Digital forensics on a virtual machine

作者: Juan Carlos Flores Cruz , Travis Atkison

DOI: 10.1145/2016039.2016130

关键词:

摘要: This poster presents a four-phase investigation methodology to acquire, authenticate and analyze virtual machine. During simulated investigation, sensitive information about suspect's activities was obtained from machine by applying the methodology. can be used investigate identify obtain evidence in

参考文章(17)
Norman Revell, A Min Tjoa, Günther Pernul, Makoto Takizawa, Roland Wagner, Gerald Quirchmayer, First International Conference on Availability, Reliability and Security (ARES´06) IEEE Computer Society Press. ,(2006)
Ada Gavrilovska, Ripal Nathuji, Karsten Schwan, Adit Ranadive, Radhika Niranjan, Vishakha Gupta, Purav Saraiya, Himanshu Raj, Sanjay Kumar, High-Performance Hypervisor Architectures: Virtualization in HPC Systems ,(2007)
Jay G. Heiser, Warren G. Kruse Ii, Computer Forensics: Incident Response Essentials ,(2001)
S.J. Vaughan-Nichols, New Approach to Virtualization Is a Lightweight IEEE Computer. ,vol. 39, pp. 12- 14 ,(2006) , 10.1109/MC.2006.393
Yan Zhang, Ying Lin, Research on the Key Technology of Secure Computer Forensics international symposium on intelligent information technology and security informatics. pp. 649- 652 ,(2010) , 10.1109/IITSI.2010.134
Sean Peisert, Sidney Karin, Matt Bishop, Keith Marzullo, Principles-driven forensic analysis new security paradigms workshop. ,vol. 2005, pp. 85- 93 ,(2005) , 10.1145/1146269.1146291
S.L. Garfinkel, A. Shelat, Remembrance of data passed: a study of disk sanitization practices ieee symposium on security and privacy. ,vol. 1, pp. 17- 27 ,(2003) , 10.1109/MSECP.2003.1176992
Derek Bem, Ewa Huebner, Computer Forensic Analysis in a Virtual Environment International Journal of Digital Evidence. ,vol. 6, ,(2007)
César Eduardo Atílio, Thiago Alves Siqueira, Cristóvão Colombo, Adriano Mauro Cansian, Dynamic Analysis of Malicious Code: A Windows Operational System Approach ,(2004)
Darren R. Hayes, Shareq Qureshi, Implications of Microsoft Vista operating system for computer forensics investigations long island systems, applications and technology conference. pp. 1- 9 ,(2009) , 10.1109/LISAT.2009.5031562