References
- Nicole Lang Beebe, Jan Guynes Clark, “A hierarchical, objectives-based framework for the digital investigations process,” Digital Investigation, Vol.2, June, 2005. https://doi.org/10.1016/j.diin.2005.04.002
- Brian D. Carrier, Eugene H. Spafford, “An Event-Based Forensic Investigation Framework,” Digital Forensic Research Workshop (DFRWS), Aug., 2004.
- Ricci S.C. leong, “FORZA - Digital forensics investigation framework that incorporate legal issues,” Digital Investigation, Vol.3, September, 2006. https://doi.org/10.1016/j.diin.2006.06.004
- M.I. Cohen, “PyFlag - An advanced network forensic framework,” Digital Investigation, Vol.5, September, 2008. https://doi.org/10.1016/j.diin.2008.05.016
- Dr. Ren Wei, “A Framework of Distributed Agent-based Network Forensics System,” Digital Forensic Research Workshop (DFRWS), Aug., 2004.
- Nick L. Petroni, Jr., AAron Walters, Timothy Fraser and William A.Arbaugh, “FATKit : A framework for the extraction and analysis of digital forensic data from volatile system memory,” Digital Investigation, Vol.3, December, 2006. https://doi.org/10.1016/j.diin.2006.10.001
- Mark Reith, Clint Carr and Gregg Gunsch, “An Examination of Digital Forensic Models,” International Jounal of Digital Evidence, Vol.1, Issue 3, Fall 2002,
- Jeroen van den Bos and Ronald van der Knijff, “TULP2G-An Open Source Forensic Software Framework for Acquiring and Decoding Data Stored in Electronic Devices,” International Journal of Digital Evidence, Vol.4, Issue 2, Fall 2005.
- EnCase Forensic, http://www.guidancesoftware.com/computer-forensics-ediscovery-software-digital-evidence.htm
- FTK(Forensic Toolkit), http://www.accessdata.com/forensictoolkit.html
- FINALForensics, http://www.finaldata.co.kr/Forum/?s=FRM.FF2
- TopTenREVIEWS, http://data-recovery-software-review.toptenreviews.com/
- 김진국 외 4명, “파일카빙 기법에 관한 연구”, 디지털 포렌식연구 2호, 2008년 6월.
- Joachim Metz, Bas Kloet and Robert-Jan Mora, “Analysis of 2007 DFRWS Forensic Carving Chllenge - The 07 smart carving approach,” Digital Forensic Research Workshop (DFRWS), July, 2007.
- Peter Gutmann, “Secure Deletion of Data from Magnetic and Solid-State Memory,” Sixth USENIX Security Symposium, July, 1996.
- Microsoft support site, http://support.microsoft.com/kb/140365.
- Simson L. Garfinkel, “Carving contiguous and fragmented files with fast object validation,” Volume 4, Supplement 1, September 2007. https://doi.org/10.1016/j.diin.2007.06.017
- 김진국 외 2명, “Flase-Positive를 줄이기 위한 향상된 파일 카빙 기법 연구”, 안티 포렌식 대응기술 워크샵, 2008년 8월.
- 김진국 외 4명, “파일카빙에서의 파일이름 결정 방법”, 한국정보보호학회 동계학술대회, 2008년 12월.
- Brian Carrier, “File System Forensic Analysis,” Addison Wesley Professional, P139-140, 2005.
- Steve Bunting, “The Official EnCase Certified Examiner STUDY GUIDE Second Edition,” Sybex, 2007.
- National Software Reference Library, http://www.nsrl.nist.gov/
- IDA Pro, http://www.hex-rays.com/idapro/
- OllyDbg, http://www.ollydbg.de/
Cited by
- Record File Carving Technique for Efficient File Recovery in Digital Forensic Investigation vol.2, pp.2, 2013, https://doi.org/10.3745/KTCCS.2013.2.2.093