메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1-7

Anti-forensics and the digital investigator

Author keywords

Anti forensics; Artefact wiping; Attacks on computer forensics tools; Data hiding; Privacy; Trail obfuscation

Indexed keywords

ANTI-FORENSICS; ARTEFACT WIPING; COMPUTER FORENSICS TOOLS; DATA HIDING; TRAIL OBFUSCATION;

EID: 84867717801     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (52)

References (23)
  • 1
    • 2642563293 scopus 로고    scopus 로고
    • Thesis presented to the Edwards S. Rogers Sr. Graduate Department of Electrical and Computer Engineering, University of Toronto, Toronto, Ontario. Retrieved September 11, 2007, from
    • Ahsan, K. (2002). Covert Channel Analysis and Data Hiding in TCP/IP. Thesis presented to the Edwards S. Rogers Sr. Graduate Department of Electrical and Computer Engineering, University of Toronto, Toronto, Ontario. Retrieved September 11, 2007, from http://gray-world.net/papers/ahsan02.pdf.
    • (2002) Covert Channel Analysis and Data Hiding in TCP/IP
    • Ahsan, K.1
  • 2
    • 84867723779 scopus 로고    scopus 로고
    • Retrieved September 11, 2007
    • Akin, T. (2003). WebMail Forensics. BlackHat Briefings. Retrieved September 11, 2007, from http://www.blackhat.com/presentations/bh-usa-03/bh-us- 03-akin.pdf.
    • (2003) WebMail Forensics
    • Akin, T.1
  • 3
    • 84867704426 scopus 로고    scopus 로고
    • Identifying non-volatile data storage areas: Unique notebook identification information as digital evidence
    • Budimir, N., & Slay, J. (2007). Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information as Digital Evidence. Journal of Digital Forensics, Security and Law, 2(1), 75-91.
    • (2007) Journal of Digital Forensics, Security and Law , vol.2 , Issue.1 , pp. 75-91
    • Budimir, N.1    Slay, J.2
  • 6
    • 84867709353 scopus 로고    scopus 로고
    • Electronic Frontier Foundation (EFF), September 18, page. Retrieved September 18, 2007
    • Electronic Frontier Foundation (EFF). (2007, September 18). Tor Web page. Retrieved September 18, 2007, from http://tor.eff.org/index.html.en.
    • (2007) Tor Web
  • 7
    • 84867706365 scopus 로고    scopus 로고
    • Analyzing the difficulties in backtracking the onion router's traffic
    • (August), Retrieved September 11, 2007
    • Forte, D. (2002, August). Analyzing the Difficulties in Backtracking the Onion Router's Traffic. Proceedings of the 2002 Digital Forensics Research Workshop. Retrieved September 11, 2007, from https://www.dfrws.org/2002/papers/ Papers/Dario-Forte.pdf.
    • (2002) Proceedings of the 2002 Digital Forensics Research Workshop
    • Forte, D.1
  • 8
    • 85008016160 scopus 로고    scopus 로고
    • Scrubbing stubborn data: An evaluation of counter- forensic privacy tools
    • September/October
    • Geiger, M., & Cranor, L.F. (2006, September/October). Scrubbing Stubborn Data: An Evaluation of Counter- Forensic Privacy Tools. IEEE Security & Privacy, 4(5), 16-25.
    • (2006) IEEE Security & Privacy , vol.4 , Issue.5 , pp. 16-25
    • Geiger, M.1    Cranor, L.F.2
  • 9
    • 84867730623 scopus 로고    scopus 로고
    • Guidance Software. (July 26). Retrieved September 11, 2007
    • Guidance Software. (2007, July 26). Guidance Software Response to iSEC Report. Retrieved September 11, 2007, from http://www.securityfocus.com/archive/ 1/474727.
    • (2007) Guidance Software Response to ISEC Report
  • 10
    • 33745977740 scopus 로고    scopus 로고
    • Arriving at an anti-forensics consensus: Examining how to define and control the anti- forensics problem
    • Retrieved September 11, 2007, from
    • Harris, R. (2006). Arriving at an Anti-Forensics Consensus: Examining How to Define and Control the Anti- Forensics Problem. Proceedings of the 2006 Digital Forensics Research Workshop. Digital Investigation, 3(S), S44-S49. Retrieved September 11, 2007, from http://dfrws.org/2006/proceedings/6-Harris. pdf.
    • (2006) Proceedings of the 2006 Digital Forensics Research Workshop. Digital Investigation , vol.3 , Issue.S
