메뉴 건너뛰기




Volumn 4, Issue 2-3, 2012, Pages 154-163

A framework for password harvesting from volatile memory

Author keywords

Data recovery; Memory forensics; Order of volatility

Indexed keywords

AUTHENTICATION;

EID: 84864669524     PISSN: 1751911X     EISSN: 17519128     Source Type: Journal    
DOI: 10.1504/IJESDF.2012.048411     Document Type: Article
Times cited : (5)

References (12)
  • 2
    • 33745211604 scopus 로고    scopus 로고
    • Live forensics: Diagnosing your system without killing it first
    • Adlestein, F. (2006) 'Live forensics: diagnosing your system without killing it first'. Communications of the ACM, Vol. 49, No. 2, pp.63-66.
    • (2006) Communications of the ACM , vol.49 , Issue.2 , pp. 63-66
    • Adlestein, F.1
  • 3
    • 33746021102 scopus 로고    scopus 로고
    • Categories of digital investigation analysis techniques based on the computer history model
    • DOI 10.1016/j.diin.2006.06.011, PII S1742287606000739
    • Carrier, B. and Spafford, E. (2006) 'Categories of digital investigation analysis techniques based on the computer history model', Digital Investigation, Vol. 3S, pp.121-130. (Pubitemid 44066911)
    • (2006) Digital Investigation , vol.3 , Issue.SUPPL. , pp. 121-130
    • Carrier, B.D.1    Spafford, E.H.2
  • 5
    • 34447513980 scopus 로고    scopus 로고
    • Carving contiguous and fragmented files with fast object validation
    • DOI 10.1016/j.diin.2007.06.017, PII S1742287607000369
    • Garfinkel, S. (2007) 'Carving contiguous and fragmented files with fast object validation', Digital Investigation, Supplement, Vol. 4, pp.2-12. (Pubitemid 47081435)
    • (2007) Digital Investigation , vol.4 , Issue.SUPPL. , pp. 2-12
    • Garfinkel, S.L.1
  • 6
    • 48749098660 scopus 로고    scopus 로고
    • Forensic analysis of the Windows registry in memory
    • Gavitt, B. (2008) 'Forensic analysis of the Windows registry in memory', Digital Investigation, Supplement, Vol. 5, pp.26-32.
    • (2008) Digital Investigation, Supplement , vol.5 , pp. 26-32
    • Gavitt, B.1
  • 7
    • 0004610703 scopus 로고    scopus 로고
    • Secure deletion of data from magnetic and solid-state memory
    • San Jose, California, 22-25 July
    • Gutmann, P. (1996) 'Secure deletion of data from magnetic and solid-state memory', Sixth USENIX Security Symposium, San Jose, California, 22-25 July, pp.77-89.
    • (1996) Sixth USENIX Security Symposium , pp. 77-89
    • Gutmann, P.1
  • 8
    • 85084163443 scopus 로고    scopus 로고
    • Data remanence in semiconductor devices
    • Gutmann, P. (2001) 'Data remanence in semiconductor devices', 10th USENIX Security Symposium, pp.39-54.
    • (2001) 10th USENIX Security Symposium , pp. 39-54
    • Gutmann, P.1
  • 10
    • 72449162905 scopus 로고    scopus 로고
    • National Institute of Justice (NIJ), 2nd ed., (accessed on 20 June 2011)
    • National Institute of Justice (NIJ) (2008) Electronic Crime Scene Investigation: A Guide for First Responders, 2nd ed., available at http://www.ncjrs.gov/pdffiles1/nij/ 219941.pdf (accessed on 20 June 2011).
    • (2008) Electronic Crime Scene Investigation: A Guide for First Responders


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.