[an error occurred while processing this directive]
  中文 | English    
        首页 |  期刊介绍 |  编 委 会 |  投稿指南 |  期刊订阅 |  收录情况 |  常见问题解答 |  联系我们 |  留言板
上海交通大学学报(自然版) 2012, Vol. 46 Issue (02) :276-279    DOI:
自动化技术、计算机技术 最新目录 | 下期目录 | 过刊浏览 | 高级检索 << | >>
(高雄师范大学 教育学院,台湾 高雄 802)
Research and Development of Digital Forensics Platforms
 YANG  Zhong-Huang
(School of Education, Kaohsiung Normal University, Taiwan Kaohsiung 802)
Download: PDF (0KB)   HTML (1KB)   Export: BibTeX or EndNote (RIS)      Supporting Info
摘要 面对高科技的犯罪案件,取证人员已无法采用传统的方式采集完整的数字证据,须藉由取证工具的辅助以收集与分析数字证据,用科学的方法产生取证报告. 文中探讨计算机取证与手机取证的技术与工具,并自行设计与开发相关的取证雏型系统. 已开发完成的取证系统可以收集Windows/Linux计算机与Android手机数字证据,进行系统分析,且可尝试还原删除的信息并找出与案件相关的犯罪证据.
Email Alert
关键词数字取证   计算机取证   手机取证   计算机犯罪   网络犯罪     
Abstract: Number of cyber crime increases dramatically these days and there are rapid progress on computer and smartphone systems, therefore, forensic investigators have been facing the difficulty of admissibility of digital evidence. To solve this problem, this paper
developed forensic techniques and tools to collect digital evidence for computer systems and Android mobile devices.
Forensics were carried out on both Windows and Linux systems to ensure judicial review of the evidence on the effectiveness of digital evidence with credibility.
Keywordsdigital forensics,   computer forensics,   mobile phone forensics,   computer crimes,   cyber crimes     
收稿日期: 2011-10-16;
杨中皇 . 数字取证平台技术的研发[J]. 上海交通大学学报(自然版), 2012,V46(02): 276-279
YANG Zhong-Huang . Research and Development of Digital Forensics Platforms[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2012,V46(02): 276-279.
http://xuebao.sjtu.edu.cn/CN/      或     http://xuebao.sjtu.edu.cn/CN/Y2012/V46/I02/276
[1] Bates J. Fundamentals of computer forensics [J]. Information Security Technical Report, 1998, 3(4):7578.
[2] Casey E. Handbook of digital forensics and investigation [M]. Burlington, Mass. USA: Academic Press, 2010.
[3] Volonino L, Anzaldua R, Godwin J, et al. Computer forensics: Principles and practice [M]. Upper Saddle River, New Jersey, USA: Prentice Hall, 2006.
[4] Jones A, Valli C. Building a digital forensic laboratory [M]. Burlington, Massachusetts, USA: Elsevier, Inc, 2009.
[5] Halderman J, Schoen S, Heninger A, et al. Lest we remember  Cold boot attacks on encryption
[6] keys [C]// van Oorschot P. Proceedings of the 17th
[7] USENIX Security Symposium. San Jose, California, USA: USENIX Association, 2008: 4560.
[8] Garber L. EnCase: A case study in computerforensic technology [J]. IEEE Computer, 2001, 34(1): 202205.
[9] Negus C. Live Linux CDs: Building and customizing bootable [M]. Upper Saddle River, New Jersey, USA: Prentice Hall, 2007.
[10] Pogue C, Altheide C, Haverkos T. UNIX and Linux forensic analysis DVD toolkit [M]. Burlington, Mass. USA: Syngress Publishing, 2008.
[11] Adelstein F. Live forensics: Diagnosing your system without killing it first [J]. Communications of the ACM, 2006, 49(2): 6366.
[12] Dang Q. SP 800107: Recommendation for applications using approved hash algorithms [R]. Gaithersburg, Maryland, USA: National Institute of Standards and Technology, 2009.
[13] Jansen W, Ayers R. SP 800101: Guidelines on cell phone forensics [R]. Gaithersburg, Maryland, USA: National Institute of Standards and Technology, 2007.
Copyright 2010 by 上海交通大学学报(自然版)