期刊文献+

黑莓文件系统解析技术 被引量:1

Analytical Techniques of BlackBerry File System
下载PDF
导出
摘要 文章阐述了一种由具体内容映射文件系统一般规律的分析方法,从逻辑单元和文件内容的组成入手,从文件目录和其它信息结构的存储结构展开,最终得到文件系统的基本结构和各种参数,实现了基于手动写入参数的半手工解析技术。文中技术除了可以用于一般文件系统的解析,更重要的是可以应用于未知文件系统—黑莓文件系统的直接数据镜像解析。通过这种方法的应用,可以更深入理解文件系统的一般规律,完善文件系统解析的思路,并掌握一定的黑莓文件系统思想,最后实现黑莓手机镜像的取证。 This paper describes a it to form a logical unit and the contents of the ifle to start the mapping ifle by the speciifc content of the general rules of the system analysis method, and stored in the directory structure of files and other information structures unfold, and ultimately get the basic structure of the ifle system and the various kinds of parameters to achieve a written argument based on manual semi-manual analytical techniques. In addition it can be used to parse the ifle system in general, and more importantly applied to the unknown ifle system-direct data ifle system mirroring BlackBerry resolution. By application of this method can be more in-depth understanding of the general rules of the ifle system, the ifle system to improve analytical thinking, and to master certain BlackBerry ifle systems thinking, and ifnally realize the mirror BlackBerry forensics.
出处 《信息网络安全》 2014年第9期214-216,共3页 Netinfo Security
关键词 黑莓 文件系统 解析 取证 逻辑单元 BlackBerry ifle system analytical forensics logical unit
  • 相关文献

参考文献5

二级参考文献23

  • 1国家密码管理局SM2椭圆曲线公钥密码算法[DB/OL].http://www.oscca.gov.cn/UpFile/2010122214822692.pdf,2010-12-22/2011—12-08.
  • 2Darrel Hankerson, Alfred Menezes, Scott Vanstone. Guide to Elliptic Curve Cryptography[M]. New York: Springer-Verlag, Inc, 2004: 47-58.
  • 3Darrel Hankerson, Julio L 6 pez Hernandez, Alfred Menezes. Software Implementation of Elliptic Curve Cryptography over Binary Fields[C]Cryptographic Hardware and Embedded Systems -CHES 2000, LNCS 1965, 2000, 1-24.
  • 4Yong WANG, Huadeng WANG. On Key Authentic Degree of Cryptosystem[C]. The 2nd International Conference on Information Management and Engineering, / 6-18 April 2010, IEEE Press, 301-304.
  • 5Yong WANG, Huadeng WANG. Cryptosystem of Misleading Function Based on Generalized Key[C]. International Journal of Research and Reviews in Computer Science, 2010.
  • 6张训才.军队信息化知识普及读本丛书[M].北京:军事科学出版社.2010.
  • 7刘建国,曾庆华,张建军.通信参谋业务技能[M].北京:解放军出版社.2009.
  • 8长野鹏.作战模拟基础[M].北京:高等教育出版社,2004.
  • 9TomArcher,AndrewWhitechapel著.Visualc++.NET宝典[M].北京:电子工业出版社,2003.
  • 10肖军模.网络信息安全与对抗[M].北京:解放军出版社,1999..

共引文献41

同被引文献15

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部