一百零五學年度第二學期 (Spring 2017)「 數位鑑識研究」參考資料:

  1. 課程大綱

  2. 國立高雄師範大學行事曆

  3. 高雄師範大學開課資料查詢系統

  4. 學校選課學生名單

  5. 教科書:  Learning Android Forensics

  6. 參考書: Android Forensics

  7. 參考書: Handbook of Digital Forensics and Investigation

  8. 4月4日清明節停課

  9. 5月23日不上課,調課到4月25日、5月2日、5月9日

  10. 5月30日端午節停課

  11. 6月20日不上課,調課

  12. 4/11   卓明逸, 報告已交

    Chapter 1  INTRODUCING ANDROID FORENSICS

    4/18   林紀睿, 報告已交

    Chapter 2 SETTING UP AN ANDROID FORENSIC ENVIRONMENT

    4/25   唐劍飛, 報告已交

    Chapter 3 UNDERSTANDING DATA STORAGE ON ANDROID DEVICES

    5/2     潘建均, 報告已交

    Chapter 4 EXTRACTING DATA LOGICALLY FROM ANDROID DEVICES

    5/9     陳瑞羚, 報告已交

    Chapter 5 EXTRACTING DATA PHYSICALLY FROM ANDROID DEVICES

    5/16   蕭惠珍, 報告已交

    Chapter 6 RECOVERING DELETED DATA FROM AN ANDROID DEVICE

    6/6     梁珮媚, 報告已交

    Chapter 7 FORENSIC ANALYSIS OF ANDROID APPLICATIONS

  13. 6月13日上課前繳交Chapter 1-7報告

  14. 論文研讀:

       6/6    林紀睿, 報告已交

    (1) A Forensically Sound Adversary Model for Mobile Devices

       6/6    陳瑞羚, 報告已交

    (2) Android Anti-forensics Modifying CyanogenMod

       6/13  潘建均, 報告已交

    (3) Android forensics Automated data collection and reporting from a mobile device 

       6/13  卓明逸, 報告已交  

    (4) Android Malware Analysis Based On Memory Forensics

        6/13  蕭惠珍, 報告已交

    (5) Developing Process for Mobile Device Forensics

        6/20  唐劍飛, 報告已交

    (6) Evaluating the privacy of Android mobile applications under forensic analysis

       6/20  梁珮媚, 報告已交

    (7) The State of the Art Forensic Techniques in Mobile Cloud Environment

  15. 6月22日前繳交論文報告

  16. 學生怎樣給老師發郵件?

  17. 臺灣博碩士論文知識加值系統

  18. Computer & Digital Forensics as a Career, https://www.youtube.com/watch?v=QPi6fQNwxbI

  19. Bill Dean: What is Digital Forensics?, https://www.youtube.com/watch?v=nYrLwbBl_sE

  20. OWASP Cape Town: Introduction to Digital Forensics, https://www.youtube.com/watch?v=4ns1uuX4RD4

  21. Keyun Ruan: Cloud Forensics, https://www.youtube.com/watch?v=GDVBOekv7j4

  22. Andrew Hoog: A Geek's Guide to Digital Forensics, June 16, 2011

  23. Mobile device forensics, https://en.wikipedia.org/wiki/Mobile_device_forensics

  24. Android forensics, https://www.youtube.com/results?search_query=android+forensics

  25. Mobile Forensics Tools - Hardware, https://www.youtube.com/watch?v=THPsfe6eB2c

  26. How to Perform Forensic Examination of an Android Smartphone with Cellebrite, https://www.youtube.com/watch?v=ZgXtKeFr6kw

  27. 碩士論文 Toma S. Vasa, Mobile phone: identifying configuration signatures of local devices absent from XRY, Auckland University of Technology, 2013.
  28. 哪位「大神」幫FBI破解了iPhone
  29. CSI犯罪現場

  30. 網路犯罪現場 CSI: Cyber, http://www.cbs.com/shows/csi-cyber/

  31. 熱門影片 - CSI犯罪现场:网络犯罪, https://www.youtube.com/results?search_query=csi+cyber

  32. 神探狄仁傑

  33. Detecting Maliciousness Using Periodic Mobile Forensics, https://www.youtube.com/watch?v=r8uU_mOo6C0

  34. Forensics - Cyanide & Happiness Shorts,http://zadrottv.ru/video/yzbCYMNfl2r4/-/Forensics%20-%20Cyanide%20&%20Happiness%20Shorts

  35. Smartphone Security is Getting Stronger Are Your Forensic Methods Getting Weaker, https://www.youtube.com/watch?v=330Zifjkivk

