Cedric J. Jeannot, Ibrahim N. Imam, Adel Said Elmaghraby
{"title":"使用java设计防取证应用程序","authors":"Cedric J. Jeannot, Ibrahim N. Imam, Adel Said Elmaghraby","doi":"10.1109/SADFE.2009.14","DOIUrl":null,"url":null,"abstract":"Over the years, JavaTM has become a popular language for standalone as well as web based applications. Portability and security are the major reasons for JavaTM’s success and increased level of adoption in various application domains. When evaluating security, Forensics is another area with continuous increasing interest. With research progress of the previous years efficient tools for reconstructing data from improperly deleted documents are available and opened the door for a whole new set of concerns to look at to insure security. In this paper we are describing our work in progress that is related to establishing a JavaTM framework that evaluates the traces left by JavaTM applications in order to then be able to design forensics resistant JavaTM applications.","PeriodicalId":101922,"journal":{"name":"2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Using JavaTM to Design Forensically Resistant Applications\",\"authors\":\"Cedric J. Jeannot, Ibrahim N. Imam, Adel Said Elmaghraby\",\"doi\":\"10.1109/SADFE.2009.14\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Over the years, JavaTM has become a popular language for standalone as well as web based applications. Portability and security are the major reasons for JavaTM’s success and increased level of adoption in various application domains. When evaluating security, Forensics is another area with continuous increasing interest. With research progress of the previous years efficient tools for reconstructing data from improperly deleted documents are available and opened the door for a whole new set of concerns to look at to insure security. In this paper we are describing our work in progress that is related to establishing a JavaTM framework that evaluates the traces left by JavaTM applications in order to then be able to design forensics resistant JavaTM applications.\",\"PeriodicalId\":101922,\"journal\":{\"name\":\"2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering\",\"volume\":\"67 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SADFE.2009.14\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SADFE.2009.14","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Using JavaTM to Design Forensically Resistant Applications
Over the years, JavaTM has become a popular language for standalone as well as web based applications. Portability and security are the major reasons for JavaTM’s success and increased level of adoption in various application domains. When evaluating security, Forensics is another area with continuous increasing interest. With research progress of the previous years efficient tools for reconstructing data from improperly deleted documents are available and opened the door for a whole new set of concerns to look at to insure security. In this paper we are describing our work in progress that is related to establishing a JavaTM framework that evaluates the traces left by JavaTM applications in order to then be able to design forensics resistant JavaTM applications.