期刊文献+

新型电子数据反取证技术研究 被引量:1

Novel Digital Data Anti- Forensic Technology
下载PDF
导出
摘要 当前,国内外涌现了大量新型的反取证技术和工具。反取证技术的发展给电子数据取证工作带来较大挑战,影响了取证的可靠性和安全性。首先,对反取证技术从基于对象、基于证据影响和基于操作系统三个方面进行了分类;其次,研究分析了数据清除、数据隐藏、数据伪造、取证工具攻击等四类新型的反取证技术以及具体的方法和常用工具;最后,在计算机信息系统本身、取证工具、取证标准规范三个方面提出了反取证技术的应对措施。 Nowadays many new digital data anti-forensic techniques and tools spring up both at home and abroad. Anti-forensic technology bings great challenges to the digital forensic work, and this may directly affect the reliability and security of evidence. First- ly, anti-forensics classification is clone on the bases of target, evidence impact and operating system ; then the four new anti-forensic techniques and tools involing data eliminating, data hiding, data fabrication and attacks against forensic tools are analyzed; and finally the countermeasures against anti-forensic technology in the three fields of eomputer information system itself, forensic tools and stand- ards are proposed.
出处 《信息安全与通信保密》 2016年第9期59-62,共4页 Information Security and Communications Privacy
关键词 反取证技术 电子数据取证 计算机取证 网络犯罪 anti-forensic technology digital forensics computer forensics cybercrime
  • 相关文献

参考文献13

  • 1Zdziehowski P, Sadlon M, Vaisanen T, et al. Anti-Forensic Study [ EB/OL ]. Estonia: NATO Cooperative Cyber Defence Centre of Excellence. 2015 ( 2016 - 06 - 10 ) [ 2016- 06- 28 ]. https ://ccdcoe. org/sites/default/files/muhimedia/pdf/AF _ with%20intro.pdf.
  • 2殷联甫.计算机反取证技术研究[J].计算机系统应用,2005,14(10):46-49. 被引量:10
  • 3蔡立明,沙晶,姚伟.计算机反取证相关问题研究[J].电信科学,2010,26(S2):16-18. 被引量:2
  • 4罗晖,佟晖.大数据及云环境下计算机反取证技术研究[J].信息安全与通信保密,2016,14(4):99-101. 被引量:3
  • 5Homewood. Alain. Anti-forensic Implications of Software Bugs in Digital Forensic Tools[ D]. New Zealand :AUT University,2012.
  • 6Karlsson K, Glisson W B. Android Anti-forensics: Modifying CyanogenMod[ C ]//47th Hawaii International Conference on System Science. Washington: IEEE Computer Society, 2014: 4828-4837.
  • 7Orazio C, Ariffin A, Choo. Kim-Kwang. iOS anti-forensics: How Can We Securely Conceal, Delete and Insert Data[ C]// 47th Hawaii International Conference on System Science. Washington : IEEE Computer Society,2014:4838-4847.
  • 8Albano P, Castiglione A, Cattaneo G, et al. A Novel Anti-Fo- rensics Technique for the Android OS [ C] //2011 International Conference on Broadband and Wireless Computing, Communi- cation and Applications. Barcelona : IEEE, 2011 : 380-385.
  • 9Azadegan S, Yu W, Liu H, et al.Novel Anti-Forensics Ap- proaches for Smart Phones [ C]//2012 45th Hawaii Interna- tional Conference on System Science.Maui, HI : IEEE, 2012 : 5424-5431.
  • 10金波,杨涛,吴松洋,黄道丽,郭弘.电子数据取证与鉴定发展概述[J].中国司法鉴定,2016(1):62-74. 被引量:36

二级参考文献68

  • 1黄道丽,金波.电子数据证据的可采性与证明力[J].中国司法鉴定,2012(6):120-122. 被引量:6
  • 2许榕生,杨英.国内外计算机取证发展[J].保密科学技术,2011(11):6-9. 被引量:7
  • 3王彩玲,陈贺明.浅析计算机犯罪取证与反取证[J].吉林公安高等专科学校学报,2007,22(2):13-15. 被引量:4
  • 4Forensics and Anti- Forensics Computing.http://www, fukt. bth. se/- uncle/papers/forensics200212, pdf. 2005.
  • 5Anti - Forensics Tools. http://www, networkintrusion. co. uk/foranti, htm. 2005.
  • 6Defeating Forensics Analysis on Unix. http://www.phrack, org/show, php? p =598a =6. 2004.
  • 7Forensics and Anti -Forensics Tools.http://www, giac. org/procticals/GSEC/Taref-Alkori-GSEC. pdf. 2004.
  • 8Anti - forensics, http ://www. aversion, net/presentations/HTCIA -02/ anti - forensics, ppt. 2004.
  • 9The Art of Defiling.http: //www. blackhat, com/presentations/bh - asla-03/bh-asia -03 -grugq/ bh-asia-03 -grugq, pdf. 2004.
  • 10[美]WarrenG.KruseII JayG.Heiser著 段海新译.计算机取证:应急响应精要[M].人民邮电出版社,2003..

共引文献47

同被引文献6

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部