期刊文献+

基于手机的取证调查模型研究 被引量:6

Research of Forensic Investigation Model Based on Mobile Phone
下载PDF
导出
摘要 给出了手机取证的概念,并与计算机取证进行了比较,分析了手机取证和计算机取证的差异。结合手机取证的特点和难点,提出了基于手机的取证调查模型,分析了模型中各个阶段的具体活动。该模型对取证人员具有一定的指导意义。 The concept of mobile phone forensics is presented, and the difference between mobile phone forensics and computer forensics is analyzed by comparing with computer forensics. Combining the characteristics and difficulties of mobile phone forensics, we put forward the forensic investigation model based on mobile phone, and analyze the specific action in each stage of the model. The model has certain guiding significance for forensic investigators.
出处 《计算机时代》 2010年第12期24-26,共3页 Computer Era
关键词 计算机取证 手机取证 模型 工具 信息安全 computer forensics mobile phone forensics model tools information security
  • 相关文献

参考文献5

二级参考文献25

  • 1赵小敏.手机取证概述[J].网络安全技术与应用,2005(12):79-80. 被引量:16
  • 2董立波,罗洁,邵永军.SIM卡中信息提取方法的研究[J].刑事技术,2007,32(2):29-31. 被引量:4
  • 3戴吉明.手机取证及其电子证据获取研究[J].计算机与现代化,2007(5):100-102. 被引量:26
  • 4First Digital Forensic Research Workshop.A roadmap for digital forensic research[EB/OL].http://www.dfrws.org/2001/dfrws-rm-final.pdf.
  • 5Guidance Software Company.Encase productinfomation[EB/OL]. http ://www.guidancesoftware.com/produets/EnCaseForensic/productinfo.shtm.
  • 6TULP2G project.TULP2G-forensic framework for extracting and decoding data[EB/OL].http://tulp2g.sourceforge.net/.
  • 7Manson D,Carlin A,Ramos S,et al.Is the open way a better way? Digital forensics using open source tools[C]//Proceedings of the 40th Hawaii International Conference on System Sciences(HICSS'07), 2007.
  • 8Kornblum J D.The Linux kernel and the forensic acquisition of hard disks with an odd number of sectors[J].International Journal of Digital Evidence Fall,2004,3(2).
  • 9Rowlingson R.A ten step process for forensic readiness[J].International Journal of Digital Evidence Winter,2004,2(3).
  • 10Wilsdon T, Slay J.Digital forensics : Exploring validation,verification & certificatiort[C]//Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE' 2005 ), 2005.

共引文献43

同被引文献28

  • 1陈德俊,丁红军.手机取证研究概述[J].中国公共安全(学术版),2012(3):100-102. 被引量:18
  • 2王海英,周长伦,亓丕水,宋佐江,位晓晓.智能手机数据的提取与恢复[J].机械管理开发,2012,27(1):189-191. 被引量:6
  • 3赵小敏.手机取证概述[J].网络安全技术与应用,2005(12):79-80. 被引量:16
  • 4戴吉明.手机取证及其电子证据获取研究[J].计算机与现代化,2007(5):100-102. 被引量:26
  • 5麦永浩,赵庸,金波,等.电子数据司法鉴定实务[M].北京:法律出版社.2011:8-22.
  • 6李柏岚,谷大武.iOS平台的软件安全性分析[D].上海:上海交通大学电子信息与电气工程学院,2011:1.7.
  • 7Jonathan Zdziarski.Hacking and Securing iOS Applications [D]. Sebastopol : O'Reilly Media, 2012.
  • 8Sean Morrissey. iOS Forensic Analysis: for iPhone, iPad, and iPod touch[M]. Berkeley: Apress, 2010.
  • 9Andrew Hoog, Katie Strzempka. iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices[M]. Amsterdam: Elsevier 2011.
  • 10jonathan Zdziarski.iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets [D]. Sebastopol : O'Reilly Media, 2008.

引证文献6

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部