A Study on Image Acquisition and Usage Trace Analysis of Stick-PC
![]() |
Lee, Han Hyoung
(고려대학교 정보보호대학원 정보보호학과)
Bang, Seung Gyu (고려대학교 정보보호대학원 정보보호학과) Baek, Hyun Woo (고려대학교 정보보호대학원 정보보호학과) Jeong, Doo Won (고려대학교 정보보호대학원 정보보호학과) Lee, Sang Jin (고려대학교 정보보호대학원) |
1 | Intel [internet], http://www.intel.co.kr/content/www/kr/ko/compute-stick/intel-compute-stick.html. |
2 | Yonghak Shin, Junyoung Cheon and Jongsung Kim, "Study on Recovery Techniques for the Deleted or Damaged Event Log (EVTX) Files," Journal of the Korea Institute of Information Security & Cryptology, Vol.26, No.2, pp.387-396, 2016. DOI |
3 | Sang Jin Oh and Kyu Ho kim, "A Study on The Procedure Analysis Vulnerability for Security Incidents using The Registry Parsing," Conference Workshop of The Institute of Electronics Engineers of Korea, pp.287-290, 2016. |
4 | Harlan Carvey, "The Windows Registry as a forensic resource," Digital Investigation, Vol.2, Issue 3, pp.201-205, 2005. DOI |
5 | Forensic Toolkit (FTK) [internet], http://accessdata.com/solutions/digital-forensics/forensic-toolkit-ftk. |
6 | EnCase Forensic [internet], https://www.guidancesoftware.com/encase-forensic?cmpid=nav_r. |
7 | Ubuntu(Linux OS) [internet], https://www.ubuntu.com/download. |
8 | kali-km_Security Study [Internet], kali-km.tistory.com/entry/Windows-Event-Log-2---주요-이벤트-로그. |
![]() |