메뉴 건너뛰기




Volumn 55, Issue 1-2, 2012, Pages 223-240

On-the-spot digital investigation by means of LDFS: Live Data Forensic System

Author keywords

Automated digital investigation process; Live forensics; On the spot digital investigation

Indexed keywords

DATA FORENSICS; DIGITAL INVESTIGATION; FILE SYSTEMS; FORENSIC PRACTITIONER; HARD DRIVES; INCIDENT RESPONSE; INSTANT MESSAGING SERVICE; LIVE FORENSICS; MICROSOFT; POSTMORTEM ANALYSIS; UNIFIED ANALYSIS; WINDOWS REGISTRY; WINDOWS-BASED SYSTEMS;

EID: 82755182926     PISSN: 08957177     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.mcm.2011.05.019     Document Type: Article
Times cited : (8)

References (26)
  • 2
    • 33745970746 scopus 로고    scopus 로고
    • Selective and intelligent imaging using digital evidence bags
    • Retrieved September, 2009, from
    • Turner P. Selective and intelligent imaging using digital evidence bags. Digital Investigation 2007, 3(Supplement 3):59-64. Retrieved September, 2009, from http://www.dfrws.org/2006/proceedings/8-Turner.pdf.
    • (2007) Digital Investigation , vol.3 , Issue.SUPPL. 3 , pp. 59-64
    • Turner, P.1
  • 3
    • 33847357771 scopus 로고    scopus 로고
    • Applying a forensic approach to incident response, network investigation and system administration using digital evidence bags
    • Retrieved September, 2009, from
    • Turner P. Applying a forensic approach to incident response, network investigation and system administration using digital evidence bags. Digital Investigation 2007, 1(1):30-35. Retrieved September, 2009, from http://www.dfrws.org/2006/proceedings/8-Turner.pdf.
    • (2007) Digital Investigation , vol.1 , Issue.1 , pp. 30-35
    • Turner, P.1
  • 4
    • 82755166616 scopus 로고    scopus 로고
    • Guidelines for Evidence Collection and Archiving, Network Working Group, RFC3227, 2002. Retrieved August, From
    • D. Brezinski, T. Killalea, Guidelines for Evidence Collection and Archiving, Network Working Group, RFC3227, 2002. Retrieved August, 2009. From http://www.ietf.org/rfc/rfc3227.txt.
    • (2009)
    • Brezinski, D.1    Killalea, T.2
  • 7
    • 50849087527 scopus 로고    scopus 로고
    • Computer forensics field triage process model
    • The Proceedings of the ADFSL 2006 Conference on Digital Forensics, Security and Law
    • M. Rogers, J. Goldman, R. Mislan, T. Wedge, S. Debrota, Computer forensics field triage process model, in: The Proceedings of the ADFSL 2006 Conference on Digital Forensics, Security and Law, vol. 1, 2006.
    • (2006) , vol.1
    • Rogers, M.1    Goldman, J.2    Mislan, R.3    Wedge, T.4    Debrota, S.5
  • 8
    • 82755171500 scopus 로고    scopus 로고
    • Windd Windows Physical Memory Imaging Utility, Retrieved February, 2010, from
    • S. Matthieu, Windd Windows Physical Memory Imaging Utility, 2009. Retrieved February, 2010, from http://http://windd.msuiche.net/.
    • (2009)
    • Matthieu, S.1
  • 9
    • 33751342034 scopus 로고    scopus 로고
    • Fatkit: a framework for the extraction and analysis of digital forensic data from volatile system memory
    • Retrieved January, 2010, from
    • Petroni N., Walters A., Fraser T., Arbaugh W. Fatkit: a framework for the extraction and analysis of digital forensic data from volatile system memory. Digital Investigation 2006, 3(4):197-210. Retrieved January, 2010, from http://www.dfrws.org/2006/proceedings/2-Schuster.pdf.
    • (2006) Digital Investigation , vol.3 , Issue.4 , pp. 197-210
    • Petroni, N.1    Walters, A.2    Fraser, T.3    Arbaugh, W.4
  • 10
    • 33745993901 scopus 로고    scopus 로고
    • Searching for processes and threads in microsoft windows memory dumps
    • Retrieved January, 2010, from
