ADS Analytics on NTFS Date-time Stamps for Event Reconstruction
碩士 === 中央警察大學 === 資訊管理研究所 === 107 === Alternate Data Stream (ADS) can be stored into existing files without affecting their functionality, size, or display. Executables in ADS can be executed from the command line. It is common for attackers to hide malware in cover media (files or folders) by ADS c...
Main Authors: | CHEN, YUAN-PEI, 陳元培 |
---|---|
Other Authors: | Kao, Da-Yu |
Format: | Others |
Language: | en_US |
Published: |
2018
|
Online Access: | http://ndltd.ncl.edu.tw/handle/m2hamv |
Similar Items
-
File Time of Forensic Evidence – Example of NTFS and ExtX
by: Shih-Kang Yen, et al.
Published: (2010) -
STEALTH: A Method of Hiding and Encrypting Files in NTFS
by: Syun-cheng Ou, et al.
Published: (2013) -
System Design of Active Detection for Alternate Data Streams in the NTFS File
by: Wen-Tang Tseng, et al.
Published: (2012) -
Computer Forensics Method in Analysis of Files Timestamps in Microsoft Windows Operating System and NTFS File System
by: Vesta Sergeevna Matveeva, et al.
Published: (2013-02-01) -
Date-stamping US housing market explosivity
by: Mehmet Balcilar, et al.
Published: (2017-07-01)