Sciweavers

IMF
2007
14 years 10 days ago
Testing Forensic Hash Tools on Sparse Files
: Forensic hash tools are usually used to prove and protect the integrity of digital evidence: When a file is intercepted by law enforcement, a cryprographic fingerprint is taken...
Harish Daiya, Maximillian Dornseif, Felix C. Freil...
IMF
2007
14 years 10 days ago
Taxonomy of Anti-Computer Forensics Threats
Joseph C. Sremack, Alexandre V. Antonov
IMF
2007
14 years 10 days ago
Towards Reliable Rootkit Detection in Live Response
: Within digital forensics investigations, the term Live Response refers to all activities that collect evidence on live systems. Though Live Response in general alters the state o...
Felix C. Freiling, Bastian Schwittay
IMF
2007
14 years 10 days ago
A Common Process Model for Incident Response and Computer Forensics
: Incident Response and Computer Forensics are two areas with similar goals but distinct process models. While in both cases the goal is to investigate computer security incidents ...
Felix C. Freiling, Bastian Schwittay