Analysing privacy-invasive software using computer forensic methods. http: // www. e-evidence. info/ b. html
Saved in:
| Title: | Analysing privacy-invasive software using computer forensic methods. http: // www. e-evidence. info/ b. html |
|---|---|
| Authors: | Martin Boldt, Bengt Carlsson |
| Contributors: | The Pennsylvania State University CiteSeerX Archives |
| Source: | http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf. |
| Publication Year: | 2006 |
| Collection: | CiteSeerX |
| Description: | User privacy is widely affected by the occurrence of privacy-invasive software (PIS) on the Internet. We present a computer forensic investigation method for detecting and analysing PIS. In an experiment we use this method to evaluate both the evolution of PIS and associated countermeasures, over a four year period. Background information on both PIS and countermeasure techniques are also presented, followed by discussions on legal disputes between developers of PIS and vendors of countermeasures. 1 |
| Document Type: | text |
| File Description: | application/pdf |
| Language: | English |
| Relation: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.2832 |
| Availability: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.97.2832 http://www.bth.se/tek/aps/mbo.nsf/(WebFiles)/D479A9073670E372C125710D0041B265/$FILE/DIMVA06-BoldtCarlsson.pdf |
| Rights: | Metadata may be used without restrictions as long as the oai identifier remains attached to it. |
| Accession Number: | edsbas.C72B0D47 |
| Database: | BASE |
Be the first to leave a comment!
Nájsť tento článok vo Web of Science