메뉴 건너뛰기




Volumn 9, Issue SUPPL., 2012, Pages

Lessons learned writing digital forensics tools and managing a 30TB digital evidence corpus

Author keywords

Digital corpora; Digital forensics; Lessons learned

Indexed keywords

ELECTRONIC CRIME COUNTERMEASURES; SOFTWARE TESTING;

EID: 84864614764     PISSN: 17422876     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.diin.2012.05.002     Document Type: Conference Paper
Times cited : (36)

References (38)
  • 1
    • 84864587198 scopus 로고    scopus 로고
    • Access Data
    • Access Data FTK imager 2011
    • (2011) FTK Imager
  • 4
    • 84864600413 scopus 로고    scopus 로고
    • Confronting encryption in computer investigations: Practical lessons
    • Casey E. Confronting encryption in computer investigations: practical lessons. In: Proceedings of the 2002 DFRWS conference; 2002.
    • (2002) Proceedings of the 2002 DFRWS Conference
    • Casey, E.1
  • 5
    • 84868581192 scopus 로고    scopus 로고
    • Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow
    • Elsevier Montreal, Canada
    • M.I. Cohen, S. Garfinkel, and B. Schatz Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information and forensic workflow Proceedings of DFRWS 2009 2009 Elsevier Montreal, Canada
    • (2009) Proceedings of DFRWS 2009
    • Cohen, M.I.1    Garfinkel, S.2    Schatz, B.3
  • 11
    • 84868552267 scopus 로고    scopus 로고
    • Using purpose-built functions and block hashes to enable small block and sub-file forensics
    • Elsevier Portland, OR
    • S. Garfinkel, A. Nelson, D. White, and V. Roussev Using purpose-built functions and block hashes to enable small block and sub-file forensics Proc. of the tenth annual DFRWS conference 2010 Elsevier Portland, OR
    • (2010) Proc. of the Tenth Annual DFRWS Conference
    • Garfinkel, S.1    Nelson, A.2    White, D.3    Roussev, V.4
  • 15
    • 68649124680 scopus 로고    scopus 로고
    • Providing cryptographic security and evidentiary chain-of-custody with the advanced forensic format, library, and tools
    • S.L. Garfinkel Providing cryptographic security and evidentiary chain-of-custody with the advanced forensic format, library, and tools The International Journal of Digital Crime and Forensics 1 2009 1 28
    • (2009) The International Journal of Digital Crime and Forensics , vol.1 , pp. 1-28
    • Garfinkel, S.L.1
  • 18
    • 84857916463 scopus 로고    scopus 로고
    • [accessed 03.12.11]
    • C. Grenier Photorec 2011 http://www.cgsecurity.org/wiki/PhotoRec [accessed 03.12.11]
    • (2011) Photorec
    • Grenier, C.1
  • 22
  • 25
    • 80052453476 scopus 로고    scopus 로고
    • Before the verdict and beyond the verdict: The CSI infection within modern criminal jury trials
    • T.F. Lawson Before the verdict and beyond the verdict: the CSI infection within modern criminal jury trials Loyola University Chicago Law Journal 41 1 2009
    • (2009) Loyola University Chicago Law Journal , vol.41 , Issue.1
    • Lawson, T.F.1
  • 26
    • 68649126176 scopus 로고    scopus 로고
    • [accessed 03.12.11]
    • J. Metz libewf: project info 2008 http://sourceforge.net/projects/libewf/ [accessed 03.12.11]
    • (2008) Libewf: Project Info
    • Metz, J.1
  • 27
    • 84864600414 scopus 로고    scopus 로고
    • RegXML: XML conversion of the Windows Registry for forensic processing and distribution
    • Chow KP, Shenoi S, editors in press. Springer; IFIP Advances in Information and Communication Technology
    • Nelson AJ. RegXML: XML conversion of the Windows Registry for forensic processing and distribution. In: Chow KP, Shenoi S, editors. Advances in digital forensics VIII, in press. Springer; IFIP Advances in Information and Communication Technology; 2012.
    • (2012) Advances in Digital Forensics VIII
    • Nelson, A.J.1
  • 30
    • 68549094604 scopus 로고    scopus 로고
    • The 'CSI Effect': Does it really exist?
    • D.E. Shelton The 'CSI Effect': does it really exist? NIJ Journal 259 2008
    • (2008) NIJ Journal , vol.259
    • Shelton, D.E.1
  • 32
    • 0003570191 scopus 로고    scopus 로고
    • Technical Report TR-CS-96-05; ANU Computer Science Technical Reports
    • A. Tridgell, and P. Mackerras The rsync algorithm Technical Report TR-CS-96-05; ANU Computer Science Technical Reports 1996
    • (1996) The Rsync Algorithm
    • Tridgell, A.1    MacKerras, P.2
  • 33
  • 34
    • 42349086405 scopus 로고
    • US Supreme Court 486 US 35
    • US Supreme Court California v. Greenwood 1988 486 US 35
    • (1988) California V. Greenwood
  • 35
    • 84864623153 scopus 로고    scopus 로고
    • Voncken G. Guymanager; 2012. http://guymager.sourceforge.net/.
    • (2012)
    • Guymanager, V.G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.