Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kara L. Nance is active.

Publication


Featured researches published by Kara L. Nance.


Operating Systems Review | 2008

Forensics examination of volatile system data using virtual introspection

Brian Hay; Kara L. Nance

While static examination of computer systems is an important part of many digital forensics investigations, there are often important system properties present only in volatile memory that cannot be effectively recovered using static analysis techniques, such as offline hard disk acquisition and analysis. An alternative approach, involving the live analysis of target systems to uncover this volatile data, presents significant risks and challenges to forensic investigators as observation techniques are generally intrusive and can affect the system being observed. This paper provides a discussion of live digital forensics analysis through virtual introspection and presents a suite of virtual introspection tools developed for Xen (VIX tools). The VIX tools suite can be used for unobtrusive digital forensic examination of volatile system data in virtual machines, and addresses a key research area identified in the virtualization in digital forensics research agenda [22].


hawaii international conference on system sciences | 2011

Storm Clouds Rising: Security Challenges for IaaS Cloud Computing

Brian Hay; Kara L. Nance; Matt Bishop

Securing our digital assets has become increasingly challenging as our reliance on rapidly evolving technologies continues to grow. The security perimeter in computing has changed from a well-defined boundary that was relatively easy to identify and defend, to an elastic boundary that is constantly changing and for which the threats are constantly evolving. This paper investigates the complex security challenges that are introduced by the trend towards Infrastructure as a Service (IaaS)-based cloud computing. While not exhaustive, it identifies some technological and legal issues and concerns from the perspectives of identified stakeholders, and suggests some future directions for security research and development to help advance the security posture of this technology.


ieee symposium on security and privacy | 2008

Virtual Machine Introspection: Observation or Interference?

Kara L. Nance; Matt Bishop; Brian Hay

As virtualization becomes increasingly mainstream, virtual machine introspection techniques and tools are evolving to monitor VM behavior. A survey of existing approaches highlights key requirements, which are addressed by a new tool suite for the Xen VM monitoring system.


hawaii international conference on system sciences | 2009

Digital Forensics: Defining a Research Agenda

Kara L. Nance; Brian Hay; Matt Bishop

While many fields have well-defined research agendas, evolution of the field of digital forensics has been largely driven by practitioners in the field. As a result, the majority of the tools and practice have been developed in response to a diverse set of specific threats or scenarios, rather than as the result of a research and development plan. In June, 2008 a group of digital forensics researchers, educators and practitioners met as a working group at the Colloquium for Information Systems Security Education (CISSE 2008) to brainstorm ideas for the development of a research, education, and outreach agenda for Digital Forensics. This paper outlines some of the ideas generated and new research categories and areas identified at this meeting, as well as a plan for future development of a formalized research agenda.


availability, reliability and security | 2009

Investigating the Implications of Virtual Machine Introspection for Digital Forensics

Kara L. Nance; Matt Bishop; Brian Hay

Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be compromised as a result of the intrusion. Complicating these issues are the techniques employed by the investigators themselves. If the system is quiescent when examined, most of the information in memory has been lost. If the system is active, the kernel and programs used by the forensic investigators are likely to influence the results and as such are themselves suspect. Using virtual machines and a technique called virtual machine introspection can help overcome these limits, but it introduces its own research challenges. Recent developments in virtual machine introspection have led to the identification of four initial priority research areas in virtual machine introspection including virtual machine introspection tool development, applications of virtual machine introspection to non-quiescent virtual machines, virtual machine introspection covert operations, and virtual machine introspection detection.


Journal of Digital Forensic Practice | 2008

Virtualization and Digital Forensics: A Research and Education Agenda

Mark Pollitt; Kara L. Nance; Brian Hay; Ronald Dodge; Philip Craiger; Paul Burke; Christopher Marberry; Bryan Brubaker

The application of virtualization software and techniques in information technology research and education has provided a foundational environment to advance the state-of-the-art in research and education in many related areas. Commercial and open source virtualization products are being used by researchers and educators to create a wide variety of virtual environments. These virtual environments facilitate systems design and development and product development as well as the testing and modeling of production and preproduction systems. As the capabilities, functionality, and stability of these products have evolved, the use of virtualization has expanded, necessitating the identification of new research areas to investigate the impacts of virtualization on digital forensics. In February 2007, a group of digital forensics researchers, educators, and practitioners gathered at the National Center for Forensic Science at the University of Central Florida for the 2007 Workshop on Virtualization in Digital Forensics to discuss these issues and develop a research and education agenda for virtualization and digital forensics. This article outlines some of the ideas generated and new research categories and areas identified at this meeting.


