Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hayson Tse is active.

Publication


Featured researches published by Hayson Tse.


international conference on digital forensics | 2012

Reasoning about Evidence using Bayesian Networks

Hayson Tse; K. P. Chow; Michael Y. K. Kwan

This paper presents methods for analyzing the topology of a Bayesian belief network created to qualify and quantify the strengths of investigative hypotheses and their supporting digital evidence. The methods, which enable investigators to systematically establish, demonstrate and challenge a Bayesian belief network, help provide a powerful framework for reasoning about digital evidence. The methods are applied to review a Bayesian belief network constructed for a criminal case involving BitTorrent file sharing, and explain the causal effects underlying the legal arguments.


international conference on digital forensics | 2010

Evaluation of Evidence in Internet Auction Fraud Investigations

Michael Y. K. Kwan; Richard E. Overill; K. P. Chow; Jantje A. M. Silomon; Hayson Tse; Frank Y. W. Law; Pierre K. Y. Lai

Internet auction fraud has become prevalent. Methodologies for detecting fraudulent transactions use historical information about Internet auction participants to decide whether or not a user is a potential fraudster. The information includes reputation scores, values of items, time frames of various activities and transaction records. This paper presents a distinctive set of fraudster characteristics based on an analysis of 278 allegations about the sale of counterfeit goods at Internet auction sites. Also, it applies a Bayesian approach to analyze the relevance of evidence in Internet auction fraud cases.


international conference on digital forensics | 2011

Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations

Michael Y. K. Kwan; Richard E. Overill; K. P. Chow; Hayson Tse; Frank Y. W. Law; Pierre K. Y. Lai

Research on using Bayesian networks to enhance digital forensic investigations has yet to evaluate the quality of the output of a Bayesian network. The evaluation can be performed by assessing the sensitivity of the posterior output of a forensic hypothesis to the input likelihood values of the digital evidence. This paper applies Bayesian sensitivity analysis techniques to a Bayesian network model for the well-known Yahoo! case. The analysis demonstrates that the conclusions drawn from Bayesian network models are statistically reliable and stable for small changes in evidence likelihood values.


2011 Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering | 2011

Protecting Digital Data Privacy in Computer Forensic Examination

Frank Y. W. Law; Patrick P. F. Chan; Siu-Ming Yiu; K. P. Chow; Michael Y. K. Kwan; Hayson Tse; Pierre K. Y. Lai

Privacy is a fundamental human right defined in the Universal Declaration of Human Rights. To enable the protection of data privacy, personal data that are not related to the investigation subject should be excluded during computer forensic examination. In the physical world, protection of privacy is controlled and regulated in most countries by laws. Legislation for handling private data has been established in various jurisdictions. In the modern world, the massive use of computers generates a huge amount of private data and there is correspondingly an increased expectation to recognize and respect human rights in digital investigation. However, there does not exist a forensically sound model for protecting private data in the context of digital investigation, and it poses a threat to privacy if the investigation involves the processing of such kind of data. In this paper, we try to address this important issue and present a cryptographic model designed to be incorporated into the current digital investigation framework, thereby adding a possible way to protect data privacy in digital investigation.


international conference on digital forensics | 2009

A Host-Based Approach to BotNet Investigation?

Frank Y. W. Law; K. P. Chow; Pierre K. Y. Lai; Hayson Tse

Robot Networks (BotNets) are one of the most serious threats faced by the online community today. Since their appearance in the late 1990’s, much effort has been expended in trying to thwart their unprecedented growth. However, with robust and advanced capabilities, it is very difficult for average users to avoid or prevent infection by BotNet malware. Moreover, whilst BotNets have increased in scale, scope and sophistication, the dearth of standardized and effective investigative procedures poses huge challenges to digital investigators in trying to probe such cases. In this paper we present a practical (and repeatable) host-based investigative methodology to the collection of evidentiary information from a Bot-infected machine. Our approach collects digital traces from both the network and physical memory of the infected local host, and correlates this information to identify the resident BotNet malware involved.


