최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Digital investigation, v.3 no.4, 2006년, pp.211 - 226
Huebner, Ewa (University of Western Sydney, Australia) , Bem, Derek (University of Western Sydney, Australia) , Wee, Cheong Kai (Edith Cowan University, Perth, Western Australia, Australia)
AbstractIn this paper we examine the methods of hiding data in the NTFS file system. Further we discuss the analysis techniques which can be applied to detect and recover data hidden using each of these methods. We focus on sophisticated data hiding where the goal is to prevent detection by forensic...
Bem 2006 Alternate data streams in forensic investigations of file systems backups
Carrier 2005 File system forensic analysis
Carrier B. The Sleuth Kit. Available from: http://www.sleuthkit.org/sleuthkit/desc.php.
Carvey 2004 Data hiding on a live system
Carvey 2004 Windows forensics and incident recovery
Chuvakin
Eckstein 2005 5th annual digital forensic research workshop Data hiding in journaling file systems
Farmer 2005 Forensic discovery
Foremost, <http://foremost.sourceforge.net/>.
How NTFS Works, Windows Server 2003 Technical Reference. Available from: http://www.microsoft.com/technet/prodtechnol/windowsserver2003/library/TechRef/8cc5891d-bf8e-4164-862d-dac5418c5948.mspx.
Incident handling/forensics FAQs. <http://www.paladion.net/papers/ihfaq.htm#hidden_data>.
Kruse 2002 Computer forensics: incident response essentials
Li
Mallery
Means
Metasploit Anti-forensics Project Slacker; 2006. Available from: http://www.metasploit.com/projects/antiforensics/.
Microsoft OEM support tools. <http://support/microsoft/com/support/kb/articles>.
Mikhailov D. NTFS file system. Available from: http://www.digit-life.com/articles/ntfs/.
NTI. File slack defined. <http://www.forensics-intl.com/def6.html>.
Provos N, Honeyman P. Detecting steganographic content on the internet. p. 13.
Runtime's DiskExplorer for NTFS. <http://www.runtime.org/diskexpl.htm>.
Russinovich 2005 Microsoft Windows internals
Russon R, Fledel Y. NTFS documentation. Available from: http://www.linux-ntfs.org/content/view/103/42/. p. 138.
Schindler J, Griffin JL, Lumb CR, Ganger GR. Track-aligned extents: matching access patterns to disk drive characteristics. In: Conference on file and storage technologies (FAST). Monterey, CA, USA; 2002. p. 16.
Svensson 2005 Information and communication system security Computer forensics applied to Windows NTFS computers
The data fork and the resource fork, inside macintosh: more macintosh toolbox; 1996. Available from: http://developer.apple.com/documentation/mac/MoreToolbox/MoreToolbox-11.html.
X-Ways Forensics. <http://www.x-ways.net/forensics/>.
Zadjmool 2004 WindowSecurity.com Hidden threat: alternate data streams
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.