Cho et al., 2025 - Google Patents
Conversational AI forensics: A case study on ChatGPT, Gemini, Copilot, and ClaudeCho et al., 2025
- Document ID
- 9028659497429215718
- Author
- Cho K
- Park Y
- Kim J
- Kim B
- Jeong D
- Publication year
- Publication venue
- Forensic Science International: Digital Investigation
External Links
Snippet
Recent advances in conversational AI services have attracted interest from both specialized technical communities and the general public. Major IT companies such as OpenAI, Microsoft, and Google are actively developing and enhancing conversational AI …
- 238000000034 method 0 abstract description 53
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/107—Computer aided management of electronic mail
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/14—Fourier, Walsh or analogous domain transformations, e.g. Laplace, Hilbert, Karhunen-Loeve, transforms
- G06F17/141—Discrete Fourier transforms
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Samtani et al. | Linking exploits from the dark web to known vulnerabilities for proactive cyber threat intelligence: An attention-based deep structured semantic model | |
| Martinez-Caro et al. | A comparative study of web content management systems | |
| Quick et al. | Cloud storage forensics | |
| RU2637477C1 (en) | System and method for detecting phishing web pages | |
| Cho et al. | Conversational AI forensics: A case study on ChatGPT, Gemini, Copilot, and Claude | |
| Harichandran et al. | CuFA: A more formal definition for digital forensic artifacts | |
| Mirza et al. | Mobile cyber forensic investigations of web3 wallets on android and ios | |
| Riadi et al. | Forensic investigation technique on android's blackberry messenger using nist framework | |
| Pandey et al. | Efficient usage of web forensics, disk forensics and email forensics in successful investigation of cyber crime | |
| Ghanem et al. | D2WFP: a novel protocol for forensically identifying, extracting, and analysing deep and dark web browsing activities | |
| Pandela et al. | Browser forensics on web-based tiktok applications | |
| Hughes et al. | Browsers’ private mode: is it what we were promised? | |
| Barros et al. | Forensic analysis of the bumble dating app for android | |
| Krishnan et al. | Interplay of digital forensics in ediscovery | |
| Javed et al. | Analyzing Tor browser artifacts for enhanced web forensics, anonymity, cybersecurity, and privacy in Windows-Based systems | |
| Walkow et al. | Systematically Searching for Identity-Related Information in the Internet with OSINT Tools | |
| Manzoor et al. | Challenges of Data Extraction from Facebook & WhatsApp Applications | |
| US20240037157A1 (en) | Increasing security of a computer program using unstructured text | |
| Spreitzenbarth et al. | Mastering python forensics | |
| Liu et al. | A research and analysis method of open source threat intelligence data | |
| Hunton | Managing the technical resource capability of cybercrime investigation: a UK law enforcement perspective | |
| Tyagi et al. | Forensic analysis and privacy implications of LLM mobile apps: A case study of ChatGPT, Copilot, and Gemini | |
| Sharma et al. | IoT forensics in ambient intelligence environments: Legal issues, research challenges and future directions | |
| Hyder et al. | Towards digital forensics investigation of wordpress applications running over kubernetes | |
| David et al. | A two-stage model for social network investigations in digital forensics |