期刊文献+

基于Android智能终端微信应用的数字取证分析模型的研究 被引量:2

Digital Forensic Analysis Model Research of WeChat on Android Smart Phone
下载PDF
导出
摘要 随着移动互联网的快速发展,智能终端已经成为人们生活中不可缺少的一部分。作为最具中国特色的智能终端应用——微信,已经成为人们的一种生活方式。正是由于微信的流行,利用微信进行违法犯罪行为越为突出,针对Android手机微信数据的可信提取和溯源分析研究有着重要的意义,首先介绍了智能终端的数字取证技术研究现状,并分析了使用国内外取证工具进行微信取证时存在的瓶颈问题,研究和设计了针对Android智能终端微信应用的数字取证分析模型,并在数据提取和数据分析方面提出了APP数据建模分析、时间序列分析、数据关联分析等方法和模型。 With the rapid development of mobile Internet,smart phone has become an indispensable part of people's life. As one of the most popular application on smart phone in China,WeChat has become a choice way of life. Due to the popularity of WeChat, more and more criminals carry out criminals through WeChat. Therefore, it is significant to extract WeChat trusted data and research ~racing back data on Android mobile phone. Firstly, this paper focused on introducing present situation of forensics technology research on smart phone. Secondly, analyzed it the problems of WeChat forensics work using domestic and foreign forensic tools. Then it researched and designed the digital forensics analysis model of WeChat on Android smart phone, proposed the APP data modeling analysis, time series analysis, da- ta correlation analysis and other analysis methods.
作者 何月 杜丹
出处 《计算机科学》 CSCD 北大核心 2015年第B10期74-78,83,共6页 Computer Science
关键词 智能终端 微信 取证 关联分析 Smart phone, WeChat, Forensics, Correlation analysis
  • 相关文献

参考文献13

  • 1Available:http://weixin.qq.com/.
  • 2http://www.netmarketshare.com/operating-system-market-sh-are.aspx?prid=8&-qpcustomd =1.
  • 3Mellars B.Forensic examination of mobile phones[J].Digital Investigation,2004.
  • 4http://citeseerx.ist.psu.edu/viewdoc/summary?doi =10.1.1.101.6742.
  • 5Raghav S,Saxena A K.Mobile Forensics:Guidelines and Challenges in Data Preservation and Acquisition[Cj// Proceedings of 2009 Student Conference on Research and Development(SCOReD 2009).2009.
  • 6Savoldi A,Gubian P,Echizen I.A Comparison between Windows Mobile and Symbian S60 Embedded Forensics[C]//2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.2009.
  • 7Andriotis P,Oikonomou G,TryfonavS T.Forensic Analysis of Wireless Networking Evidence of Android Smartphones[C]// IEEE International Workshop on Information Forensics and Se-curity(WIFS).2012.
  • 8Mutawa N A,Baggili I,Marrington A.Forensic analysis of social networking applications on mobile devices[J].Digital Investigation,2012.
  • 9Thakur N S.Forensic Analysis of WhatsApp on Android Smartphones[D].University of New Orleans Theses and Disserta-tions,2013.
  • 10赵小敏.手机取证概述[J].网络安全技术与应用,2005(12):79-80. 被引量:16

二级参考文献12

  • 1First Digital Forensic Research Workshop.A roadmap for digital forensic research[EB/OL].http://www.dfrws.org/2001/dfrws-rm-final.pdf.
  • 2Guidance Software Company.Encase productinfomation[EB/OL]. http ://www.guidancesoftware.com/produets/EnCaseForensic/productinfo.shtm.
  • 3TULP2G project.TULP2G-forensic framework for extracting and decoding data[EB/OL].http://tulp2g.sourceforge.net/.
  • 4Manson D,Carlin A,Ramos S,et al.Is the open way a better way? Digital forensics using open source tools[C]//Proceedings of the 40th Hawaii International Conference on System Sciences(HICSS'07), 2007.
  • 5Kornblum J D.The Linux kernel and the forensic acquisition of hard disks with an odd number of sectors[J].International Journal of Digital Evidence Fall,2004,3(2).
  • 6Rowlingson R.A ten step process for forensic readiness[J].International Journal of Digital Evidence Winter,2004,2(3).
  • 7Wilsdon T, Slay J.Digital forensics : Exploring validation,verification & certificatiort[C]//Proceedings of the First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE' 2005 ), 2005.
  • 8Lee Jooyoung.Proposal for efficient searching and presentation in digital forensics[C]//The Third International Conference on Availability,Reliability and Security,2008:1377-1381.
  • 9Bern D,Huebner E.Computer forensic analysis in a virtual environment[J].Intemational Journal of Digital Evidence Fall,2007,6(2).
  • 10Gladyshev P.Rigorous development of automated inconsistency checks for digital evidence using the B method[J].International Journal of Digital Evidence Fall,2007,6(2).

共引文献26

同被引文献5

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部