휴대폰과 스마트폰의 모바일 포렌식 추출방법 연구
Cellular and Smart phone through the business and real life is associated with an increasing number of information processing, Breaches associated with mobile terminal Tile has occurred and cause Crime and damage. In this paper, Cellular and Smart phone for mobile forensics SYN scheme and JTAG schem...
Saved in:
Published in | (사)디지털산업정보학회 논문지, 6(3) Vol. 6; no. 3; pp. 79 - 89 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | Korean |
Published |
(사)디지털산업정보학회
01.09.2010
|
Subjects | |
Online Access | Get full text |
ISSN | 1738-6667 2713-9018 |
Cover
Abstract | Cellular and Smart phone through the business and real life is associated with an increasing number of information processing, Breaches associated with mobile terminal Tile has occurred and cause Crime and damage. In this paper, Cellular and Smart phone for mobile forensics SYN scheme and JTAG scheme to target Cellular and Smart phone for the extraction of forensic data will be studied. SYN, JTAG approach to forensic analysis indicate with the process, Every Smart phone's OS specific performance and data extraction were compared. In the laboratory, Cell and smart phone with the SYN scheme and JTAG scheme to extract forensic data Improvement compared to the extraction is presented. |
---|---|
AbstractList | Cellular and Smart phone through the business and real life is associated with an increasing number of information processing, Breaches associated with mobile terminal Tile has occurred and cause Crime and damage. In this paper, Cellular and Smart phone for mobile forensics SYN scheme and JTAG scheme to target Cellular and Smart phone for the extraction of forensic data will be studied. SYN, JTAG approach to forensic analysis indicate with the process, Every Smart phone's OS specific performance and data extraction were compared. In the laboratory, Cell and smart phone with the SYN scheme and JTAG scheme to extract forensic data Improvement compared to the extraction is presented. Cellular and Smart phone through the business and real life is associated with an increasing number of information processing, Breaches associated with mobile terminal Tile has occurred and cause Crime and damage. In this paper, Cellular and Smart phone for mobile forensics SYN scheme and JTAG scheme to target Cellular and Smart phone for the extraction of forensic data will be studied. SYN, JTAG approach to forensic analysis indicate with the process, Every Smart phone's OS specific performance and data extraction were compared. In the laboratory, Cell and smart phone with the SYN scheme and JTAG scheme to extract forensic data Improvement compared to the extraction is presented. KCI Citation Count: 6 Cellular and Smart phone through the business and real life is associated with an increasing number of information processing, Breaches associated with mobile terminal Tile has occurred and cause Crime and damage. In this paper, Cellular and Smart phone for mobile forensics SYN scheme and JTAG scheme to target Cellular and Smart phone for the extraction of forensic data will be studied. SYN, JTAG approach to forensic analysis indicate with the process, Every Smart phone's OS specific performance and data extraction were compared. In the laboratory, Cell and smart phone with the SYN scheme and JTAG scheme to extract forensic data Improvement compared to the extraction is presented. |
Author | 이정훈 Park, Dea Woo 박대우 Yi, Jeong Hoon |
Author_xml | – sequence: 1 fullname: 이정훈 – sequence: 2 fullname: 박대우 – sequence: 3 fullname: Yi, Jeong Hoon – sequence: 4 fullname: Park, Dea Woo |
BackLink | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001483544$$DAccess content in National Research Foundation of Korea (NRF) |
BookMark | eNotjctKw0AYRgdRsNa-QzaCm0AyfzP_zLLUW7VQkO6HSTqRkJJC4wO4lFropqKLFlwIXugieCku-kSd5B0M1tXhg8P59sh2Mkj0FqlQdMEWjsu3ScVF4DZjDHdJLU0j3wFGkXvcq5CjYvZlxjfFJFt_rqx89GxebovRT7nz-aNl3l9NNs3nK6uYLMzTOL-bW_lymi9nJnszH_dW_pCtvxf7ZCdU_VTX_lkl3ZPjbvPMbndOW81G244ZgA2Uc64UQwXIRRAK6jjoeb7QnqeUgxj0uKA9qCNjnnbB11Qo0DzUpeb7AVTJ4SabDEMZB5EcqOiPVwMZD2XjstuSyGkdoFQPNmocpdeRTHppX543LjrUcctTBohMYB3hF5Fra0E |
ContentType | Journal Article |
DBID | JDI ACYCR |
DEWEY | 621.382 |
DatabaseName | KoreaScience Korean Citation Index |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
