期刊文献+

iOS手机取证概述 被引量:2

Overview of iOS Mobile Forensics
下载PDF
导出
摘要 随着智能手机的发展,手机取证在犯罪调查、情报收集中越发显得重要。iOS手机取证是一项规范和精细的工作,为更好地在iOS设备尤其是iPhone手机上提取有价值的信息或者证据,首先介绍了iOS设备的基本属性,如i0S操作系统、文件系统、数据存储方式、数据库系统,并结合实际取证过程分析了iOS设备的基本数据获取方式、数据获取技术、自带应用程序分析、第三方应用程序分析等,以帮助取证人员更好地开展iOS手机取证实践。 With the development of smart phones,mobile forensics is becoming increasingly important in criminal in- vestigation and intelligence collection, lOS mobile forensics is a normative and fine work in practice. In order to effec- tively extract valuable information or evidence from iOS devices, especially from iPhones, this paper introduced the basic properties of the iOS device, such as iOS operating system, lOS file system, data storage method, lOS database, and analyzed the basic data acquisition modes and techniques, preinstalled applications analysis, third-part application analysis, so as to help the forensics personnel to better carry out iOS mobile forensics in practice.
作者 陈光宣 丁丽萍 杜锦 CHEN Guang-xuan DING Li-ping DU Jin(Zhejiang Police College, Hangzhou 310053, China Digital Forensics Lab, Institute of Software Application Technology,Guangzhou & Chinese Academy of Sciences,Guangzhou 511458,China Yunnan Police College, Kunming 650223, China)
出处 《计算机科学》 CSCD 北大核心 2016年第B12期1-6,共6页 Computer Science
基金 本文受NSFC-浙江两化融合联合基金(U1509219),国家高技术研究发展计划(863计划)(2015AA016003)资助.
关键词 手机取证 电子取证 证据获取 Mobile forensics,Digital forensics,Evidence acquisition
  • 相关文献

参考文献2

二级参考文献33

  • 1耿俊燕,张连杰,吴灏,张原.计算机取证技术与研究[J].网络安全技术与应用,2004(5):35-37. 被引量:4
  • 2丁丽萍,王永吉.计算机取证的相关法律技术问题研究[J].软件学报,2005,16(2):260-275. 被引量:84
  • 3张晶,刘焱.高智能犯罪研究[J].法学,2005(3):80-84. 被引量:5
  • 4丁丽萍,王永吉.多维计算机取证模型研究[J].计算机安全,2005(11):5-9. 被引量:9
  • 5TOBIAS NIPKOW,LAWRENCE C PAULSON,MARKUS WENZEL.Lecture Notes in Computer Science[M].Berlin:Springer,2001:22-36.
  • 6KRUSE W G,HEISER J G.Computer Forensics:Incident Response Essentials[M].[S.l.]:Addison-Wesley Professional,2002:11-35.
  • 7MICHAEL R,ANDERSON.Computer Evidence Processing:the Important First Step-Safe Seizure of the Computer[DB/OL].[2010-02-03].http://www.forensics-intl.com.
  • 8BRAIN CARRIER,EUGENE H,SPAFFORD.Getting Physical with the Digital Investigation Process[J].International Journal of Digital Evidence,2003,2(2):155-157.
  • 9ROBERTTO OBIALERO.Forensic Analysis of a Compromised Intranet Server[DB/OL].(2006-03-03).http://www.sans.org/reading_room/whitepapers/forensics/.
  • 10COREY VICKA,PETERMAN CHARLES,SHEARINS SYBIL,et al.Network Analysis[J].IEEE Computer Society,2006,6(6):60-66.

共引文献15

同被引文献12

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部