期刊文献+

Windows 8计算机取证与安全机制分析 被引量:1

Analysis of Windows 8 Computer Forensics and Security Mechanism
下载PDF
导出
摘要 随着微软新一代操作系统Windows 8的普及,计算机取证调查人员将在实际工作中越来越多的遇到安装Windows 8操作系统的检材。文章主要对Windows 8操作系统给计算机取证带来的新变化及其本身的安全机制进行了简要分析。 With the popularization of Microsoft new generation operating system Windows 8, computer forensics investigators will he more and more encountered in practical work to install Windows 8 operating system samples. This paper mainly on the Windows 8 operating system to a new security mechanism of computer forensics and its change brings is briefly analyzed.
出处 《电脑与信息技术》 2015年第3期47-48,63,共3页 Computer and Information Technology
关键词 WINDOWS 8 计算机取证 注册表取证 回收站取证 Bitlocker加密 安全机制 Windows 8 computer forensics registry forensics recycling station forensics Bidocker encryption security mechanism
  • 相关文献

参考文献8

  • 1Wikipedia.Features new to Windows 8[EB/OL].http://en.wikipedi a.org/wiki/Features new to Windows_8,2012.
  • 2Windows 8 Forensics[EB/OL].http://computerforensics.champlain. edu/blog/windows-8-forensics,2012.
  • 3Amanda C.F.Thomson.Windows 8 Forensic Guide[EB/OL].http: //prop ellerheadforensics.files.wordpress.com/2012~05~thomson_ windows-8-forensic-guide2.pdf,2012.
  • 4Windows 8 FileHistory[EB/OL].http://randomthoughtsofforensics. blog spot.hk/search/label/Windows%208,2012.
  • 5Windows 8 typedURLsTime [EB/OL].http://dfstream.blogspot. hk/2012/05/windows-8-typedurlstime.html,2012.
  • 6伍坤,张金波,丁典模.Windows8操作系统计算机取证新特性浅析[J].网络安全技术与应用,2014(7):85-86. 被引量:1
  • 7宋冰.Windows 8回收站取证分析[J].信息安全与技术,2012,3(12):50-52. 被引量:4
  • 8傅卓异,王轶骏,薛质.Windows 8安全改进及缺陷研究[J].信息安全与通信保密,2013,11(11):75-79. 被引量:1

二级参考文献17

  • 1Dionysus Blazakis. Interpreter Exploitation :Pointer Inference and JIT Spraying [ R ]. Black Hat Federal, 2010.
  • 2CHEN Xiabo, XIE Jun. Defeat Windows 7 Browser Memory Protection [ R]. XCon 2010.
  • 3Derek Soeder. Memory Retrieval Vulnerabil- iYes [ EB/OL]. http: //www. eeye. corn/ eEyeDigitalSecurity/media/ResearchPapers/ eeyeMRV-Oct2006, pdf, 2006.
  • 4Ben Hawkes. Attacking the Vista Heap [ EB/ OL ]. http: //www. lateralsecurity, corn/ downloads/hawkes_ ruxcon - nov - 2008. pdf, 2008-11.
  • 5Chris Valasek. Understanding the Low Frag- mentation Heap [ EB/OL ]. http. //illmat- ies. com/Understanding_ the LFH Slides.pdf, July, 2010.
  • 6Tarjei Mandt. Kernel Attacks through User- Mode Callbacks [ R ]. USA, Black Hat, 2011.
  • 7Chris Valasek, Tarjei Mandt. Windows 8 Heap Internals [ R ]. USA, Black Hat, 2012.
  • 8张明磊,单蓉胜,李小勇.基于Windows系统调用的异常检测模型[J].信息安全与通信保密,2007,29(11):56-57. 被引量:1
  • 9Microsoft Help and Support. "How the Recycle Bin Stores Files"[OL].http://support.microsoft.com/kb/136517,2009.
  • 10Machor,Mitchell. The Forensic Analysis of the Microsoft Windows Vista Recycle Bin[OL].http://www.forensicfocus.com/downloads/forensic-analysis-vista-recycle-bin.pdf,.

共引文献3

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部