international conference on digital forensics | 2009

Analysis of the Digital Evidence Presented in the Yahoo! Case

Michael Y. K. Kwan; K. P. Chow; Pierre K. Y. Lai; Frank Y. W. Law; Hayson Tse

The “Yahoo! Case” led to considerable debate about whether or not an IP address is personal data as defined by the Personal Data (Privacy) Ordinance (Chapter 486) of the Laws of Hong Kong. This paper discusses the digital evidence presented in the Yahoo! Case and evaluates the impact of the IP address on the verdict in the case. A Bayesian network is used to quantify the evidentiary strengths of hypotheses in the case and to reason about the evidence. The results demonstrate that the evidence about the IP address was significant to obtaining a conviction in the case.


2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering, SADFE 2013 | 2013

Quantification of digital forensic hypotheses using probability theory

Richard E. Overill; Jantje A. M. Silomon; K. P. Chow; Hayson Tse

The issue of downloading illegal material from a website onto a personal digital device is considered from the perspective of conventional (Pascalian) probability theory. We present quantitative results for a simple model system by which we analyse and counter the putative defence case that the forensically recovered illegal material was downloaded accidentally by the defendant. The model is applied to two actual prosecutions involving possession of child pornography.


computer science and its applications | 2009

Memory Acquisition: A 2-Take Approach

Frank Y. W. Law; Pierre K. Y. Lai; K. P. Chow; Ricci S. C. Ieong; Michael Y. K. Kwan; Kenneth W. H. Tse; Hayson Tse

When more and more people recognize the value of volatile data, live forensics gains more weight in digital forensics. It is often used in parallel with traditional pull-the-plug forensics to provide a more reliable result in forensic examination. One of the core components in live forensics is the collection and analysis of memory volatile data, during which the memory content is acquired for searching of relevant evidential data or investigating various computer processes to unveil the activities being performed by a user. However, this conventional method may have weaknesses because of the volatile nature of memory data and the absence of original data for validation. This may cause implication to the admissibility of memory data at the court of law which requires strict authenticity and reliability of evidence. In this paper, we discuss the impact of various memory acquisition methods and suggest a 2-Take approach which aims to enhance the confidence level of the acquired memory data for legal proceedings.


international conference on digital forensics | 2013

A GENERIC BAYESIAN BELIEF MODEL FOR SIMILAR CYBER CRIMES

Hayson Tse; K. P. Chow; Michael Y. K. Kwan

Bayesian belief network models designed for specific cyber crimes can be used to quickly collect and identify suspicious data that warrants further investigation. While Bayesian belief models tailored to individual cases exist, there has been no consideration of generalized case modeling. This paper examines the generalizability of two case-specific Bayesian belief networks for use in similar cases. Although the results are not conclusive, the changes in the degrees of belief support the hypothesis that generic Bayesian network models can enhance investigations of similar cyber crimes.


Systematic Approaches to Digital Forensic Engineering (SADFE), 2013 Eighth International Workshop on | 2013

The next generation for the forensic extraction of electronic evidence from mobile telephones

Hayson Tse; K. P. Chow; Michael Y. K. Kwan

Electronic evidence extracted from a mobile telephone provide a wealth of information about the user. Before a court allows the trier of fact to consider the electronic evidence, the court must ensure that the subject matter, testimony of which is to be given, is scientific. Therefore, regard must, at the investigation stage, be given to fulfill the requirements of science and law, including international standards. Such compliance also moves the extraction of electronic evidence from mobile telephones into the next generation, a more rigorous position as a forensic science, by being able to give in court well- reasoned and concrete claims about the accuracy and validity of conclusions.

Collaboration


Dive into the Hayson Tse's collaboration.

Top Co-Authors

Avatar

K. P. Chow

University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Siu-Ming Yiu

University of Hong Kong

View shared research outputs
Researchain Logo
Decentralizing Knowledge