Investigating the Implications of Virtualization for Digital Forensics
Investigating the Implications of Virtualization for Digital Forensics
摘要
Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential roles of virtualization in digital forensics, examines the recent progresses which use the virtualization techniques to support modem computer forensics. The influences on digital forensics caused by virtualization technology are identified. Tools and methods in common digital forensic practices are analyzed, and experiences of our practice and reflections in this field are shared.
参考文献19
-
1BARHAM P, DRAGOVIC B, FRASER K, et al. Xen and the Art of Virtualization [C]// Proceedings of the 19th ACM Symposium on Operating Systems Principles, 2003: 164-177.
-
2KRUSE W G, HEISER J G. Computer Forensics: Incident Response Essentials (1 st ed.). Addison Wesley Professional, 2002.
-
3SHAVERS B. Virtual Forensics (A Discussion of Virtual Machine Related to Forensic Analysis) [ EB/OL]. http:// www. forensicfocus. com/virtual-machines-forensics-analysis.
-
4DORN G, MARBERRY C, CONRAD S, et al. Analyzing the Impact of a Virtual Machine on a Host Machine. Advances in Digital Forensics V. IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2009, 306: 69-81.
-
5CARRIER B. File System Forensic Analysis. Boston: Addison-Wesley, 2005.
-
6Open Source VMFS Driver [EB/OL]. http://code. google. com/p/vmfs/.
-
7FARMER D, VENEMA W. Forensic Discovery. Addison-Wesley, 2005.
-
8Live View [EB/OL]. http://liveview.sourceforge.net/.
-
9BEM D, HUEBNER E. Computer Forensic Analysis in a Virtual Environment[J/OL]. International Journal of Digital Evidence, 2007, 6 (2). http://www. utica, edu/academic/ institutes/ecii/ijde/articles.cfm? current = 1.
-
10MRDOVIC S, HUSEINOVIC A, ZAJKO E. Combining Static and Live Digital Forensic Analysis in Virtual Environment[ C]//Proceedings of 22nd International Symposium on Information, Communication and Automation Technologies, 2009.
-
1全球超算研发进军“E级”[J].创新时代,2016,0(8):95-95.
-
2袁国华,赵震,彭颖红,阮雪榆,王月芳.AutoCAD R14网络功能及其在模具工业中使用前景的探讨[J].金属成形工艺,1999,17(2):41-42.
-
3王斌,徐照兴.数据挖掘技术研究[J].电脑知识与技术,2009,5(9X):7598-7599. 被引量:1
-
4熊家林.国际互联网络与化工信息服务[J].湖北化工,1996,13(2):1-3.
-
5Wu Qiong Sun Shaojie Zhu Wei Li Guohui.IDENTIFICATION OF INPAINTED IMAGES AND NATURAL IMAGES FOR DIGITAL FORENSICS[J].Journal of Electronics(China),2009,26(3):341-345.
-
6杨克俭,丁学钧.数据挖掘及其应用研究回顾[J].福建电脑,2004,20(7):9-10. 被引量:4
-
7陈洪斌,祝颖,曲宝忠,李卫华.医学高校学生诚信鉴定评价体系的细化方案[J].今日科苑,2010(22):202-202.
-
8亚马逊最畅销大数据著作《驾驭大数据》中文版即将面市[J].中国金融电脑,2013(2):95-95.
-
9V. David Sanchez A.(German Aerospace Research Establishment, DLR OberpfaffenhofenInstitute for Robottes and System DynamicsD-82230 Wessling, Germany).Investigating the Synthesis of RBF Networks[J].Journal of Systems Engineering and Electronics,1996,7(3):25-29. 被引量:2
-
10Viola Wong Yuk Yue.Investigating ESL students' grammar in writing[J].US-China Foreign Language,2010,8(1):22-31.