Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A research on the investigation method of digital forensics for a VMware Workstation's virtual machine

Full metadata record
DC Field Value Language
dc.contributor.authorLim, Sungsu-
dc.contributor.authorYoo, Byeongyeong-
dc.contributor.authorPark, Jungheum-
dc.contributor.authorByun, KeunDuck-
dc.contributor.authorLee, Sangjin-
dc.date.accessioned2021-09-06T23:15:28Z-
dc.date.available2021-09-06T23:15:28Z-
dc.date.created2021-06-18-
dc.date.issued2012-01-
dc.identifier.issn0895-7177-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/109117-
dc.description.abstractVirtualization is a technology that uses a logical environment to overcome physical limitations in hardware. Recently, its coverage has become broader. Because a virtual machine can perform the same role as an actual system, a recorded user's activity trail in the virtual machine is important factor in terms of digital forensics. If the investigator found trails of the VMware Workstation on the host, he should investigate the virtual machine along with host system. However, due to a lack of understanding of the virtual machine, the investigation process is not clear. Moreover, a damaged virtual machine image is difficult to investigate because of the structural characteristics. Therefore, we need a technical understanding and a research about investigation procedures and recovery methods on the virtual machine. In this research, we suggest an investigation procedure of digital forensics and a recovery method on damaged images for the VMware Workstation that has the largest number of users. (C) 2011 Elsevier Ltd. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherPERGAMON-ELSEVIER SCIENCE LTD-
dc.titleA research on the investigation method of digital forensics for a VMware Workstation's virtual machine-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Sangjin-
dc.identifier.doi10.1016/j.mcm.2011.02.011-
dc.identifier.scopusid2-s2.0-82755194854-
dc.identifier.wosid000296919500018-
dc.identifier.bibliographicCitationMATHEMATICAL AND COMPUTER MODELLING, v.55, no.1-2, pp.151 - 160-
dc.relation.isPartOfMATHEMATICAL AND COMPUTER MODELLING-
dc.citation.titleMATHEMATICAL AND COMPUTER MODELLING-
dc.citation.volume55-
dc.citation.number1-2-
dc.citation.startPage151-
dc.citation.endPage160-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaMathematics-
dc.relation.journalWebOfScienceCategoryComputer Science, Interdisciplinary Applications-
dc.relation.journalWebOfScienceCategoryComputer Science, Software Engineering-
dc.relation.journalWebOfScienceCategoryMathematics, Applied-
dc.subject.keywordAuthorDigital forensics-
dc.subject.keywordAuthorVirtualization-
dc.subject.keywordAuthorVMware-
dc.subject.keywordAuthorVirtual machine-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher LEE, SANG JIN photo

LEE, SANG JIN
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE