메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 85-93

Principles-driven forensic analysis

Author keywords

Abstraction shortcuts; Auditing; Compilers; Covert channels; Forensic analysis; Forensic principles; Forensics; Logging; Multi resolution forensics; Race conditions; Virtual machine introspection

Indexed keywords

ABSTRACTION SHORTCUTS; AUDITING; COMPILERS; COVERT CHANNELS; FORENSIC ANALYSIS; FORENSIC PRINCIPLES; FORENSICS; LOGGING; MULTI-RESOLUTION FORENSICS; VIRTUAL MACHINE INTROSPECTION;

EID: 33745615461     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (18)

References (19)
  • 1
    • 0004048154 scopus 로고
    • Computer security threat monitoring and surveillance
    • James P. Anderson Co., Fort Washington, PA, April
    • J. P. Anderson. Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co., Fort Washington, PA, April, 1980.
    • (1980) Technical Report
    • Anderson, J.P.1
  • 8
    • 0345302827 scopus 로고    scopus 로고
    • PhD thesis, University of California, San Diego
    • A. H. Gross. Analyzing Computer Intrusions. PhD thesis, University of California, San Diego, 1997.
    • (1997) Analyzing Computer Intrusions
    • Gross, A.H.1
  • 10
    • 33745602423 scopus 로고    scopus 로고
    • Plato: A platform for virtual machine services
    • University of Michigan
    • S. T. King, G. W. Dunlap, and P. M. Chen. Plato: A platform for virtual machine services. Technical Report CSE-TR-498-04, University of Michigan, 2004.
    • (2004) Technical Report , vol.CSE-TR-498-04
    • King, S.T.1    Dunlap, G.W.2    Chen, P.M.3
  • 12
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • October
    • B. W. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613-615, October 1973.
    • (1973) Communications of the ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 13
    • 33745627407 scopus 로고    scopus 로고
    • Forensics for system administrators
    • August
    • S. Peisert. Forensics for System Administrators. ;login:, August 2005.
    • (2005) Login
    • Peisert, S.1
  • 18
    • 84976781807 scopus 로고
    • Reflections on trusting trust
    • August
    • K. Thompson. Reflections on Trusting Trust. Communications of the ACM, 27(8):761-763, August 1984.
    • (1984) Communications of the ACM , vol.27 , Issue.8 , pp. 761-763
    • Thompson, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.