The Method of Recovery for Deleted Record in the Unallocated Space of SQLite Database |
Jeon, Sang-Jun
(Center for the Information Security Technologies)
Byun, Keun-Duck (Center for the Information Security Technologies) Bang, Je-Wan (Center for the Information Security Technologies) Lee, Guen-Gi (Center for the Information Security Technologies) Lee, Sang-Jin (Center for the Information Security Technologies) |
1 | Mike Owens,Michael Owens, The definitive guide to SQLite, Apress , May. 2006 |
2 | R.A Crus, "Data recovery in IBM database 2," IBM Systems Journal, Vol(23), pp. 178-188 . March, 1984 |
3 | SQLite, "iPhone OS Data Management ," http://developer.apple.com/technologies/iphone/data-management.html |
4 | Theo Haerder, "Principles of transaction- oriented database recovery," ACM Computing Surveys (CSUR), pp. 287-317, December. 1983 |
5 | Joost S.M. Verhofstad, "Recovery Techniques for Database Systems," ACM Computing Surveys (CSUR), pp. 167-195 , June. 1978 |
6 | SQLite, "SQL As Understood By SQLite," http://www.sqlite.org/lang.html |
7 | SQLite, "Datatypes In SQLite Version 3," http://www.sqlite.org/datatype3.html |
8 | SQLite, "Well-Known Users of SQLite," http://www.sqlite.org/famous.html |
9 | Murilo Tito Pereira, "Forensic analysis of the Firefox 3 Internet history and recovery of deleted SQLite records," Digital Investigation, pp. 93-103 , March. 2004. |
10 | Chris Newman, SQLite, Macmillan ComputerPub, October. 2004 |