CD-R Acquisition Hashes Affected by Write Options
نویسندگان
چکیده
During the copy-editing of your paper, the following queries arose. Please respond to these by marking up your proofs with the necessary changes/additions. Please write your answers on the query sheet if there is insufficient space on the page proofs. If returning the proof by fax do not write too close to the paper’s edge. Please remember that illegible mark-ups may delay publication. Many thanks for your assistance.
منابع مشابه
Operating system security by integrity checking and recovery using write-protected storage
The paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write p...
متن کاملPhysiological responses of Celtis caucasica L. and Robinia pseudoacacia L. to the cadmium and lead stresses
Afforestation of contaminated areas is considered as a possible strategy for reduction of contaminations. In the present study, the effects of lead (Pb) and cadmium (Cd) were investigated on chlorophyll fluorescence parameters (Fv/Fm, Fo, and Fm), photosynthetic pigments (chlorophyll a, b, and total chlorophyll), and proline in one-year-old seedlings of Celtis caucasica and Robinia pseudoacacia...
متن کاملUnifying File System Protection
This paper describes an efficient and elegant architecture for unifying the meta-data protection of journaling file systems with the data integrity protection of collision-resistant cryptographic hashes. Traditional file system journaling protects the ordering of meta-data operations to maintain consistency in the presence of crashes. However, journaling does not protect important system meta-d...
متن کاملLow Budget Forensic Drive Imaging Using ARM Based Single Board Computers
Traditional forensic analysis of hard disks and external media typically involves a “dead analysis” of a powered down machine. Forensic acquisition of hard drives and external media has traditionally been accomplished by one of several means: standalone forensic duplicator; using a hardware write-blocker or dock attached to a laptop, computer, workstation, etc.; forensic operating systems that ...
متن کاملFactors Affecting One-Way Hashing of CD-R Media
While conducting a validation study of proficiency test media we found that applying the same hash algorithm against a single CD using different forensic applications resulted in different hash values. We formulated a series of experiments to determine the cause of the anomalous hash values. Our results suggest that certain write options cause forensic applications to report different hash valu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Digital Forensic Practice
دوره 1 شماره
صفحات -
تاریخ انتشار 2006