Analysing privacy-invasive software using computer forensic methods. http: // www. e-evidence. info/ b. html

Uložené v:
Podrobná bibliografia
Názov: Analysing privacy-invasive software using computer forensic methods. http: // www. e-evidence. info/ b. html
Autori: Martin Boldt, Bengt Carlsson
Prispievatelia: The Pennsylvania State University CiteSeerX Archives
Zdroj: http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf.
Rok vydania: 2006
Zbierka: CiteSeerX
Popis: User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. We present a computer forensic investigation method for detecting and analysing PIS. In an experiment we use this method to evaluate both the evolution of PIS and associated countermeasures, over a four year period. Background information on both PIS and countermeasure techniques are also presented, followed by discussions on legal disputes between developers of PIS and vendors of countermeasures. 1
Druh dokumentu: text
Popis súboru: application/pdf
Jazyk: English
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.2832
Dostupnosť: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.2832
http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf
Rights: Metadata may be used without restrictions as long as the oai identifier remains attached to it.
Prístupové číslo: edsbas.C72B0D47
Databáza: BASE
Popis
Abstrakt:User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. We present a computer forensic investigation method for detecting and analysing PIS. In an experiment we use this method to evaluate both the evolution of PIS and associated countermeasures, over a four year period. Background information on both PIS and countermeasure techniques are also presented, followed by discussions on legal disputes between developers of PIS and vendors of countermeasures. 1