英文摘要
|
According to the massive development of mobile and communications technology, the mobile devices now are highly performed in personal information capacity and the mobility, both of the powerful hardware and software are encouraging the dependence of full aspects. Whereas, the means of the phone based swindles, MMS and mobile malicious code attacks also evolve everyday, which makes the mobile devices become the high-tech crime tool used by many offenders. First of all, this study will be directed against the static analysis of the malicious code attacks, and then conduct in-depth analysis of which dynamically to compromise digital evidence forensics procedures and regulations, then set them up. Accordingly, for the forensic officers, they can merely use the software against mobile communication as the main tools by following the procedure to accomplish their duty. This will ensure the proper preservation of evidence Chain of Custody ( CoC), to facilitate proceeding investigation and analysis by providing digital evidence. Eventually, to reinforce integrity, consistency and accuracy of the digital evidence in the court of law.
|
参考文献
|
-
張志汖(2015)。數位證據保全。中華民國電腦稽核協會月刊,31
連結:
-
美國統一證據法則, http://law.upenn.edu/bll/ulc, last visited on August 4, 2015.
-
Wikipedia, Chain of custody, http://en.wikidia.org/wiki/Chain_of_custody, last visited on August 1, 2015.
-
Cardwell, Kevin,Clintonetc, Timothy(2007).The Best Damn Cybercrime and Digital Forensics Book Period.Syngress Media PRESS.
-
Casey, Eoghan(2002).Handbook of Computer, Crime Investigation.USA:ACADEMIC PRESS.
-
Chang, Chih-Pai,Chen, Chun-Te,Lu, Tsung-Hui,Lin, I-Long,Chang, Jesse(2013).Study on Constructing Malware Attack Forensic Procedure of Digital Evidence.2013, IEEE International Conference on System Science and Engineering,Budapest Hungary:
-
Kruse, Warren G.,Heiser, Jay G.(2001).Computer Forensics: Incident Response Essentials.Addsion- Wesley PRESS.
-
Kuchta, Kelly J.(2001).Criminal Computer Forensics Management.New York USA:AMC.
-
Marcella, Albert J., Jr.,Menendez, Doug(2008).Cyber Forensics A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes.AUERBACH PUBLICATIONS.
-
National Institute of Standards and Technology=NIST(2006).,National Institute of Standards and Technology=NIST.
-
U.S. Department of Justice(1999).Forensic Examination of Digital Evidence: A Guide for Law Enforcement.
-
于朝(2002)。檢察機關數位證據蒐集與固定。中國法易網出版。
-
吳穩男、林宜隆、張志汖(2009)。建構數字證據取證標準作業程序與有效性之研究─以智慧型手機為例。台北大學2009全國計算機研討會
-
林一德(2000)。台灣大學法律研究所。
-
林宜隆、朱惠中、張志汖(2008)。數位證據鑑識標準作業程序與案例驗證之建構─以Windows XP 系統為例。華梵大學2008 數位科技與創新管理研討會
|