메뉴 건너뛰기




Volumn 3269, Issue , 2004, Pages 158-170

Volatile memory computer forensics to detect kernel level compromise

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER FORENSICS; COMPUTER OPERATING SYSTEMS; DATA STORAGE EQUIPMENT; HARD DISK STORAGE; LINUX;

EID: 35048889034     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30191-2_13     Document Type: Article
Times cited : (8)

References (9)
  • 2
    • 33847278205 scopus 로고    scopus 로고
    • Steps for Recovering from a UNIX or NT System Compromise
    • CERT Coordination Center, April
    • Steps for Recovering from a UNIX or NT System Compromise. Technical Report, CERT Coordination Center, April 2000. http://www.cert.org/tech_tips/win- UNIX-system_compromise.html
    • (2000) Technical Report
  • 5
    • 3042731401 scopus 로고    scopus 로고
    • A Hardware-Based Memory Acquisition Procedure for Digital Investigations
    • Carrier, B., Grand, J., A Hardware-Based Memory Acquisition Procedure for Digital Investigations, Digital Investigation, Vol. 1, Issue 1 (2004), 50-60.
    • (2004) Digital Investigation , vol.1 , Issue.1 , pp. 50-60
    • Carrier, B.1    Grand, J.2
  • 7
    • 35048834315 scopus 로고    scopus 로고
    • Detecting and Dealing with New Rootkits
    • Aug
    • Ring, S., Cole, E., Detecting and Dealing with New Rootkits. Sys Admin Magazine, Aug (2003) 28-33.
    • (2003) Sys Admin Magazine , pp. 28-33
    • Ring, S.1    Cole, E.2
  • 8
    • 4344715560 scopus 로고    scopus 로고
    • Taking a Lesson from Stealthy Rootkits
    • Ring, S., Cole, E., Taking a Lesson from Stealthy Rootkits, IEEE Security & Privacy, Vol. 2 Issue 4 (2004) 38-45.
    • (2004) IEEE Security & Privacy , vol.2 , Issue.4 , pp. 38-45
    • Ring, S.1    Cole, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.