hawaii international conference on system sciences | 2011

Identifying and Visualizing the Malicious Insider Threat Using Bipartite Graphs

Kara L. Nance; Raffael Marty

Government agencies and organizations are just beginning to harness the powerful capabilities of visualization to aid in the prevention, detection, and mitigation of security threats. Most advances in this area have focused on protecting an agency or organization from malicious outsiders. While not a new threat, the malicious insider has recently earned increased focus. This paper investigates methods of classifying and visualizing insider behavior to establish a pattern of acceptable actions based on workgroup role classifications. It then discusses actions as related to identified precursors of malicious activities and provides a simplified example of how visualization can be used to help detect this threat. When visualized using bipartite mappings, behaviors outside the norm can be easily identified and provide an important step in the process of highlighting areas and individuals for further investigation.


hawaii international conference on system sciences | 2010

Digital Forensics: Defining an Education Agenda

Kara L. Nance; Helen Armstrong; Colin J. Armstrong

While many fields have well-defined education agendas, this is not the case for digital forensics. A unique characteristic of the evolution of digital forensics is that it has been largely driven by practitioners in the field. As a result, the majority of the educational experiences have been developed in response to identified weaknesses in the system or to train individuals on the use of a specific tool or technique, rather than as a result of educational needs assessments based on an accepted common body of knowledge. In June, 2008 a group of digital forensics researchers, educators and practitioners met as a working group at the Colloquium for Information Systems Security Education (CISSE 2008) to brainstorm ideas for the development of a research, education, and outreach agenda for Digital Forensics. This paper presents the research in education needs that the group identified associated with the development of a digital forensics education agenda.


ieee symposium on security and privacy | 2009

Teach Them When They Aren't Looking: Introducing Security in CS1

Kara L. Nance

This article discusses computer security exercises that have been used to introduce concepts in foundational computer-programming courses. It presents two examples and discusses the associated reactions of the students as they learn about computer security at the beginning of their computer-programming careers.


Computers & Geosciences | 2005

Automatic transformations between geoscience standards using XML

Kara L. Nance; Brian Hay

As models and analysis tools for geoscience applications become increasingly complex, they allow researchers to manipulate larger, richer, and more finely-grained datasets, often gathered from diverse heterogeneous sources. These complex models and analysis tools provide scientists with opportunities to investigate phenomena in much greater depth, but this additional power is not without cost. Often this cost is expressed in the time required on the part of the researcher to identify, gather, and transform the data necessary to satisfy the demands of their data-intensive computational tools. In addition, it can be difficult to extract all of the meaningful contents of the datasets when metadata is missing, nonstandardized, or in a format unfamiliar to or incompatible with the user application or analysis tool. The evolution of XML standards has simplified this problem by providing domain-specific methodologies for creating self-describing datasets. The evolution of XML standards has also presented the challenge of choosing the best standard for each scientific domain and associated community of interest (COI); however, the process of selecting or creating a domain-specific XML data format standard can be extremely contentious. In addition, many researchers require information compilation from diverse datasets that are stored using differing standards. This research effort presents a mechanism for automating transformations between scientific standards using XML with a focus on the application of the technology to the diverse geoscience XML standards while maintaining the integrity associated with the datasets. This technological capability minimizes the impact of committing to a particular XML standard by providing the flexibility to transform data between standards either to update or change the standard, to bring datasets into conformance for a particular application or data portal, or to transform data to increase its usability for new COIs while maintaining data integrity. ility for new COIs while maintaining data security standards.

Collaboration


Dive into the Kara L. Nance's collaboration.

Top Co-Authors

Avatar

Brian Hay

University of Alaska Fairbanks

View shared research outputs
Top Co-Authors

Avatar

Matt Bishop

University of California

View shared research outputs
Top Co-Authors

Avatar

Mahla Strohmaier

University of Alaska Fairbanks

View shared research outputs
Top Co-Authors

Avatar

Ronald Dodge

United States Military Academy

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Christopher Hecker

University of Alaska Fairbanks

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Amelia Phillips

Community College of Philadelphia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Christopher Marberry

University of Central Florida

View shared research outputs
Researchain Logo
Decentralizing Knowledge