최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기사물인터넷융복합논문지 = Journal of internet of things and convergence, v.9 no.6, 2023년, pp.23 - 28
송종화 (성균관대학교 과학수사학과) , 이현섭 (백석대학교 컴퓨터공학부)
Windows operating system generates various logs with timestamps. Timestamp tampering is an act of anti-forensics in which a suspect manipulates the timestamps of data related to a crime to conceal traces, making it difficult for analysts to reconstruct the situation of the incident. This can delay i...
K.G.Lee, S.J.Hwang, C.H.Lee and S.J.Lee, "Study on?advanced analysis method based on timeline chart for?Digital Forensic Investigation," Journal of Advanced?Navigation Technology, Vol.18, pp.50-55, 2014.
J.W.Bang, B.Y.Yoo and S.J.Lee, "Analysis of changes in?file time attributes with file manipulation," Digital?Investigation, Vol.7, No.3, pp.135-144, 2011.
G.S.Cho, "A computer forensic method for detecting?timestamp forgery in NTFS," Computers & Security,?Vol.34, pp.36-46, 2013.
G.S.Cho, "A Digital Forensic Method by an Evaluation?Function Based on Timestamp Changing Patterns,"?Journal of the Korea Society of Digital Industry and?Information Management, Vol.10, No.2, pp.91-105,?2014.
D.I.Jang, G.J.Ahn, H.U.Hwang and K.B.Kim, "Understanding?Anti-forensic Techniques with Timestamp Manipulation,"?2016 IEEE 17th International Conference on Information?Reuse and Integration (IRI), pp.609-614, 2016.
H.J.Yoon, "A study on user behavior tracking using?$UsnJrnl," Master's Thesis, Seoul University, 2018.
J.H.Jeong, "A study on document reading and writing?traces through NTFS file system journal file analysis,"?Master's Thesis, Seoul University, 2022.
J.Bouma, H.Jonker, V.Meer and E.Aker, "Reconstructing?Timelines: From NTFS Timestamps to File Histories,"?ARES '23: Proceedings of the 18th International?Conference on Availability, Reliability and Security,?No.154, pp.1-9, 2023.
D.Palmbach and F.Breitinger, "Artifacts for Detecting?Timestamp Manipulation in NTFS on Windows and?Their Reliability," Forensic Science International:?Digital Investigation, Vol.32, Supplement. pp.S1-S9,?2020.
A.Mohamed and C.Khalid, "Detection of Suspicious?Timestamps in NTFS using Volume Shadow Copies,"?International Journal of Computer Network and?Information Security, Vol.13, Issue4, pp.62-69, 2021.
M.Galhuber and R.Luh, "Time for Truth: Forensic?Analysis of NTFS Timestamps," ARES '21: Proceedings?of the 16th International Conference on Availability,?Reliability and Security, No.44, pp.1-10, 2021.
G.S.Cho, "A Digital Forensic Analysis of Timestamp?Change Tools for Windows NTFS," Journal of The?Korea Society of Computer and Information, Vol.24,?No.9, pp.51-58, 2019.
S.H.Lee, Y.H.Lee and S.J.Lee, "A study on the Evidence?Investigation of Forged/Modulated Time-Stamp at?iOS(iPhone, iPad)," KIPS Transactions on Computer?and Communication Systems, Vol.5, No.7,?pp.173-180, 2016.
A.Mohamed and C.Khalid, "Detection of Timestamps?Tampering in NTFS using Machine Learning," Procedia?Computer Science, Vol.160, pp.778-784, 2019.
S.Neuner, A.G.Voyiatzis, M.Schmiedecker, S.Brunthaler,?S.Katzenbeisser and E.R.Weippl, "Time is on my side:?Steganography in filesystem metadata," Digital?Investigation, Vol.18, Supplement7, pp.76-86, 2016.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.