  36. CSI: Cyber – “All I got is green code”,https://www.youtube.com/watch?v=rzMwku95lRE

  37. Behind the Magic: The Visual Effects of Jurassic World,https://www.youtube.com/watch?v=5a7JKjVB8rs

  38. 臺灣鑑識科學學會(Taiwan Academy of Forensic Sciences), http://tafs.cid.cpu.edu.tw/

  39. High Technology Crime Investigation Association (HTCIA), http://www.htcia.org

  40. Information Security and Forensics Society (ISFS)資訊保安及法證公會, http://www.isfs.org.hk

  41. The First International Conference on Digital Forensics and Investigation (ICDFI), 2012, http://secmeeting.ihep.ac.cn

  42. 计算机法证技术峰会 (China Computer Forensics Conference, CCFC), http://www.china-forensic.com/

  43. 2012年數位鑑識與科技偵查研討會,http://www.im.cpu.edu.tw/conference2012/ 

  44. International Workshop on Digital-forensics and Watermarking (IWDW), http://infosec.sjtu.edu.cn:8081/IWDW/home.jsp

  45. International Conference on Digital Forensics & Cyber Crime (ICDF2C), http://d-forensics.org

  46. Hacking and Securing iOS Applications Google book預覽

  47. Crime Scene Investigation

  48. iPhone鑑識工具分類

  49. iPhoneBrowser

  50. SQLite Database Browser

  51. LinuxSleuthing

  52. Youtube: What is Digital Forensics?

  53. Youtube: Mobile Digital Forensics for Law Enforcement

  54. Youtube: What is XRY

  55. 警視庁鑑識班2004 INVESTIGATION

  56. 李昌鈺刑事鑑定指導手冊 Henry Lee's Crime Scene Handbook

  57. Four-Way Linkage Theory

  58. 法務部 個人資料保護

  59. Inside Stalin's Darkroom

  60. Can Digital Photos Be Trusted?

  61. Embedded data

  62. iTunes U

  63. American Society of Crime Laboratory Directors/Laboratory Accreditation Board (ASCLD/LAB)

  64. Digital Investigation期刊

  65. Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition, National Institute of Justice, 2008

  66. Forensics 相關書籍

  67. Cold Boot Attacks on Encryption Keys, source codes

  68. Computer Hacking Forensic Investigator (CHFI)

  69. International Society of Forensic Computer Examiners (ISFCE)

  70. GCFA: GIAC Certification Forensic Analyst

  71. ISO 27037 (draft): Guidelines for identification, collection, acquisition, and preservation of digital evidence

  72. ISO 27041 (draft): Guidance on assuring suitability and adequacy of investigation methods

  73. ISO 27042 (draft): Guidelines for the analysis & interpretation of digital evidence

  74. ISO 27043 (draft): Investigation principles and processes

  75. FTK Imager

  76. xxcopy

  77. McAfee Free Forensic Tools

  78. Microsoft's robocopy

  79. Microsoft's記錄檔剖析器 Log Parser 2.2

  80. MiTeC's Windows File Analyzer

  81. MiTeC's Windows Registry Recovery

  82. EMF Spool Viewer

  83. srm (secure remove)

  84. TSK (The Sleuth Kit)

  85. Sysinternals Live

  86. The 2009 Socha-Gelbmann Electronic Discovery Survey

  87. Digital Evidence: Standards and Principles

  88. Why Is Computer Forensics Important?

  89. Computer Forensic Software for Windows

  90. Computer Forensics Tool Testing (CFTT) Project, US National Institute of Standards and Technology (NIST)

  91. National Software Reference Library, US National Institute of Standards and Technology (NIST)

  92. 開放原始碼鑑識工具Open Source Digital Forensics

  93. The Electronic Evidence Information Center, http://www.e-evidence.info/ 

  94. Computer Forensics, Cybercrime and Steganography Resources, http://www.forensics.nl/

  95. American Academy of Forensic Sciences (AAFS)

  96. Guidelines for Best Practice in the Forensic Examination of Digital Technology

  97. SciVerse ScienceDirect TOP25 Hottest Articles in Digital Investigation : October to December 2010

  98. 美國的電腦鑑識實驗室(RCFL, Regional Computer Forensics Laboratory)

  99. How to crash a phone by SMS 利用簡訊使手機當機

 

1: INTRODUCING ANDROID FORENSICS
2: SETTING UP AN ANDROID FORENSIC ENVIRONMENT
3: UNDERSTANDING DATA STORAGE ON ANDROID DEVICES
4: EXTRACTING DATA LOGICALLY FROM ANDROID DEVICES
5: EXTRACTING DATA PHYSICALLY FROM ANDROID DEVICES
6: RECOVERING DELETED DATA FROM AN ANDROID DEVICE
7: FORENSIC ANALYSIS OF ANDROID APPLICATIONS
8: ANDROID FORENSIC TOOLS OVERVIEW