期刊文献+

文件系统取证分析技术及其发展趋势 被引量:1

The Review of File System Forensic Techniques
下载PDF
导出
摘要 文件系统取证是数字犯罪取证调查领域重要技术之一。文章首先分析了文件系统取证层次模型。然后根据该模型,分析了文件系统类取证技术、元数据类取证技术、内容类取证技术以及文件名类取证技术等,以及相应技术的关键算法流程,结合当前研究热点,分析了文件系统取证分析技术的发展趋势。 Now file system forensic techniques have been one of important research topics in digital forensics. The forensic model of file system forensics is discussed. Then we analyze the art of state of file system forensic research in the terms of file system, meta data, content, and file name. Finally developing trend and important research topics of file system forensics are discussed in conjunction with conclusion.
出处 《信息网络安全》 2013年第4期84-86,共3页 Netinfo Security
基金 国家自然科学基金资助项目[60903220] 郑州市科技攻关项目"基于内存及存储介质的网络取证调查系统"
关键词 文件系统 FAT取证 NTFS取证 文件雕刻 file system forensics FAT structure NTFS structure file carving
  • 相关文献

参考文献13

  • 1Brain D. Carrier. Different interpretations of ISSO9660 file systems[J], Digital Investigation, 2010, 7: 29-34. 被引量:1
  • 2Knut Eckstein, Marko Jahnke. Data Hiding in Journaling File Systems[C]. 2005 Digital Forensic Research Workshop(DFRWS), 2005,1-8. 被引量:1
  • 3Aaron Burghardt, Adam J. Feldman. Using the HFS+ journal for deleted file recovery[J]. Digital Investigation, 2008, 5: 76-82. 被引量:1
  • 4K.P.Chow, Frank Y.W.Law, Michael Y.K.Kwan, Pierre K.Y.Lai. The Rule of Time on NTFS File SystemiC]. Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering(SADFE' 07), 2007: 1-15. 被引量:1
  • 5Sitaraman S., Venkatesan S. Forensic Analysis of file system intrusions using improved backtracking[C]. Third IEEE International Workshop on Information Assurance, 2005: 154-163. 被引量:1
  • 6Brian Carrier. File System Forensic Analysis[M]. Addison Wesley, 2005. 被引量:1
  • 7TCT(The Coroner's Toolkit)[EB/OL]. http://www.porcupine.org / forensics/tct.htrnl, 2012. 被引量:1
  • 8TSKit (The Sleuth Kit)[EB/OL]. http://www.sleuthkit.org/, 2013. 被引量:1
  • 9New Technology Inc. SafeBack6.0, http://www.forensics-intl. com/,2013,. 被引量:1
  • 10Nasir Memon, Anandabrata Pal. Atuomated Reassembly of File Fragmented Images Using Greedy Algorithms[J]. IEEE TRANSACTIONS ON IMAGE PROCESSING, 2006, 15(02): 385-392. 被引量:1

二级参考文献10

  • 1Trusted Computing Group. TCG Specification Architecture Overview [EB/OL]. [2006-04-28]. http://www. trustedcom putinggroup.org/ downloads/ TCG_1_0_Architecture_Overview.pdf. 被引量:1
  • 2Mellars B. Forensic Examination of Mobile Phones[J]. Digital Investigation (Elsevier), 2004, 1 (1):266-272. 被引量:1
  • 3Carrier B, Spafford E. Categories of Digital Investigation Analysis Techniques Based on the Computer History Model [J]. Digital Investigation ( Elsevier),2006,3(2):121-130. 被引量:1
  • 4Palmer G. A Road Map for Digital Forensics Research, Report from the First Digital Forensics Research Workshop (DFRWS) [[R]. Washington: Air Force Research Laboratory, 2001. 被引量:1
  • 5Giordano J, Maciag C. Cyber Forensics: A Military Operations Perspective [J]. International Journal of Digital Evidence, 2002,1 (2) :72-84. 被引量:1
  • 6Reith M,Carr C, Bunch G. An Examination of Digital Forensic Models[J]. International Journal of Digital Evidence, 2002,1 (3):40-51. 被引量:1
  • 7Mason S. Trusted Computing and Forensic Investigations[J]. Digital Investigation (Elsevier), 2005, 2(2):189-192. 被引量:1
  • 8Carrier B. File Systems and Forensics Analysis[M].Boston: Addison-Wesley Professional, 2005. 被引量:1
  • 9李炳龙 王清贤 罗军勇 等.文档碎片分类模型及其关键问题[J].哈尔滨工业大学学报,2006,38:834-834. 被引量:5
  • 10余发江,张焕国.可信安全计算平台的一种实现[J].武汉大学学报(理学版),2004,50(1):69-73. 被引量:22

共引文献11

同被引文献12

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部