5
SQL injection is a common attack method used to leverage infor-mation out of a database or to compromise a company’s network. This paper investigates four injection attacks th...
McKeown, S., Russell, G. & Leimich, P. (in press). Fingerprinting JPEGs with Optimised Huffman Tables. Journal of Digital Forensics, Security and Law. ISSN 1558-7215
Leimich, P., Harrison, J. & Buchanan, W. J. (2016). A RAM triage methodology for Hadoop HDFS forensics. Digital Investigation. 18, 96-109. doi:10.1016/j.diin.2016.07.003. ISSN 1742-2876
This paper discusses the challenges of performing a forensic investigation against a multi-node Hadoop cluster and proposes a methodology for examiners to use in such situatio...
Paterson, J., Wilson, J. N. & Leimich, P. (2011). Uses of Peer Assessment in Database Teaching and Learning. In Data Security and Security Data, 135-146. Springer Verlag. doi:10.1007/978-3-642-25704-9_17. ISBN 978 3 642 25703 2; 978 3 642 25704 9
This discussion paper introduces three very different methods and contexts for the use of peer assessment in introductory database classes, each of which is supported by diffe...
Bagley, R., Ferguson, R. I. & Leimich, P. (2012, September). On the digital forensic analysis of the Firefox browser via recovery of SQLite artefacts from unallocated space. Paper presented at CFET (Cyberforensics in Education and Training ), Canterbury Christ Church University, Canterbury
A technique and supporting tool for the recovery of browsing activity (both currently stored and deleted) from the Firefox web-browser is presented. The approach is based upon...
Findlay, C. & Leimich, P. An assessment of data leakage in Firefox under different conditions. Paper presented at CFET 2014: 7th International Conference on Cybercrime Forensics Education & Training, Christ Church,
Data leakage is a serious issue and can result in the loss of sensitive data,
compromising user accounts and details, potentially affecting millions of internet
users. This pa...
Comer, S. & Leimich, P. A Comparison of Geo-tagging in Mobile Internet Browsing Applications on iOS and Android. Paper presented at CFET 2014: 7th International Conference on Cybercrime Forensics Education & Training, Christ Church,
Nowadays there is almost no crime committed without a trace of digital evidence,
and since the advanced functionality of mobile devices today can be exploited to
assist in cri...
Leimich, P., Ferguson, I. & Coull, N. From crime to court - an experience report of a digital forensics group project module. Paper presented at HEA Teaching Computer Forensics Workshop, Sunderland, UK
This paper discusses the large-scale group project undertaken by BSc Hons Digital Forensics
students at Abertay University in their penultimate year. The philosophy of the pro...
The field of Digital Forensics has been facing scalability issues for the last 10 years, resulting in huge backlogs for law enforcement agencies, impeding...