2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering 2010
DOI: 10.1109/sadfe.2010.9
|View full text |Cite
|
Sign up to set email alerts
|

Formal Digital Investigation of Anti-forensic Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 9 publications
0
12
0
Order By: Relevance
“…One of the main problems that hinder the digital investigation is that, the investigators fail to evaluate whether the evidence gathered are adequate to prove events of the crime, detect any anti-forensics attacks and to lighten these effects on the compromised evidence (Rekhis & Boudriga, 2010b).…”
Section: Background and Motivationmentioning
confidence: 99%
See 4 more Smart Citations
“…One of the main problems that hinder the digital investigation is that, the investigators fail to evaluate whether the evidence gathered are adequate to prove events of the crime, detect any anti-forensics attacks and to lighten these effects on the compromised evidence (Rekhis & Boudriga, 2010b).…”
Section: Background and Motivationmentioning
confidence: 99%
“…For example, once the attacker had succeeded in compromising a system, the first step carried out is to delete the traces of occurred events. Anti-forensics techniques are carried out to reduce the qualitative and quantitative substantial evidence (Baier & Breitinger, 2011) on the compromised systems (Hilley, 2007;Kessler, 2007;Rekhis & Boudriga, 2010b). As the technology advances, new anti-forensic tools and techniques has been discovered and implemented.…”
Section: Background and Motivationmentioning
confidence: 99%
See 3 more Smart Citations