A Study on the Admissibility of the Virtual Machine Image File as a Digital Evidence in Server Virtualization Environment |
Kim, Dong-Hee
(Graduate School of Information Management and Security, Korea University)
Baek, Seung-Jo (Graduate School of Information Management and Security, Korea University) Shim, Mi-Na (Graduate School of Information Management and Security, Korea University) Lim, Jong-In (Graduate School of Information Management and Security, Korea University) |
1 | IDC, "irtualization and Multi-core Innovations Disrupt the Worldwide Server Market" March 2007 |
2 | NIST, "Digital Forensics at the National Institute of Standards and Technology, NISTIR 7490", 2008.4 |
3 | 이규안, 박대우, 신용태, "포렌식 자료의 무결성 확보를 위한 수사현장의 연계관리 방법 연구", 한국컴퓨터정보학회 2006동계학술발표논문집&학회지, 14(2), December 2006 |
4 | 한국 IBM 시스템테크놀로지그룹, 가상화 기술의 새로운 패러다임, 한국경제신문, 2007 |
5 | S. Garfinkel, "nti-Forensics: Techniques, Detection and Countermeasures" Proceeding of The 2nd International Conference on i-Warfare and Security, 2007 |
6 | 오기두, "형사절차상 컴퓨터 관련증거의 수집 및 이용에 관한 연구", 서울대학교 학위논문, 1997 |
7 | Lorraine v. Markel American Insurance Co., U.S. Dist. LEXIS 33020(D. Md.), May 2007 |
8 | D.Bem, E. Huebner, "Computer Forensic Analysis in a Virtual Environment", International Journal of Digital Evidence, 6(2), Fall 2007 |
9 | U.S. Federal Rules of Evidence http://www.uscourts.gov/rules/Evidence_Rules_ 2007.pdf |
10 | Jesse D. Kornblum, "xploiting the Rootkit Paradox with Windows Memory Analysis" International Journal of Digital Evidence, 2006 |
11 | IDC, "Worldwide Virtual Machine Software 2008-2012 Forecas", May 2008 |
12 | United States Department of Justice, "Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations", July 2002 |
13 | D. Bem, E. Huebner, "Analysis of USB Flash Drives in a Virtual Environment", Small Scale Digital Device Forensics Journal, 1(1), June 2007 |
14 | Daubert v. Merrell Dow Pharmaceuticals, Inc., 509 U.S. 579, 1993 |
15 | NIST Computer Forensic Tool Testing Program, http://www.cftt.nist.gov |
16 | 김동희, 백승조, 심미나, 임종인, "가상서버 시스템의 안전한 하이퍼바이저 설계에 요구되는 보안 요소", 한국정보보호학회 2007동계학술대회, 17(2), pp.661-666, 2007 |
17 | A. Arnes, P. Haas, G. Vigna, R. Kemmerer, "Digital Forensic Reconstruction and the Virtual Security Testbed ViSe", Vol.4064. 2006 |
18 | 한국정보통신기술협회(TTA), "컴퓨터 포렌식 가이드라인(정보통신단체표준 TTAS.KO-12.0058)", 2007 |
19 | J. Smith, R. Nair, Virtual Machines, Elsevier, 2005, p.370 |