An Integrated Open Forensic Environment for Digital Evidence Investigation

来源 :第六届中国可信计算与信息安全学术会议 | 被引量 : 0次 | 上传用户:mzt1989
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Nowadays,the capability of traditional digital forensic tools fails to meet the demand of ever increasing of criminal or civil cases.One of the challenges is that digital devices and applications are multifarious and changing quickly.Here,we propose a new mode for digital forensic tools utilization via integrating open-source single tools into a platform and setting up into Live DVD/USB.The platform,an Integrated Open Forensic Environment (named IOFE),takes full advantage of these tools and,at the same time,elevates its power and interoperability via standardized input/output data.The IOFE features conducting live and dead investigation and covers three consecutive major phases of digital forensics:acquisition,analysis,and presentation.Our experiments prove that IOFE can carry out manifold acquisition,interpretation,analysis,and presentation task ofevidentiary data in an efficient and effective manner.
其他文献
  For the issue of the discretionary access control (DAC) model safety analysis,a logic method is proposed.This method takes the GD model as the classic DAC m
会议
依托三级网全面推动计免工作郑树槐,刘喜(河北省唐山市卫生局063000)我市的计划免疫工作,在广大卫生防疫人员的辛勤努力下,以农村三级预防保健网为依托,坚持"预防为主"的方针,经过多年的实践
人生在世,走过的路有千万条。每个人都有每个人的脚印,或深或浅,或直或弯,或明或暗……当刘晓伟在漫漫人生路上跋涉过47个年头,蓦然回首时,身后印着一串坚实的足迹,让她聊以
  End hopping is one of the good methods to defend against network attack,but has problems with network address translation (NAT) because packets sent from an
会议
  A new authentication algorithm for grid identity trusted computing unlimited by hardware is presented;the trusted root is made as an image data.The grid ent
会议
  This paper contributes to the stability of linear complexity of a binary periodic Jaeobi sequence.By employing a pair of reference sequences,we prove that t
会议
■净化器业务发展空间十分巨大■电控VE泵领域威孚金宁难觅对手■博世DS逐步复苏甚至出现供不应求局面■当前股价:11.61元■今日投资个股安全诊断星级:★★★★ ■ purifier
  Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure enough.Th
会议
  Security testing is a key technology for software security.The testing results can reflect the relationship between Software testing and software security,a
会议
平罗县地处宁夏北端,是一农业人口大县。我们于1992年10月中旬对120户农民进行了营养膳食调查。 一、对象和方法 1.对象:采用1992年全国营养调查抽样方法,确定具有代表性的