    • Schuster A. Searching for processes and threads in microsoft windows memory dumps. Digital Investigation 2006, 3(Supplement 3):10-16. Retrieved January, 2010, from http://www.dfrws.org/2006/proceedings/2-Schuster.pdf.
    • (2006) Digital Investigation , vol.3 , Issue.SUPPL. 3 , pp. 10-16
    • Schuster, A.1
  • 11
    • 82755166618 scopus 로고    scopus 로고
    • PMDump Tool, Retrieved February, 2010, from
    • A. Vidstrom, PMDump Tool, 2007. Retrieved February, 2010, from http://www.ntsecurity.nu/toolbox/pmdump/.
    • (2007)
    • Vidstrom, A.1
  • 14
    • 82755175322 scopus 로고    scopus 로고
    • MSDN. CredEnumerate Function, 2009. Retrieved February,from
    • MSDN. CredEnumerate Function, 2009. Retrieved February, 2010, from http://msdn.microsoft.com/en-us/library/aa374794(VS.85).aspx.
    • (2010)
  • 16
    • 49049096776 scopus 로고    scopus 로고
    • Volatools: Integrating Volatile Memory Forensic into the Digital Investigation Process
    • Retrieved August, 2009, from
    • A. Walters, N. Petroni, Volatools: Integrating Volatile Memory Forensic into the Digital Investigation Process, 2007. Retrieved August, 2009, from http://www.blackhat.com/presentations/bh-dc-07/Walters/Paper/bh-dc-07-Walters-WP.pdf.
    • (2007)
    • Walters, A.1    Petroni, N.2
  • 17
    • 34447541122 scopus 로고    scopus 로고
    • Low Down and Dirty: Anti-forensic Rootkits
    • Retrieved August, 2009, from
    • D. Bilby, Low Down and Dirty: Anti-forensic Rootkits, 2006. Retrieved August, 2009, from http://www.blackhat.com/presentations/bh-jp-06/BH-JP-06-Bilby-up.pdf.
    • (2006)
    • Bilby, D.1
  • 18
    • 82755166613 scopus 로고    scopus 로고
    • He4Hook Rootkit. Retrieved August, from
    • He4Hook Rootkit. Retrieved August, 2009, from http://www.pandasecurity.com/homeusers/security-info/98568/He4Hook.A.
    • (2009)
  • 19
    • 82755175319 scopus 로고    scopus 로고
    • Baiyuanfan. New Thoughts in Ring3 NT Rootkit, Retrieved August, 2009, from
    • Baiyuanfan. New Thoughts in Ring3 NT Rootkit, 2005. Retrieved August, 2009, from http://xcon.xfocus.org/XCon2005/archives/2005/Xcon2005_Baiyuanfan.pdf.
    • (2005)
  • 21
    • 82755185442 scopus 로고    scopus 로고
    • DECAF, January Retrieved February, 2010, from
    • A. Vidstrom, DECAF, January 2010. Retrieved February, 2010, from http://www.decafme.org/.
    • (2010)
    • Vidstrom, A.1
  • 22
    • 82755166615 scopus 로고    scopus 로고
    • InstallSpy v.2.0, Retrieved February, 2010, from
    • M.J. Leaver, InstallSpy v.2.0, 2003. Retrieved February, 2010, from http://www.mjleaver.com/.
    • , vol.2003
    • Leaver, M.J.1
  • 23
    • 82755171493 scopus 로고    scopus 로고
    • Obrut, Retrieved April, 2010, from
    • A.J. Glina, Obrut, 2008. Retrieved April, 2010, from http://www.softpedia.com/get/Tweak/CPU-Tweak/Obrut.shtml.
    • (2008)
    • Glina, A.J.1
  • 24
    • 82755185440 scopus 로고    scopus 로고
    • Microsoft. Computer Online Forensic Evidence Extractor (COFEE), May 2008. Retrieved August, from.
    • Microsoft. Computer Online Forensic Evidence Extractor (COFEE), May 2008. Retrieved August, 2009, from. http://www.microsoft.com/industry/government/news/cofee_faq.mspx.
    • (2008)
  • 25
    • 82755171494 scopus 로고    scopus 로고
    • Guidance. EnCase Portable, May 2009. Retrieved April, from
    • Guidance. EnCase Portable, May 2009. Retrieved April, 2010, from http://www.guidancesoftware.com/encase-portable.htm.
    • (2010)
  • 26
    • 82755175318 scopus 로고    scopus 로고
    • ADF Solutions. Triage Live, May 2009. Retrieved April, from
    • ADF Solutions. Triage Live, May 2009. Retrieved April, 2010, from http://www.adfsolutions.com/.
    • (2010)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.