메뉴 건너뛰기




Volumn 337 AICT, Issue , 2010, Pages 77-90

A consistency study of the windows registry

Author keywords

counter counter forensics; registry analysis; Windows forensics

Indexed keywords

CONSISTENCY CHECKING; COUNTER-COUNTER-FORENSICS; EVENT SEQUENCE; FORENSIC TOOLS; NOVEL METHODS; REGISTRY ANALYSIS; TIME STAMPS; WINDOWS REGISTRY;

EID: 78651104447     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-15506-2_6     Document Type: Conference Paper
Times cited : (5)

References (9)
  • 2
    • 34047215259 scopus 로고    scopus 로고
    • Counter-forensic privacy tools: A forensic evaluation
    • Institute for Software Research International, Carnegie-Mellon University, Pittsburgh, Pennsylvania (reports-archive.adm.cs.cmu.edu/anon/isri20 05/CMU-ISRI-05-119.pdf)
    • M. Geiger and F. Cranor, Counter-Forensic Privacy Tools: A Forensic Evaluation, Technical Report CMU-ISRI-05-119, Institute for Software Research International, Carnegie-Mellon University, Pittsburgh, Pennsylvania (reports-archive.adm.cs.cmu.edu/anon/isri20 05/CMU-ISRI-05-119.pdf), 2005.
    • (2005) Technical Report CMU-ISRI-05-119
    • Geiger, M.1    Cranor, F.2
  • 3
    • 77954728672 scopus 로고    scopus 로고
    • Rigorous development of automated inconsistency checks for digital evidence using the B method
    • P. Gladyshev and A. Enbacka, Rigorous development of automated inconsistency checks for digital evidence using the B method, International Journal of Digital Evidence, vol. 6(2), pp. 1-21, 2007.
    • (2007) International Journal of Digital Evidence , vol.6 , Issue.2 , pp. 1-21
    • Gladyshev, P.1    Enbacka, A.2
  • 4
    • 33745983277 scopus 로고    scopus 로고
    • Formalizing event time bounding in digital investigations
    • P. Gladyshev and A. Patel, Formalizing event time bounding in digital investigations, International Journal of Digital Evidence, vol. 4(2), pp. 1-14, 2005.
    • (2005) International Journal of Digital Evidence , vol.4 , Issue.2 , pp. 1-14
    • Gladyshev, P.1    Patel, A.2
  • 5
    • 33847626038 scopus 로고    scopus 로고
    • Anti-forensics with a small army of exploits
    • S. Hilley, Anti-forensics with a small army of exploits, Digital Investigation, vol. 4(1), pp. 13-15, 2007.
    • (2007) Digital Investigation , vol.4 , Issue.1 , pp. 13-15
    • Hilley, S.1
  • 6
    • 73549089383 scopus 로고    scopus 로고
    • Microsoft Corporation, Redmond, Washington (support.microsoft.com/kb/ 256986)
    • Microsoft Corporation, Windows registry information for advanced users, Redmond, Washington (support.microsoft.com/kb/256986), 2008.
    • (2008) Windows Registry Information for Advanced Users
  • 7
    • 51149114414 scopus 로고    scopus 로고
    • Hypothesis-based investigation of digital timestamps
    • I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts
    • S. Willassen, Hypothesis-based investigation of digital timestamps, in Advances in Digital Forensics IV, I. Ray and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 75-86, 2008.
    • (2008) Advances in Digital Forensics , vol.4 , pp. 75-86
    • Willassen, S.1
  • 8
    • 68649113319 scopus 로고    scopus 로고
    • Using ShellBag information to reconstruct user activities
    • Y. Zhu, P. Gladyshev and J. James, Using ShellBag information to reconstruct user activities, Digital Investigation, vol. 6(S1), pp. S69-S77, 2009.
    • (2009) Digital Investigation , vol.6 , Issue.S1
    • Zhu, Y.1    Gladyshev, P.2    James, J.3
  • 9
    • 68649109486 scopus 로고    scopus 로고
    • A comparative methodology for the reconstruction of digital events using Windows restore points
    • Y. Zhu, J. James and P. Gladyshev, A comparative methodology for the reconstruction of digital events using Windows restore points, Digital Investigation, vol. 6(1-2), pp. 8-15, 2009.
    • (2009) Digital Investigation , vol.6 , Issue.1-2 , pp. 8-15
    • Zhu, Y.1    James, J.2    Gladyshev, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.