一百零五學年度第二學期 (Spring 2017)「 數位鑑識研究」參考資料:

  1. 課程大綱

  2. 國立高雄師範大學行事曆

  3. 高雄師範大學開課資料查詢系統

  4. 學校選課學生名單

  5. 教科書:  Learning Android Forensics

  6. 參考書: Android Forensics

  7. 參考書: Handbook of Digital Forensics and Investigation

  8. 4/11   蕭惠珍

    Chapter 1  INTRODUCING ANDROID FORENSICS

    4/18   林紀睿

    Chapter 2 SETTING UP AN ANDROID FORENSIC ENVIRONMENT

    4/25   唐劍飛

    Chapter 3 UNDERSTANDING DATA STORAGE ON ANDROID DEVICES

    5/2     潘建均

    Chapter 4 EXTRACTING DATA LOGICALLY FROM ANDROID DEVICES

    5/9     陳瑞羚

    Chapter 5 EXTRACTING DATA PHYSICALLY FROM ANDROID DEVICES

    5/16   蕭惠珍

    Chapter 6 RECOVERING DELETED DATA FROM AN ANDROID DEVICE

    5/23   梁珮媚

    Chapter 7 FORENSIC ANALYSIS OF ANDROID APPLICATIONS

  9. 論文研讀:

         林紀睿

    (1) A Forensically Sound Adversary Model for Mobile Devices

         陳瑞羚

    (2) Android Anti-forensics Modifying CyanogenMod

         潘建均

    (3) Android forensics Automated data collection and reporting from a mobile device 

         蕭惠珍          

    (4) Android Malware Analysis Based On Memory Forensics

          蕭惠珍

    (5) Developing Process for Mobile Device Forensics

          唐劍飛

    (6) Evaluating the privacy of Android mobile applications under forensic analysis

         梁珮媚

    (7) The State of the Art Forensic Techniques in Mobile Cloud Environment

    臺灣博碩士論文知識加值系統

  10. Computer & Digital Forensics as a Career, https://www.youtube.com/watch?v=QPi6fQNwxbI

  11. Bill Dean: What is Digital Forensics?, https://www.youtube.com/watch?v=nYrLwbBl_sE

  12. OWASP Cape Town: Introduction to Digital Forensics, https://www.youtube.com/watch?v=4ns1uuX4RD4

  13. Keyun Ruan: Cloud Forensics, https://www.youtube.com/watch?v=GDVBOekv7j4

  14. Andrew Hoog: A Geek's Guide to Digital Forensics, June 16, 2011

  15. Mobile device forensics, https://en.wikipedia.org/wiki/Mobile_device_forensics

  16. 碩士論文 Toma S. Vasa, Mobile phone: identifying configuration signatures of local devices absent from XRY, Auckland University of Technology, 2013.
  17. 哪位「大神」幫FBI破解了iPhone
  18. CSI犯罪現場

  19. 網路犯罪現場 CSI: Cyber, http://www.cbs.com/shows/csi-cyber/

  20. 熱門影片 - CSI犯罪现场:网络犯罪, https://www.youtube.com/results?search_query=csi+cyber

  21. 神探狄仁傑

  22. Detecting Maliciousness Using Periodic Mobile Forensics, https://www.youtube.com/watch?v=r8uU_mOo6C0

  23. Forensics - Cyanide & Happiness Shorts,http://zadrottv.ru/video/yzbCYMNfl2r4/-/Forensics%20-%20Cyanide%20&%20Happiness%20Shorts

  24. Smartphone Security is Getting Stronger Are Your Forensic Methods Getting Weaker, https://www.youtube.com/watch?v=330Zifjkivk

  25. CSI: Cyber – “All I got is green code”,https://www.youtube.com/watch?v=rzMwku95lRE

  26. Behind the Magic: The Visual Effects of Jurassic World,https://www.youtube.com/watch?v=5a7JKjVB8rs

  27. 臺灣鑑識科學學會(Taiwan Academy of Forensic Sciences), http://tafs.cid.cpu.edu.tw/

  28. High Technology Crime Investigation Association (HTCIA), http://www.htcia.org

  29. Information Security and Forensics Society (ISFS)資訊保安及法證公會, http://www.isfs.org.hk

  30. The First International Conference on Digital Forensics and Investigation (ICDFI), 2012, http://secmeeting.ihep.ac.cn