    • Harris, R.1
  • 11
    • 33847675252 scopus 로고    scopus 로고
    • An overview of steganography for the computer forensics examiner
    • July, Retrieved September 11, 2007
    • Kessler, G.C. (2004, July). An Overview of Steganography for the Computer Forensics Examiner. Forensics Science Communication, 6(3). Retrieved September 11, 2007, from http://www.fbi.gov/hq/lab/fsc/backissu/july2004/research/2004-03- research01.htm.
    • (2004) Forensics Science Communication , vol.6 , Issue.3
    • Kessler, G.C.1
  • 12
    • 0012360563 scopus 로고    scopus 로고
    • Denial of service attacks
    • M. Kabay & S. Bosworth (Eds.), 4th ed. New York: John Wiley & Sons
    • Levine, D.E., & Kessler, G.C. (2002). Denial of Service Attacks. In M. Kabay & S. Bosworth (Eds.), Computer Security Handbook, 4th ed. New York: John Wiley & Sons.
    • (2002) Computer Security Handbook
    • Levine, D.E.1    Kessler, G.C.2
  • 13
    • 80052988326 scopus 로고    scopus 로고
    • Bleeding-edge anti-forensics
    • April 3, Presentation at, Retrieved September 11, 2007, from stachliu.com/files/InfoSecWorld-2006-K2-Bleeding-Edge- AntiForensics.ppt
    • Liu, V., & Brown, F. (2006, April 3). Bleeding-Edge Anti-Forensics. Presentation at InfoSec World 2006. Retrieved September 11, 2007, from stachliu.com/files/InfoSecWorld-2006-K2-Bleeding-Edge- AntiForensics.ppt.
    • (2006) InfoSec World 2006
    • Liu, V.1    Brown, F.2
  • 14
    • 84867709356 scopus 로고    scopus 로고
    • Retrieved September 11, 2007
    • Metasploit LLC. (2007a). Metasploit Anti-forensics home page. Retrieved September 11, 2007, from http://www.metasploit.com/projects/antiforensics/).
    • (2007) Metasploit Anti-forensics Home Page
  • 15
    • 84867739277 scopus 로고    scopus 로고
    • Retrieved September 11, 2007
    • Metasploit LLC. (2007b). Metasploit Project home page. Retrieved September 11, 2007, from http://www.metasploit.com/.
    • (2007) Metasploit Project Home Page
  • 16
    • 84867704423 scopus 로고    scopus 로고
    • Breaking forensics software: Weaknesses in critical evidence collection
    • August 1, Retrieved September 11, 2007
    • Palmer, C., Newsham, T., Stamos, A., & Ridder, C. (2007, August 1). Breaking Forensics Software: Weaknesses in Critical Evidence Collection. Abstract of presentation at Black Hat USA 2007. Retrieved September 11, 2007, from http://www.blackhat.com/html/bh-usa-07/bh-usa-07-speakers.html#Palmer.
    • (2007) Abstract of Presentation at Black Hat USA 2007
    • Palmer, C.1    Newsham, T.2    Stamos, A.3    Ridder, C.4
  • 19
    • 0012054514 scopus 로고    scopus 로고
    • May 5, First Monday, Retrieved September 11, 2007
    • Rowland, C.H. (1997, May 5). Covert Channels in the TCP/IP Protocol Suite. First Monday, 2(5). Retrieved September 11, 2007, from http://www.firstmonday.org/issues/issue2-5/rowland/.
    • (1997) Covert Channels in the TCP/IP Protocol Suite , vol.2 , Issue.5
    • Rowland, C.H.1
  • 21
    • 84867724321 scopus 로고    scopus 로고
    • Stego Archive Website. Retrieved September 11, 2007
    • StegoArchive.com. (2005). Stego Archive Website. Retrieved September 11, 2007, from http://www.stegoarchive.com.
    • (2005) StegoArchive.com
  • 22
    • 0005078193 scopus 로고
    • Supreme Court of the United States, 509 U.S. 579. Retrieved September 11, 2007
    • Supreme Court of the United States. (1993). Daubert v. Merrell Dow Pharmaceuticals (92-102), 509 U.S. 579. Retrieved September 11, 2007, from http://supct.law.cornell.edu/supct/html/92-102.ZS.html.
    • (1993) Daubert v. Merrell Dow Pharmaceuticals , pp. 92-102
  • 23
    • 65349154365 scopus 로고    scopus 로고
    • Digital evidence: Challenging the presumption of reliability
    • March
    • Van Buskirk, E., & Liu, V.T. (2006, March). Digital Evidence: Challenging the Presumption of Reliability. Journal of Digital Forensic Practice, 1(1), 19-26.
    • (2006) Journal of Digital Forensic Practice , vol.1 , Issue.1 , pp. 19-26
    • Van Buskirk, E.1    Liu, V.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.