휴대폰과 스마트폰의 모바일 포렌식 추출방법 연구

Cellular and Smart phone through the business and real life is associated with an increasing number of information processing, Breaches associated with mobile terminal Tile has occurred and cause Crime and damage. In this paper, Cellular and Smart phone for mobile forensics SYN scheme and JTAG schem...

Full description

Saved in:
Bibliographic Details
Published in(사)디지털산업정보학회 논문지, 6(3) Vol. 6; no. 3; pp. 79 - 89
Main Authors 이정훈, 박대우, Yi, Jeong Hoon, Park, Dea Woo
Format Journal Article
LanguageKorean
Published (사)디지털산업정보학회 01.09.2010
Subjects
Online AccessGet full text
ISSN1738-6667
2713-9018

Cover

Abstract Cellular and Smart phone through the business and real life is associated with an increasing number of information processing, Breaches associated with mobile terminal Tile has occurred and cause Crime and damage. In this paper, Cellular and Smart phone for mobile forensics SYN scheme and JTAG scheme to target Cellular and Smart phone for the extraction of forensic data will be studied. SYN, JTAG approach to forensic analysis indicate with the process, Every Smart phone's OS specific performance and data extraction were compared. In the laboratory, Cell and smart phone with the SYN scheme and JTAG scheme to extract forensic data Improvement compared to the extraction is presented.
AbstractList Cellular and Smart phone through the business and real life is associated with an increasing number of information processing, Breaches associated with mobile terminal Tile has occurred and cause Crime and damage. In this paper, Cellular and Smart phone for mobile forensics SYN scheme and JTAG scheme to target Cellular and Smart phone for the extraction of forensic data will be studied. SYN, JTAG approach to forensic analysis indicate with the process, Every Smart phone's OS specific performance and data extraction were compared. In the laboratory, Cell and smart phone with the SYN scheme and JTAG scheme to extract forensic data Improvement compared to the extraction is presented. Cellular and Smart phone through the business and real life is associated with an increasing number of information processing, Breaches associated with mobile terminal Tile has occurred and cause Crime and damage. In this paper, Cellular and Smart phone for mobile forensics SYN scheme and JTAG scheme to target Cellular and Smart phone for the extraction of forensic data will be studied. SYN, JTAG approach to forensic analysis indicate with the process, Every Smart phone's OS specific performance and data extraction were compared. In the laboratory, Cell and smart phone with the SYN scheme and JTAG scheme to extract forensic data Improvement compared to the extraction is presented. KCI Citation Count: 6
Cellular and Smart phone through the business and real life is associated with an increasing number of information processing, Breaches associated with mobile terminal Tile has occurred and cause Crime and damage. In this paper, Cellular and Smart phone for mobile forensics SYN scheme and JTAG scheme to target Cellular and Smart phone for the extraction of forensic data will be studied. SYN, JTAG approach to forensic analysis indicate with the process, Every Smart phone's OS specific performance and data extraction were compared. In the laboratory, Cell and smart phone with the SYN scheme and JTAG scheme to extract forensic data Improvement compared to the extraction is presented.
Author 이정훈
Park, Dea Woo
박대우
Yi, Jeong Hoon
Author_xml – sequence: 1
  fullname: 이정훈
– sequence: 2
  fullname: 박대우
– sequence: 3
  fullname: Yi, Jeong Hoon
– sequence: 4
  fullname: Park, Dea Woo
BackLink https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001483544$$DAccess content in National Research Foundation of Korea (NRF)
BookMark eNotjctKw0AYRgdRsNa-QzaCm0AyfzP_zLLUW7VQkO6HSTqRkJJC4wO4lFropqKLFlwIXugieCku-kSd5B0M1tXhg8P59sh2Mkj0FqlQdMEWjsu3ScVF4DZjDHdJLU0j3wFGkXvcq5CjYvZlxjfFJFt_rqx89GxebovRT7nz-aNl3l9NNs3nK6uYLMzTOL-bW_lymi9nJnszH_dW_pCtvxf7ZCdU_VTX_lkl3ZPjbvPMbndOW81G244ZgA2Uc64UQwXIRRAK6jjoeb7QnqeUgxj0uKA9qCNjnnbB11Qo0DzUpeb7AVTJ4SabDEMZB5EcqOiPVwMZD2XjstuSyGkdoFQPNmocpdeRTHppX543LjrUcctTBohMYB3hF5Fra0E
ContentType Journal Article
DBID JDI
ACYCR
DEWEY 621.382
DatabaseName KoreaScience
Korean Citation Index
DatabaseTitleList