  31. 计算机法证技术峰会 (China Computer Forensics Conference, CCFC), http://www.china-forensic.com/

  32. 2012年數位鑑識與科技偵查研討會,http://www.im.cpu.edu.tw/conference2012/ 

  33. International Workshop on Digital-forensics and Watermarking (IWDW), http://infosec.sjtu.edu.cn:8081/IWDW/home.jsp

  34. International Conference on Digital Forensics & Cyber Crime (ICDF2C), http://d-forensics.org

  35. Hacking and Securing iOS Applications Google book預覽

  36. Crime Scene Investigation

  37. iPhone鑑識工具分類

  38. iPhoneBrowser

  39. SQLite Database Browser

  40. LinuxSleuthing

  41. Youtube: What is Digital Forensics?

  42. Youtube: Mobile Digital Forensics for Law Enforcement

  43. Youtube: What is XRY

  44. 警視庁鑑識班2004 INVESTIGATION

  45. 李昌鈺刑事鑑定指導手冊 Henry Lee's Crime Scene Handbook

  46. Four-Way Linkage Theory

  47. 法務部 個人資料保護

  48. Inside Stalin's Darkroom

  49. Can Digital Photos Be Trusted?

  50. Embedded data

  51. iTunes U

  52. American Society of Crime Laboratory Directors/Laboratory Accreditation Board (ASCLD/LAB)

  53. Digital Investigation期刊

  54. Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition, National Institute of Justice, 2008

  55. Forensics 相關書籍

  56. Cold Boot Attacks on Encryption Keys, source codes

  57. Computer Hacking Forensic Investigator (CHFI)

  58. International Society of Forensic Computer Examiners (ISFCE)

  59. GCFA: GIAC Certification Forensic Analyst

  60. ISO 27037 (draft): Guidelines for identification, collection, acquisition, and preservation of digital evidence

  61. ISO 27041 (draft): Guidance on assuring suitability and adequacy of investigation methods

  62. ISO 27042 (draft): Guidelines for the analysis & interpretation of digital evidence

  63. ISO 27043 (draft): Investigation principles and processes

  64. FTK Imager

  65. xxcopy

  66. McAfee Free Forensic Tools

  67. Microsoft's robocopy

  68. Microsoft's記錄檔剖析器 Log Parser 2.2

  69. MiTeC's Windows File Analyzer

  70. MiTeC's Windows Registry Recovery

  71. EMF Spool Viewer

  72. srm (secure remove)

  73. TSK (The Sleuth Kit)

  74. Sysinternals Live

  75. The 2009 Socha-Gelbmann Electronic Discovery Survey

  76. Digital Evidence: Standards and Principles

  77. Why Is Computer Forensics Important?

  78. Computer Forensic Software for Windows

  79. Computer Forensics Tool Testing (CFTT) Project, US National Institute of Standards and Technology (NIST)

  80. National Software Reference Library, US National Institute of Standards and Technology (NIST)

  81. 開放原始碼鑑識工具Open Source Digital Forensics

  82. The Electronic Evidence Information Center, http://www.e-evidence.info/ 

  83. Computer Forensics, Cybercrime and Steganography Resources, http://www.forensics.nl/

  84. American Academy of Forensic Sciences (AAFS)

  85. Guidelines for Best Practice in the Forensic Examination of Digital Technology

  86. SciVerse ScienceDirect TOP25 Hottest Articles in Digital Investigation : October to December 2010

  87. 美國的電腦鑑識實驗室(RCFL, Regional Computer Forensics Laboratory)

  88. How to crash a phone by SMS 利用簡訊使手機當機

 

1: INTRODUCING ANDROID FORENSICS
2: SETTING UP AN ANDROID FORENSIC ENVIRONMENT
3: UNDERSTANDING DATA STORAGE ON ANDROID DEVICES
4: EXTRACTING DATA LOGICALLY FROM ANDROID DEVICES
5: EXTRACTING DATA PHYSICALLY FROM ANDROID DEVICES
6: RECOVERING DELETED DATA FROM AN ANDROID DEVICE
7: FORENSIC ANALYSIS OF ANDROID APPLICATIONS
8: ANDROID FORENSIC TOOLS OVERVIEW