Browse > Article

모바일 포렌식 동향  

Kim, Dohyun (고려대학교 정보보호대학원)
Lee, Sangjin (고려대학교 정보보호대학원)
Keywords
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 NIST Special Publication 800-101 Revision1, "Guidelines on Mobile Device Forensics", May 2014.
2 ISO/IEC 27043, "Information technology - Security techniques - Incident investigation principles and processes", March 2015.
3 Mumba, Emilio Raymond and Hein S. Venter, "Mobile forensics using the harmonised digital forensic investigation process", 2014 Information Security for South Africa IEEE, 2014.
4 Murphy, Cynthia A. "Developing process for mobile device forensics", 2009.
5 Goel, Archit, Anurag Tyagi and Ankit Agarwal, "Smartphone forensic investigation process model", International Journal of Computer Science & Security (IJCSS), pp. 322-341, 6(5), 2012.
6 TTAS.KO-12.0059, "이동 전화 포렌식 가이드라인", 한국정보통신기술협회, 2007.
7 이정훈, 천우성, "디지털 증거 수집과 분석을 위한 스마트폰 포렌식 적용 연구", 정보보호학회지, 21(6), pp. 56-65, 2011.
8 이무영, "디지털 증거 압수수색에 있어서 관련성 개념에 관한 연구 - 모바일 포렌식을 중심으로 -", 서울대학교 융합과학기술대학원, 2015.
9 Konstantia Barmpatsalou, Dimitrios Damopoulos, Georgios Kambourakis and Vasilios Katos, "A critical review of 7 years of Mobile Device Forensics", Digital Investigation, 10(4), pp. 323-349, December 2013.   DOI
10 Marcel Breeuwsma, Martien de Jongh, Coert Klaver, Ronald van der Knijff and Mark Roeloffs, "Forensic Data Recovery from Flash Memory", SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, 1(1), pp. 1-7, June 2007.
11 이규안, "JTAG 방식을 이용한 모바일 포렌식 기법 연구", 숭실대학교, 2010.
12 Ing. M.F. Breeuwsma, "Forensic imaging of embedded system using JTAG", Digital Investigation, 3, pp. 32-42, 2006.   DOI
13 Yang, Seung Jei, et al. "New acquisition method based on firmware update protocols for Android smartphones", Digital Investigation, 14, pp. S68-S76, 2015.   DOI
14 Namheun Son, Yunho Lee, Dohyun Kim, Joshua I. James, Sangjin Lee and Kyungho Lee, "A study of user data integrity during acquisition of Android devices", Digital Investigation, 10, pp. S3-S11, 2013.   DOI
15 Android Developer, "https://developer.android.com/", 2016.
16 오정훈, 이상진, "안드로이드 스마트폰 포렌식 분석 방법에 관한 연구", 고려대학교 정보보호대학원, 2012.
17 Cellebrite UFED, "http://www.cellebrite.com/", 2016.
18 XRY, https://www.msab.com/, 2016.
19 형사소송법 제106조 3항, "http://www.law.go.kr/법령/형사소송법", 2016.
20 Jonathan Zdziarski, "Identifying back doors, attack points, and surveillance mechanisms in iOS devices", Digital Investigation, 11, pp. 3-19, 2014.   DOI
21 evasi0n, "http://evasi0n.com/", 2106
22 PanGu, "http://en.7.pangu.io/", 2016.
23 TaiG, "http://www.taig.com/en/", 2016.
24 libimobiledevice, " http://www.libimobiledevice.org/", 2016.
25 Joe Sylve, Andrew Case, Lodovico Marziale and Golden G. Richarda, "Acquisition and analysis of volatile memory from android devices", Digital Investigation, 8(3), pp. 175-184, February 2012.   DOI
26 LiME, "https://github.com/504ensicsLabs/LiME", 2016.
27 Fabio Casadei, Antonio Savoldi and Paolo Gubian, "Forensics and SIM cards: an Overview", International Journal of Digital Evidence, 5(1), Fall 2006.