참고문헌
- Jewan Bang, Byeongyeong Yoo, Sangjin Lee, "Analysis of changes in file time attributes with file manipulation", Digital Investigation, Vol. 7, Issues 3-4, pp. 135-144, 2011. https://doi.org/10.1016/j.diin.2010.12.001
- Jewan Bang, Byeongyeong Yoo, Jongsung Kim, Sangjin Lee, "Analysis of Time Information for Digital Investigation" INC, IMS and IDC, 2009. NCM '09. Fifth International Joint Conference on, pp. 1858-1864, 2009.
- Val Henson, Zach Brown, Theodore Ts'o, and Arjan van de Ven, "Reducing fsck time for ext2 file systems," Proceeding of the Linux Symposium, Vol. 1, 2006.
- Philip Craiger, "Recovering Digital Evidence from Linux Systems," IFIP The International Federation for Information Processing, Vol. 194, pp. 233-244, 2005.
- SANS Information, Network, Computer Security Training, Research, Resources, http://www.sans.org.
- Hal Pomeranz, "EXT3 File Recovery via Indirect Blocks," http://computer-forensics.sans.org/summit-archives/2011/EXT3-file-recovery.pdf.
- Gregorio Narvaez, "Taking advantage of Ext3 journaling file system in a forensic investigation," SANS Institute Reading Room, 2007.
- Kevin D. Fairbanks, "An analysis of Ext4 for digital forensics," Digital Investigation, Vol. 9, pp. 118-130, 2012. https://doi.org/10.1016/j.diin.2012.05.010
- Dohyun Kim, Jungheum Park, Keun-gi Lee, and Sangjin Lee, "Forensic Analysis of Android Phone using Ext4 File System Journal Log," Lecture Notes in Electrical Engineering, Vol. 164, pp. 435-446, 2012.
- Dohyun Kim, Jungheum Park, Sangjin Lee, "File Carving for Ext4 File System on Android OS", Journal of The Korea Institute of Information Security & Cryptology(JKIISC), Vol. 23, No. 3, 2013.
- Soeui Kim, Duri Choi, Beongku An, "Detection and Prevention Method by Analyzing Malignant Code of Malignant Bot,, The Journal of The Institute of Internet, Broadcasting and Communication(JIIBC), Vol. 8, No. 2, pp. 199-207, 2013.
- Operation Windigo Analysis Report, http://www.welivesecurity.com/wp-content/uploads/2014/03/operation_windigo.pdf.
- Se-Ryoung Kim, Huy-Kang Kim, "Fuzzy Expert System for Detecting Anti-Forensic Activities", Journal of Internet Computing and Services, Volume 12, Issue 5, pp. 47-61, 2011