A Frame work for Code Injection Attack Investigation in Windows Environment
Palmer G. A road map for digital forensics research. Report fromthe First Digital Forensics Research Workshop (DFRWS).Technical Report DTR-T001-01, Air Force Research Laboratory, Rome Research Site; 2001
“Web Forensics,”. Available: www.one-esecurity.com/docs/Jess_Garcia-Web_Forensics.pdf [Accessed: Jun.02, 2010].
Ory Segal, “Web Application Forensics”. The Uncharted Territory “,Sanctum Security Group (www.SanctumInc.com) 2002 [Online]. Available www.cgisecurity.com/lib/WhitePaper_Forensics.pdf [Accessed: Sep.10, 2009].
Shiuh-Jeng Wang,* Yao-Han Chang Hung-Jui Ke Wen-Shenq Juang “Digital Evidence Seizure in Network Intrusions against Cyber-crime“ published in Internet Systems Journal of computers Vol 18 No 4 , January 2008”.
Deepak Singh Tomar , Dr.J.L.Rana and Dr.S.C.Shrivastava. "Evidence Gathering System for Input Attacks " (Paper ID: 091032)published in International Journal of Computer and Network Security(IJCNS),67 Vol. 1, No. 1, October 2009 ISSN Print 2076-2739 & ISSN Online 2076-9199.
“A Windows Registry Quick Reference,”. Available: http://www.forensicfocus.com/downloads/windows-registry-quick-reference.pdf [Accessed: Jun.02, 2010].
Y. Kaplan. “API spying techniques for Windows 9x, NT and 2000”. [Online] http://www.internals.com/articles/apispy/apispy.htm, [Accessed: May.02,2010]
Ahmad, A., “The Forensic Chain of Evidence Model: Improving the Process of Evidence Collection in Incident Handling Procedures” In the Proceedings of the 6th Pacific Asia Conference on Information Systems, Tokyo, Japan, 2-4 Sept, 2002.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.