Céline Vanini

ORCID: 0000-0003-3690-8574
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital and Cyber Forensics
  • Digital Media Forensic Detection
  • Advanced Malware Detection Techniques
  • Forensic and Genetic Research
  • Archaeology and ancient environmental studies
  • Image Processing and 3D Reconstruction
  • Data Quality and Management
  • Privacy-Preserving Technologies in Data
  • Forensic Anthropology and Bioarchaeology Studies
  • Privacy, Security, and Data Protection

University of Lausanne
2024-2025

École Polytechnique Fédérale de Lausanne
2024

Second-hand electronic devices are increasingly being sold online. Although more affordable and environment-friendly than new products, second-hand devices, in particular those with storage capabilities, create security privacy threats (e.g., malware or confidential data still stored on the device, aka remnant data). Previous work studied this issue from a technical point of view only perspective sellers but buyers has been largely overlooked. In paper, we fill gap take multi-disciplinary...

10.56553/popets-2024-0057 article EN cc-by Proceedings on Privacy Enhancing Technologies 2024-04-01

Generating timelines, i.e., sorting events by their respective timestamps, is an essential technique commonly used in digital forensic investigations. But timestamps are not the only source of timing information. For example, sequence numbers embedded databases or positional information, such as line log files, often contain implicit information about order without directly referencing a timestamp. We present method that can integrate into timelines separating sources distinct time domains,...

10.1016/j.fsidi.2024.301755 article EN cc-by-nc-nd Forensic Science International Digital Investigation 2024-07-01

Timestamps and their correct interpretation play a crucial role in digital forensic investigations, particularly when the objective is to establish timeline of events a.k.a. event reconstruction. However, way these timestamps are generated heavily depends on an internal clock, or 'system time', from which many derived. Consequently, this system time skewed due tampering, natural clock drift, malfunctions, recorded will not reflect actual times (real-world) occurred. This raises question how...

10.1016/j.fsidi.2024.301759 article EN cc-by-nc-nd Forensic Science International Digital Investigation 2024-07-01

In this article, three main approaches to situate forensic traces in time were revisited under the prism of Sydney Declaration and adapted be applicable a large range physical digital traces. The first approach is based on tags which are time-based characteristics produced as result an activity at specific time. They can either directly related (i.e., stamps) or indirectly indicators). While relatively straightforward, require scientific knowledge correctly interpreted account for risks...

10.1016/j.forsciint.2024.112020 article EN cc-by Forensic Science International 2024-04-08

Event reconstruction is a fundamental part of the digital forensic process, helping to answer key questions like who, what, when, and how. A common way accomplishing that use tools create timelines, which are then analyzed. However, various challenges exist, such as large volumes data or contamination. While prior research has focused on simplifying less attention been given tampering, i.e., deliberate manipulation evidence, can lead errors in interpretation. This article addresses issue by...

10.48550/arxiv.2412.12814 preprint EN arXiv (Cornell University) 2024-12-17

Timestamps play a pivotal role in digital forensic event reconstruction, but due to their non-essential nature, tampering or manipulation of timestamps is possible by users multiple ways, even on running systems. This has significant effect the reliability results from applying timeline analysis as part an investigation. In this paper, we investigate problem with (``live'') system. While prior work shown that evidence hard, focus question \emph{why} so. By performing qualitative user study...

10.48550/arxiv.2501.00175 preprint EN arXiv (Cornell University) 2024-12-30
Coming Soon ...