메뉴 건너뛰기




Volumn 5, Issue SUPPL., 2008, Pages

FACE: Automated digital evidence discovery and correlation

Author keywords

Digital forensics; Disk image; Evidence correlation; Forensics tool; Log file; Memory analysis; Network capture; Physical memory

Indexed keywords

COMPUTER OPERATING SYSTEMS; DIGITAL FORENSICS; ELECTRONIC CRIME COUNTERMEASURES; OPEN SYSTEMS;

EID: 48749115314     PISSN: 17422876     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.diin.2008.05.008     Document Type: Article
Times cited : (69)

References (21)
  • 2
    • 84868372495 scopus 로고    scopus 로고
    • Arasteh A. Forensic memory analysis: from stack and code execution history. In: Proceedings of the 2007 Digital Forensic Research Workshop (DFRWS), 2007.
    • Arasteh A. Forensic memory analysis: from stack and code execution history. In: Proceedings of the 2007 Digital Forensic Research Workshop (DFRWS), 2007.
  • 3
    • 48749133376 scopus 로고    scopus 로고
    • Carrier B. The Sleuthkit and Autopsy, http://www.sleuthkit.org/.
    • Carrier B. The Sleuthkit and Autopsy, http://www.sleuthkit.org/.
  • 4
    • 3042731401 scopus 로고    scopus 로고
    • Hardware-based memory aquisition procedure for digital investigations
    • Carrier B., and Grand J. Hardware-based memory aquisition procedure for digital investigations. Journal of Digital Investigation 1 1 (2004)
    • (2004) Journal of Digital Investigation , vol.1 , Issue.1
    • Carrier, B.1    Grand, J.2
  • 6
    • 85084160792 scopus 로고    scopus 로고
    • Chow J, Pfaff B, Garfinkel T, Christopher K, Rosenblum M. Understanding data lifetime via whole system simulation. In: Proceedings of the 13th USENIX security symposium, August 2004.
    • Chow J, Pfaff B, Garfinkel T, Christopher K, Rosenblum M. Understanding data lifetime via whole system simulation. In: Proceedings of the 13th USENIX security symposium, August 2004.
  • 7
    • 84868338713 scopus 로고    scopus 로고
    • Dolan-Gavitt B. The VAD tree: a process-eye view of physical memory. In: Proceedings of the 2007 Digital Forensic Research Workshop (DFRWS), 2007.
    • Dolan-Gavitt B. The VAD tree: a process-eye view of physical memory. In: Proceedings of the 2007 Digital Forensic Research Workshop (DFRWS), 2007.
  • 9
    • 48749104659 scopus 로고    scopus 로고
    • Exploiting the Rootkit Paradox with Windows memory analysis
    • Kornblum J. Exploiting the Rootkit Paradox with Windows memory analysis. International Journal of Digital Evidence 5 1 (Fall 2006)
    • (2006) International Journal of Digital Evidence , vol.5 , Issue.1
    • Kornblum, J.1
  • 10
    • 33847398384 scopus 로고    scopus 로고
    • Using every part of the buffalo in Windows memory analysis
    • Kornblum J. Using every part of the buffalo in Windows memory analysis. Digital Investigation (January 2007)
    • (2007) Digital Investigation
    • Kornblum, J.1
  • 12
    • 48749117830 scopus 로고    scopus 로고
    • Burdach M. idetect, http://forensic.seccure.net/tools/idetect.tar.gz.
    • Burdach M. idetect, http://forensic.seccure.net/tools/idetect.tar.gz.
  • 13
    • 77955400664 scopus 로고    scopus 로고
    • Richard III GG, Roussev V. Scalpel: a frugal, high-performance file carver. In: Proceedings of the 2005 Digital Forensics Research Workshop (DFRWS 2005).
    • Richard III GG, Roussev V. Scalpel: a frugal, high-performance file carver. In: Proceedings of the 2005 Digital Forensics Research Workshop (DFRWS 2005).
  • 14
    • 48749095088 scopus 로고    scopus 로고
    • Rutkowska J. Beyond the CPU: defeating hardware based RAM acquisition tools (part I: AMD case), BlackHat DC 2007 presentation.
    • Rutkowska J. Beyond the CPU: defeating hardware based RAM acquisition tools (part I: AMD case), BlackHat DC 2007 presentation.
  • 15
    • 48749086904 scopus 로고    scopus 로고
    • Ruff N, Suiche M. Enter Sandman (why you should never go to sleep). In: PacSec applied security conference, 2007, Tokyo, Japan.
    • Ruff N, Suiche M. Enter Sandman (why you should never go to sleep). In: PacSec applied security conference, 2007, Tokyo, Japan.
  • 16
    • 84868380591 scopus 로고    scopus 로고
    • Schatz B. BodySnatcher: towards reliable volatile memory acquisition by software. In: Proceedings of the 2007 Digital Forensic Research Workshop (DFRWS), 2007.
    • Schatz B. BodySnatcher: towards reliable volatile memory acquisition by software. In: Proceedings of the 2007 Digital Forensic Research Workshop (DFRWS), 2007.
  • 17
    • 50849097989 scopus 로고    scopus 로고
    • Schuster A. Searching for processes and threads in Microsoft Windows memory dumps. In: Proceedings of the 2006 Digital Forensic Research Workshop (DFRWS), 2006a.
    • Schuster A. Searching for processes and threads in Microsoft Windows memory dumps. In: Proceedings of the 2006 Digital Forensic Research Workshop (DFRWS), 2006a.
  • 18
    • 48749095817 scopus 로고    scopus 로고
    • Schuster A. Pool allocations as an information source in Windows memory forensics. In: International conference on IT-incident management and IT-forensics, October 2006b.
    • Schuster A. Pool allocations as an information source in Windows memory forensics. In: International conference on IT-incident management and IT-forensics, October 2006b.
  • 20
    • 48749109657 scopus 로고    scopus 로고
    • Urrea JM. An analysis of Linux RAM Forensics. Naval Post Graduate School thesis; March 2006.
    • Urrea JM. An analysis of Linux RAM Forensics. Naval Post Graduate School thesis; March 2006.
  • 21
    • 48749119665 scopus 로고    scopus 로고
    • The acquisition and analysis of Random Access Memory
    • Vidas T. The acquisition and analysis of Random Access Memory. Journal of Digital Forensic Practice 1 4 (December 2006) 315-323
    • (2006) Journal of Digital Forensic Practice , vol.1 , Issue.4 , pp. 315-323
    • Vidas, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.