메뉴 건너뛰기




Volumn , Issue , 2011, Pages 93-106

Forensic triage for mobile phones with decode

Author keywords

[No Author keywords available]

Indexed keywords

DIGITAL FORENSICS; DIGITAL STORAGE; DYNAMIC PROGRAMMING;

EID: 84864601404     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (34)

References (25)
  • 1
    • 74049095923 scopus 로고    scopus 로고
    • Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering
    • J. Caballero, P. Poosankam, C. Kreibich, and D. Song. Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering. In ACM Proc. CCS, pages 621-634, 2009.
    • (2009) ACM Proc. CCS , pp. 621-634
    • Caballero, J.1    Poosankam, P.2    Kreibich, C.3    Song, D.4
  • 2
    • 77952403312 scopus 로고    scopus 로고
    • Polyglot: Automatic extraction of protocol message format using dynamic binary analysis
    • J. Caballero, H. Yin, Z. Liang, and D. Song. Polyglot: Automatic extraction of protocol message format using dynamic binary analysis. In ACM Proc. CCS, pages 317-329, 2007.
    • (2007) ACM Proc. CCS , pp. 317-329
    • Caballero, J.1    Yin, H.2    Liang, Z.3    Song, D.4
  • 3
    • 84953724298 scopus 로고    scopus 로고
    • Computer Crime and Intellectual Property Section, U.S. Department of Justice, August
    • Computer Crime and Intellectual Property Section, U.S. Department of Justice. Retention Periods of Major Cellular Service Providers. http://dgsearch.no-ip. biz/rnrfiles/retention.pdf, August 2010.
    • (2010) Retention Periods of Major Cellular Service Providers
  • 5
    • 84893143817 scopus 로고    scopus 로고
    • Discoverer: Automatic protocol reverse engineering from network traces
    • W. Cui, J. Kannan, and H. J. Wang. Discoverer: Automatic protocol reverse engineering from network traces. In USENIX Security Symp, pages 1-14, 2007.
    • (2007) USENIX Security Symp , pp. 1-14
    • Cui, W.1    Kannan, J.2    Wang, H.J.3
  • 7
    • 57149123931 scopus 로고    scopus 로고
    • LearnPADS: Automatic tool generation from ad hoc data
    • K. Fisher, D. Walker, and K. Q. Zhu. LearnPADS: Automatic tool generation from ad hoc data. In Proc. ACM SIGMOD, pages 1299-1302, 2008.
    • (2008) Proc. ACM SIGMOD , pp. 1299-1302
    • Fisher, K.1    Walker, D.2    Zhu, K.Q.3
  • 8
    • 67650156091 scopus 로고    scopus 로고
    • From dirt to shovels: Fully automatic tool generation from ad hoc data
    • K. Fisher, D. Walker, K. Q. Zhu, and P. White. From dirt to shovels: Fully automatic tool generation from ad hoc data. In Proc. ACM POPL, pages 421-434, 2008.
    • (2008) Proc. ACM POPL , pp. 421-434
    • Fisher, K.1    Walker, D.2    Zhu, K.Q.3    White, P.4
  • 11
    • 77952112123 scopus 로고    scopus 로고
    • The forensic use of mobile phone flasher boxes
    • May
    • K. Jonkers. The forensic use of mobile phone flasher boxes. Digital Investigation, 6(3-4):168-178, May 2010.
    • (2010) Digital Investigation , vol.6 , Issue.3-4 , pp. 168-178
    • Jonkers, K.1
  • 13
    • 0022030599 scopus 로고
    • Efficient randomized patternmatching algorithms
    • March
    • R. Karp and M. Rabin. Efficient randomized patternmatching algorithms. IBM J. Res. Dev., 31(2):249-260, March 1987.
    • (1987) IBM J. Res. Dev. , vol.31 , Issue.2 , pp. 249-260
    • Karp, R.1    Rabin, M.2
  • 14
    • 34249334041 scopus 로고
    • Inference of letter-phoneme correspondences by delimiting and dynamic time warping techniques
    • Mar.
    • R. Luk and R. Damper. Inference of letter-phoneme correspondences by delimiting and dynamic time warping techniques. In IEEE Intl Conf on Acoustics, Speech, and Signal Processing, volume 2, pages 61-64, Mar. 1992.
    • (1992) IEEE Intl Conf on Acoustics, Speech, and Signal Processing , vol.2 , pp. 61-64
    • Luk, R.1    Damper, R.2
  • 16
    • 77952101825 scopus 로고    scopus 로고
    • The growing need for on-scene triage of mobile devices
    • R. P. Mislan, E. Casey, and G. C. Kessler. The growing need for on-scene triage of mobile devices. Digital Investigation, 6(3-4):112-124, 2010.
    • (2010) Digital Investigation , vol.6 , Issue.3-4 , pp. 112-124
    • Mislan, R.P.1    Casey, E.2    Kessler, G.C.3
  • 17
    • 17844382217 scopus 로고    scopus 로고
    • National Gang Intelligence Center, Technical Report Document ID: 2009-M0335-001, US Dept. of Justice, Jan
    • National Gang Intelligence Center. National Gang Threat Assessment 2009. Technical Report Document ID: 2009-M0335-001, US Dept. of Justice, http://www.usdoj. gov/ndic/pubs32/32146, Jan 2009.
    • (2009) National Gang Threat Assessment 2009
  • 18
    • 85032750978 scopus 로고    scopus 로고
    • The evolution of file carving
    • March
    • A. Pal and N. Memon. The evolution of file carving. Signal Processing Magazine, IEEE, 26(2):59 -71, March 2009.
    • (2009) Signal Processing Magazine, IEEE , vol.26 , Issue.2 , pp. 59-71
    • Pal, A.1    Memon, N.2
  • 19
    • 48749129422 scopus 로고    scopus 로고
    • Detecting file fragmentation point using sequential hypothesis testing
    • A. Pal, H. T. Sencar, and N. Memon. Detecting file fragmentation point using sequential hypothesis testing. Digital Investigation, 5(S1):2-13, 2008.
    • (2008) Digital Investigation , vol.5 , Issue.S1 , pp. 2-13
    • Pal, A.1    Sencar, H.T.2    Memon, N.3
  • 24
    • 84935113569 scopus 로고
    • Error bounds for convolutional codes and an asymptotically optimum decoding algorithm
    • April
    • A. Viterbi. Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. IEEE Transactions on Information Theory, 13(2):260-269, April 1967.
    • (1967) IEEE Transactions on Information Theory , vol.13 , Issue.2 , pp. 260-269
    • Viterbi, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.