黑料正能量

Profiles

Gokila Dorai, PhD 黑料正能量

Gokila Dorai, PhD

Assistant Professor

  • Augusta GA UNITED STATES
  • Department of Computer & Cyber Sciences

Dr. Dorai鈥檚 area of expertise is mobile/IoT forensics research and developing a targeted data extraction system for digital forensics.

Contact More Open options

Spotlight

Multimedia

Social

Biography

Gokila Dorai, PhD, is an assistant professor in the School of Computer and Cyber Sciences at 黑料正能量. Dorai鈥檚 area of expertise is mobile/IoT forensics research. She is passionate about inventing digital tools to help victims and survivors of various digital crimes.

Areas of Expertise

Artifical Intelligence
System Security
Digital Forensics
Digital Crimes
Software Development
Mobile Computing
loT forensics research

Education

Florida State University

Ph.D.

Computer Science & Mobile Forensics

2019

Florida State University

M.S.

Computer Science

2016

R.M.K. Engineering College

B.E.

Computer Science & Engineering

2007

Links

Media Appearances

Protecting your data on even the most unlikely devices

WFXG  tv

2022-12-05

Mobile devices are with us all the time, listening. While your mobile devices are at an increased risk for attacks, even the most unlikely household appliances can be prone to hacking. You might be wondering what a cellphone and a crock pot could possibly have in common? But, they are each susceptible to attacks if they have are connected to the internet. 鈥淚t could be a coffee maker, it could be something that your wearing on your hands, something for monitoring health,鈥 says Dr. Gokila Dorai, an assistant professor, at Augusta Universities, School of Computer and Cyber Sciences.

鈥楾is the season to spend money online: How to have a scam free holiday

WJBF  tv

2022-12-13

鈥楾is the season for shopping and these days more people shop and donate online during the holidays than ever before. Scammers know this and are ready to steal your hard earned money. But how do you know if the website you are on is legitimate? If someone reaches out to you, asking for a charitable donation, always ask for the name, mission, and location of the charity. Watch out for people that ask you to pay in crypto currency, prepaid debit cards, gift cards, wire transfers, or bank transfers. It鈥檚 likely a scam.

Answers

鈥淚 would strongly recommend for women, young adults even teenagers, if it鈥檚 possible for you to have biometrics as a way to unlock your device, then go for that. These unique ways of unlocking a device would add a layer of protection."

Articles

VIDE - Vault App Identification and Extraction System for iOS Devices

Forensic Science International: Digital Investigation

2020 Content hiding (or vault) apps are a class of applications that allow users to hide photos, videos, documents and other content securely. A subclass of these applications called decoy apps further supports secret hiding by having a mode which mimics standard apps such as calculators but can turn into a vault app through entering a specific input. In this work we focus on iOS devices and first describe how to identify content hiding applications from the App Store. We consider not only the US Store but also give results for App Stores in Russia, India and China. We show an effective and very fast identification of content hiding apps through a two-phase process: initial categorization using keywords followed by more precise binary classification. We next turn to understanding the behavior and features of these vault apps and how to extract the hidden information from artifacts of the app's stored data.

Data Extraction and Forensic Analysis for Smartphone Paired Wearables and IoT Devices

Internet of Things: Providing Services Using Smart Devices, Wearables, and Quantified Self

2020 Wearable devices and Internet of Things (IoT) devices have marked the beginning of a new era in forensic science. Data from smart home gadgets and wearable devices can serve as an important "witness" in civil as well as criminal cases. Thus data extracted from these devices has started to impact and transform litigation. Data collected from wearable devices can help determine truths in witness testimony since these devices document several types of activities of an individual at all times. Increased use of smart home devices also opens a new window for investigators.

Analysis of iOS SQLite Schema Evolution for Updating Forensic Data Extraction Tools

2020 8th International Symposium on Digital Forensics and Security (ISDFS)

2020 Files in the backup of iOS devices can be a potential source of evidentiary data. Particularly, the iOS backup (obtained through a logical acquisition technique) is widely used by many forensic tools to sift through the data. A significant challenge faced by several forensic tool developers is the changes in the data organization of the iOS backup. This is due to the fact that the iOS operating system is frequently updated by Apple Inc. Many iOS application developers release periodical updates to iOS mobile applications.

A Targeted Data Extraction System for Mobile Devices

IFIP International Conference on Digital Forensics

2019 Smartphones contain large amounts of data that are of significant interest in forensic investigations. In many situations, a smartphone owner may be willing to provide a forensic investigator with access to data under a documented consent agreement. However, for privacy or personal reasons, not all the smartphone data may be extracted for analysis. Courts have also opined that only data relevant to the investigation at hand may be extracted.

Building Tools for Forensic Analysis of Mobile and IoT Applications Using Selective Data Extraction

Florida State University

2019 The amount of data stored on smart phones and other mobile devices has increased phenomenally over the last decade. As a result there has been a spike in the use of these devices for documenting different scenarios that are encountered by the users as they go about their daily lives. Smart phone data has also become a critical evidence in the court for several criminal cases.

I Know What You Did Last Summer: Your Smart Home Internet of Things and Your iPhone Forensically Ratting You Out

ARES 2018: Proceedings of the 13th International Conference on Availability, Reliability and Security

2018 The adoption of smart home Internet of Things (IoT) devices continues to grow. What if your devices can snitch on you and let us know where you are at any given point in time? In this work we examined the forensic artifacts produced by Nest devices, and in specific, we examined the logical backup structure of an iPhone used to control a Nest thermostat, Nest Indoor Camera and a Nest Outdoor Camera. We also integrated the Google Home Mini as another method of controlling the studied Smart Home devices.

Jagwire is your source for news and stories from 黑料正能量. Daily updates highlight the many ways students, faculty, staff, researchers and clinicians "bring their A games" in classrooms and clinics on four campuses in Augusta and locations across the state of Georgia.