• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

Windows 7反取证技术:综述与一种新方法。

Windows 7 Antiforensics: A Review and a Novel Approach.

作者信息

Eterovic-Soric Brett, Choo Kim-Kwang Raymond, Mubarak Sameera, Ashman Helen

机构信息

School of Information Technology & Mathematical Sciences, University of South Australia, Adelaide, SA, 5095, Australia.

Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, 78249-0631, USA.

出版信息

J Forensic Sci. 2017 Jul;62(4):1054-1070. doi: 10.1111/1556-4029.13393. Epub 2017 Feb 2.

DOI:10.1111/1556-4029.13393
PMID:28150301
Abstract

In this paper, we review literature on antiforensics published between 2010 and 2016 and reveal the surprising lack of up-to-date research on this topic. This research aims to contribute to this knowledge gap by investigating different antiforensic techniques for devices running Windows 7, one of the most popular operating systems. An approach which allows for removal or obfuscation of most forensic evidence is then presented. Using the Trojan software DarkComet RAT as a case study, we demonstrate the utility of our approach and that a Trojan Horse infection may be a legitimate possibility, even if there is no evidence of an infection on a seized computer's hard drive. Up-to-date information regarding how forensic artifacts can be compromised will allow relevant stakeholders to make informed decisions when deciding the outcome of legal cases involving digital evidence.

摘要

在本文中,我们回顾了2010年至2016年间发表的关于反取证技术的文献,并揭示了令人惊讶的是,关于该主题的最新研究十分匮乏。本研究旨在通过调查针对最流行的操作系统之一Windows 7运行设备的不同反取证技术,来填补这一知识空白。然后提出一种能够去除或模糊大多数取证证据的方法。以木马软件DarkComet RAT为例,我们证明了我们方法的实用性,并且表明即使在扣押计算机的硬盘驱动器上没有感染证据,特洛伊木马感染也可能是一种合理的可能性。有关取证工件如何被破坏的最新信息将使相关利益攸关方在决定涉及数字证据的法律案件结果时能够做出明智的决策。

相似文献

1
Windows 7 Antiforensics: A Review and a Novel Approach.Windows 7反取证技术:综述与一种新方法。
J Forensic Sci. 2017 Jul;62(4):1054-1070. doi: 10.1111/1556-4029.13393. Epub 2017 Feb 2.
2
On antiforensic concealability with rate-distortion tradeoff.基于率失真权衡的反取证隐藏性。
IEEE Trans Image Process. 2015 Mar;24(3):1087-100. doi: 10.1109/TIP.2015.2390137.
3
Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study.合作存储云服务的法医调查:以Symform为例进行研究
J Forensic Sci. 2017 May;62(3):641-654. doi: 10.1111/1556-4029.13271. Epub 2016 Nov 25.
4
USB Storage Device Forensics for Windows 10.适用于Windows 10的USB存储设备取证
J Forensic Sci. 2018 May;63(3):856-867. doi: 10.1111/1556-4029.13596. Epub 2017 Jul 18.
5
We are meeting on Microsoft Teams: Forensic analysis in Windows, Android, and iOS operating systems.我们正在微软团队上开会:关于Windows、安卓和iOS操作系统中的法医分析。
J Forensic Sci. 2023 Mar;68(2):434-460. doi: 10.1111/1556-4029.15208. Epub 2023 Feb 3.
6
Digital forensic investigation methodology for Storage Space: Based on the NIST digital forensic process.
J Forensic Sci. 2022 May;67(3):989-1001. doi: 10.1111/1556-4029.14992. Epub 2022 Jan 28.
7
A Forensic Exploration of the Microsoft Windows 10 Timeline.对微软Windows 10时间线的法证探索
J Forensic Sci. 2019 Mar;64(2):577-586. doi: 10.1111/1556-4029.13875. Epub 2018 Jul 26.
8
Toward a general ontology for digital forensic disciplines.迈向数字取证学科的通用本体论。
J Forensic Sci. 2014 Sep;59(5):1231-41. doi: 10.1111/1556-4029.12511. Epub 2014 Jun 16.
9
[The origin of informed consent].[知情同意的起源]
Acta Otorhinolaryngol Ital. 2005 Oct;25(5):312-27.
10
Forensic Taxonomy of Android Social Apps.安卓社交应用的法医分类学
J Forensic Sci. 2017 Mar;62(2):435-456. doi: 10.1111/1556-4029.13267. Epub 2016 Nov 28.