DocumentTitleAlternate | A Study on Mobile Forensic Extraction Methods of Cellular and Smart Phone |
EISSN | 2713-9018 |
EndPage | 89 |
ExternalDocumentID | oai_kci_go_kr_ARTI_782433 JAKO201007637769747 |
GroupedDBID | .UV JDI ACYCR M~E |
ID | FETCH-LOGICAL-k633-32888aa67a3789cf9200755b9e55aa077cd892d347665e13be29a3e8fe075bbc3 |
ISSN | 1738-6667 |
IngestDate | Tue Nov 21 21:41:23 EST 2023 Fri Dec 22 11:59:02 EST 2023 |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Issue | 3 |
Keywords | JTAG Scheme Smart Phone Mobile Forensic Cellular Phone SYN Scheme |
Language | Korean |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-k633-32888aa67a3789cf9200755b9e55aa077cd892d347665e13be29a3e8fe075bbc3 |
Notes | KISTI1.1003/JNL.JAKO201007637769747 G704-SER000010259.2010.6.3.003 |
OpenAccessLink | http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO201007637769747&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01 |
PageCount | 11 |
ParticipantIDs | nrf_kci_oai_kci_go_kr_ARTI_782433 kisti_ndsl_JAKO201007637769747 |
PublicationCentury | 2000 |
PublicationDate | 2010-09 |
PublicationDateYYYYMMDD | 2010-09-01 |
PublicationDate_xml | – month: 09 year: 2010 text: 2010-09 |
PublicationDecade | 2010 |
PublicationTitle | (사)디지털산업정보학회 논문지, 6(3) |
PublicationTitleAlternate | Journal of the Korea Society of Digital Industry and Information Management |
PublicationYear | 2010 |
Publisher | (사)디지털산업정보학회 |
Publisher_xml | – name: (사)디지털산업정보학회 |
SSID | ssib036278585 ssib044734564 ssib008451690 ssib053377100 ssib026777133 |
Score | 1.4543356 |
Snippet | Cellular and Smart phone through the business and real life is associated with an increasing number of information processing, Breaches associated with mobile... |
SourceID | nrf kisti |
SourceType | Open Website Open Access Repository |
StartPage | 79 |
SubjectTerms | 컴퓨터학 |
Title | 휴대폰과 스마트폰의 모바일 포렌식 추출방법 연구 |
URI | http://click.ndsl.kr/servlet/LinkingDetailView?cn=JAKO201007637769747&dbt=JAKO&org_code=O481&site_code=SS1481&service_code=01 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001483544 |
Volume | 6 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
ispartofPNX | (사)디지털산업정보학회 논문지, 2010, 6(3), , pp.79-89 |
journalDatabaseRights | – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2713-9018 dateEnd: 99991231 omitProxy: true ssIdentifier: ssib044734564 issn: 1738-6667 databaseCode: M~E dateStart: 20050101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3NaxNBFB_anryIomL9KCs4pxLZ7MzOx3F3k1Ir6iVCb2G_IiUlgTS9eBCPUgu9VPTQgAfBD3oIfhQP_Yu6m__BN283zVYUquBlmZ355Tdv5m123pt9M0PI3TiqK9us6InSDjgoItQ1zTsCN0JOtYpslZgFzg8fidUnfG3dXZ-b36xELW0Po3vxs9-uK_kXrUIe6NWskv0LzZ6SQgakQb9wBQ3D9Vw6ps0G1QH1OW36VAUmagFy1Ar1IeFRn1E_WKZNKPCohyBPUqUQBMWqgg6oBi61jCBAK5OAAs3LMmRCuBcgyDY1Gm4firEWX5RwkwhKAk9jwqHaRZCWU-lcWu77WNrGYOsin2NqcPBnQFcwGrmLxnGUG2Gl3FDkIgakdbEyhl3SMLdaY8IDYbFtAPUL-YOSqKCGJ02AANV552nDeYUcqIBDzSBFJ7kVBQSmNt-uTqeYSABdnU75302tDDUShhpwHgtzI8U8R9aZCZhRlSGlOGtnapzo2bg9jVX4ZTg_s3F4N95oP-23u4M2uEf322AOcsbmyTy85U2Y6_Pm6btX8TNfTB0hpazPXAGwc2T1pALOJTM7EeF647Ih4N8Zp2cDzLTeoFMx01qXyMXSv7K84s9ymcx1-1dIY3LwLdt9Mdkbn3w9tvKd99mHl5OdH3Cfj95a2eeP2Xg_Hx1bk73D7N1u_mpk5Uf7-dFBNv6UfXlt5W_GJ98Pr5LWSrMVrNbK40NqXcFYjTlKqTAUMmRS6bijzay860Y6dd0wtKWME6WdhHEphJvWWZQ6OmSp6qQAi6KYXSMLvX4vvU4sITAK203tJORObIeMOWEEhjQTSSrt-iJZwoa3e8nWZnvNe_DYPFk2DN1SCuOwL5I70COojT9q5cY5MDfJhdkze4ssDAfb6W0wiofREmrzJ22Wikw |
linkProvider | ISSN International Centre |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%ED%9C%B4%EB%8C%80%ED%8F%B0%EA%B3%BC+%EC%8A%A4%EB%A7%88%ED%8A%B8%ED%8F%B0%EC%9D%98+%EB%AA%A8%EB%B0%94%EC%9D%BC+%ED%8F%AC%EB%A0%8C%EC%8B%9D+%EC%B6%94%EC%B6%9C%EB%B0%A9%EB%B2%95+%EC%97%B0%EA%B5%AC&rft.jtitle=%28%EC%82%AC%29%EB%94%94%EC%A7%80%ED%84%B8%EC%82%B0%EC%97%85%EC%A0%95%EB%B3%B4%ED%95%99%ED%9A%8C+%EB%85%BC%EB%AC%B8%EC%A7%80%2C+6%283%29&rft.au=%EC%9D%B4%EC%A0%95%ED%9B%88&rft.au=%EB%B0%95%EB%8C%80%EC%9A%B0&rft.date=2010-09-01&rft.pub=%28%EC%82%AC%29%EB%94%94%EC%A7%80%ED%84%B8%EC%82%B0%EC%97%85%EC%A0%95%EB%B3%B4%ED%95%99%ED%9A%8C&rft.issn=1738-6667&rft.eissn=2713-9018&rft.spage=79&rft.epage=89&rft.externalDBID=n%2Fa&rft.externalDocID=oai_kci_go_kr_ARTI_782433 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1738-6667&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1738-6667&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1738-6667&client=summon |