Burke et al., 2007 - Google Patents
Xbox forensicsBurke et al., 2007
View PDF- Document ID
- 10444215011345009357
- Author
- Burke P
- Craiger P
- Publication year
- Publication venue
- Journal of Digital Forensic Practice
External Links
Snippet
Microsoft's Xbox game console is little more than a low-end personal computer; with a small amount of effort it can be modified to run additional operating systems, enabling it to store gigabytes worth of non-game-related files in addition to allowing it to run various computer …
- 238000004458 analytical method 0 abstract description 34
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/30144—Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
- G06F21/645—Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3476—Data logging
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/10—Complex mathematical operations
- G06F17/14—Fourier, Walsh or analogous domain transformations, e.g. Laplace, Hilbert, Karhunen-Loeve, transforms
- G06F17/141—Discrete Fourier transforms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zdziarski | iPhone forensics: recovering evidence, personal data, and corporate assets | |
Hoog et al. | iPhone and iOS forensics: Investigation, analysis and mobile security for Apple iPhone, iPad and iOS devices | |
TW494341B (en) | Displaying images during boot-up and shutdown | |
US8656095B2 (en) | Digital forensic acquisition kit and methods of use thereof | |
Tamma et al. | Learning android forensics | |
AU2010226518A1 (en) | Hybrid storage device | |
Afonin et al. | Mobile Forensics–Advanced Investigative Strategies | |
Pessolano et al. | Forensic analysis of the nintendo 3ds nand | |
Parasram | Digital Forensics with Kali Linux: Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019. x | |
Burke et al. | Xbox forensics | |
Huber et al. | A flexible framework for mobile device forensics based on cold boot attacks | |
Wong | Forensic analysis of the windows registry | |
US20080271156A1 (en) | Methods and systems for searching protected digital content and non-protected digital content | |
Skulkin et al. | Windows forensics cookbook | |
Parasram | Digital Forensics with Kali Linux: Perform data acquisition, digital investigation, and threat analysis using Kali Linux tools | |
Conrad et al. | Forensic analysis of a Playstation 3 console | |
Kävrestad et al. | Collecting Data | |
Neal | Forensic recovery of evidence from deleted Oracle VirtualBox virtual machines | |
Burke et al. | Forensic analysis of Xbox consoles | |
Varsalone | Mac OS X, iPod, and iPhone forensic analysis DVD toolkit | |
Halsey et al. | Windows registry troubleshooting | |
Burke | Paul K. Burke and J. Philip Craiger | |
Lim et al. | On-the-spot digital investigation by means of LDFS: Live Data Forensic System | |
Bott et al. | Windows 7 inside out | |
Van Vugt et al. | Beginning the Linux Command Line |