Nothing Special   »   [go: up one dir, main page]

Burke et al., 2007 - Google Patents

Xbox forensics

Burke et al., 2007

View PDF
Document ID
10444215011345009357
Author
Burke P
Craiger P
Publication year
Publication venue
Journal of Digital Forensic Practice

External Links

Snippet

Microsoft's Xbox game console is little more than a low-end personal computer; with a small amount of effort it can be modified to run additional operating systems, enabling it to store gigabytes worth of non-game-related files in addition to allowing it to run various computer …
Continue reading at www.tandfonline.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30067File systems; File servers
    • G06F17/30129Details of further file system functionalities
    • G06F17/30144Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/14Fourier, Walsh or analogous domain transformations, e.g. Laplace, Hilbert, Karhunen-Loeve, transforms
    • G06F17/141Discrete Fourier transforms
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Similar Documents

Publication Publication Date Title
Zdziarski iPhone forensics: recovering evidence, personal data, and corporate assets
Hoog et al. iPhone and iOS forensics: Investigation, analysis and mobile security for Apple iPhone, iPad and iOS devices
TW494341B (en) Displaying images during boot-up and shutdown
US8656095B2 (en) Digital forensic acquisition kit and methods of use thereof
Tamma et al. Learning android forensics
AU2010226518A1 (en) Hybrid storage device
Afonin et al. Mobile Forensics–Advanced Investigative Strategies
Pessolano et al. Forensic analysis of the nintendo 3ds nand
Parasram Digital Forensics with Kali Linux: Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019. x
Burke et al. Xbox forensics
Huber et al. A flexible framework for mobile device forensics based on cold boot attacks
Wong Forensic analysis of the windows registry
US20080271156A1 (en) Methods and systems for searching protected digital content and non-protected digital content
Skulkin et al. Windows forensics cookbook
Parasram Digital Forensics with Kali Linux: Perform data acquisition, digital investigation, and threat analysis using Kali Linux tools
Conrad et al. Forensic analysis of a Playstation 3 console
Kävrestad et al. Collecting Data
Neal Forensic recovery of evidence from deleted Oracle VirtualBox virtual machines
Burke et al. Forensic analysis of Xbox consoles
Varsalone Mac OS X, iPod, and iPhone forensic analysis DVD toolkit
Halsey et al. Windows registry troubleshooting
Burke Paul K. Burke and J. Philip Craiger
Lim et al. On-the-spot digital investigation by means of LDFS: Live Data Forensic System
Bott et al. Windows 7 inside out
Van Vugt et al. Beginning the Linux Command Line