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
DocumentTitleAlternate A Study on Mobile Forensic Extraction Methods of Cellular and Smart Phone
EISSN 2713-9018
EndPage 89
ExternalDocumentID oai_kci_go_kr_ARTI_782433
JAKO201007637769747
GroupedDBID .UV
JDI
ACYCR
M~E
ID FETCH-LOGICAL-k633-32888aa67a3789cf9200755b9e55aa077cd892d347665e13be29a3e8fe075bbc3
ISSN 1738-6667
IngestDate Tue Nov 21 21:41:23 EST 2023
Fri Dec 22 11:59:02 EST 2023
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Issue 3
Keywords JTAG Scheme
Smart Phone
Mobile Forensic
Cellular Phone
SYN Scheme
Language Korean
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-k633-32888aa67a3789cf9200755b9e55aa077cd892d347665e13be29a3e8fe075bbc3
Notes KISTI1.1003/JNL.JAKO201007637769747
G704-SER000010259.2010.6.3.003
OpenAccessLink http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO201007637769747&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01
PageCount 11
ParticipantIDs nrf_kci_oai_kci_go_kr_ARTI_782433
kisti_ndsl_JAKO201007637769747
PublicationCentury 2000
PublicationDate 2010-09
PublicationDateYYYYMMDD 2010-09-01
PublicationDate_xml – month: 09
  year: 2010
  text: 2010-09
PublicationDecade 2010
PublicationTitle (사)디지털산업정보학회 논문지, 6(3)
PublicationTitleAlternate Journal of the Korea Society of Digital Industry and Information Management
PublicationYear 2010
Publisher (사)디지털산업정보학회
Publisher_xml – name: (사)디지털산업정보학회
SSID ssib036278585
ssib044734564
ssib008451690
ssib053377100
ssib026777133
Score 1.4543356
Snippet Cellular and Smart phone through the business and real life is associated with an increasing number of information processing, Breaches associated with mobile...
SourceID nrf
kisti
SourceType Open Website
Open Access Repository
StartPage 79
SubjectTerms 컴퓨터학
Title 휴대폰과 스마트폰의 모바일 포렌식 추출방법 연구
URI http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO201007637769747&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01
https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001483544
Volume 6
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
ispartofPNX (사)디지털산업정보학회 논문지, 2010, 6(3), , pp.79-89
journalDatabaseRights – providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2713-9018
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssib044734564
  issn: 1738-6667
  databaseCode: M~E
  dateStart: 20050101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NaxNBFB_anryIomL9KCs4pxLZ7MzOx3F3k1Ir6iVCb2G_IiUlgTS9eBCPUgu9VPTQgAfBD3oIfhQP_Yu6m__BN283zVYUquBlmZ355Tdv5m123pt9M0PI3TiqK9us6InSDjgoItQ1zTsCN0JOtYpslZgFzg8fidUnfG3dXZ-b36xELW0Po3vxs9-uK_kXrUIe6NWskv0LzZ6SQgakQb9wBQ3D9Vw6ps0G1QH1OW36VAUmagFy1Ar1IeFRn1E_WKZNKPCohyBPUqUQBMWqgg6oBi61jCBAK5OAAs3LMmRCuBcgyDY1Gm4firEWX5RwkwhKAk9jwqHaRZCWU-lcWu77WNrGYOsin2NqcPBnQFcwGrmLxnGUG2Gl3FDkIgakdbEyhl3SMLdaY8IDYbFtAPUL-YOSqKCGJ02AANV552nDeYUcqIBDzSBFJ7kVBQSmNt-uTqeYSABdnU75302tDDUShhpwHgtzI8U8R9aZCZhRlSGlOGtnapzo2bg9jVX4ZTg_s3F4N95oP-23u4M2uEf322AOcsbmyTy85U2Y6_Pm6btX8TNfTB0hpazPXAGwc2T1pALOJTM7EeF647Ih4N8Zp2cDzLTeoFMx01qXyMXSv7K84s9ymcx1-1dIY3LwLdt9Mdkbn3w9tvKd99mHl5OdH3Cfj95a2eeP2Xg_Hx1bk73D7N1u_mpk5Uf7-dFBNv6UfXlt5W_GJ98Pr5LWSrMVrNbK40NqXcFYjTlKqTAUMmRS6bijzay860Y6dd0wtKWME6WdhHEphJvWWZQ6OmSp6qQAi6KYXSMLvX4vvU4sITAK203tJORObIeMOWEEhjQTSSrt-iJZwoa3e8nWZnvNe_DYPFk2DN1SCuOwL5I70COojT9q5cY5MDfJhdkze4ssDAfb6W0wiofREmrzJ22Wikw
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%ED%9C%B4%EB%8C%80%ED%8F%B0%EA%B3%BC+%EC%8A%A4%EB%A7%88%ED%8A%B8%ED%8F%B0%EC%9D%98+%EB%AA%A8%EB%B0%94%EC%9D%BC+%ED%8F%AC%EB%A0%8C%EC%8B%9D+%EC%B6%94%EC%B6%9C%EB%B0%A9%EB%B2%95+%EC%97%B0%EA%B5%AC&rft.jtitle=%28%EC%82%AC%29%EB%94%94%EC%A7%80%ED%84%B8%EC%82%B0%EC%97%85%EC%A0%95%EB%B3%B4%ED%95%99%ED%9A%8C+%EB%85%BC%EB%AC%B8%EC%A7%80%2C+6%283%29&rft.au=%EC%9D%B4%EC%A0%95%ED%9B%88&rft.au=%EB%B0%95%EB%8C%80%EC%9A%B0&rft.date=2010-09-01&rft.pub=%28%EC%82%AC%29%EB%94%94%EC%A7%80%ED%84%B8%EC%82%B0%EC%97%85%EC%A0%95%EB%B3%B4%ED%95%99%ED%9A%8C&rft.issn=1738-6667&rft.eissn=2713-9018&rft.spage=79&rft.epage=89&rft.externalDBID=n%2Fa&rft.externalDocID=oai_kci_go_kr_ARTI_782433
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1738-6667&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1738-6667&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1738-6667&client=summon