지원사업
학술연구/단체지원/교육 등 연구자 활동을 지속하도록 DBpia가 지원하고 있어요.
커뮤니티
연구자들이 자신의 연구와 전문성을 널리 알리고, 새로운 협력의 기회를 만들 수 있는 네트워킹 공간이에요.
이용수19
목차국문초록··················································································· ⅰ표 목 차 ··················································································· ⅴ그림목차··················································································· ⅵI. 서론 ··················································································· 11. 연구의 배경 ··············································································· 12. 연구의 목적 ··············································································· 2II. 선행 연구 및 배경 지식 ·············································· 41. 선행 연구 ··················································································· 4가. 안티포렌식 동향 ·································································· 4나. 데이터 은닉에 대한 안티포렌식 연구···························· 52. 배경 지식 ··················································································· 7가. 파일 시스템·········································································· 7(1) 파티션 관리···································································· 9(2) Bootloader····································································· 14나. 실행파일 역공학 ································································ 15(1) 정적 분석······································································ 16(2) 동적 분석······································································ 22III. 은닉 영역 파일 시스템 및부트로더 분석····························································· 281. 은닉 영역 생성 도구 소개 ··················································· 28가. FbinstTool·········································································· 28나. Bootice················································································ 31다. EasyBoot············································································ 342. 생성된 은닉 영역 구조 분석 ··············································· 37가. FbinstTool ···················································································· 37나. Bootice ·························································································· 45다. EasyBoot ······················································································ 533. 은닉 운영체제 부팅 과정 분석··········································· 56IV. 은닉 영역을 활용한 안티포렌식···························· 641. 데이터 은닉 안티포렌식 ······················································· 64가. FbinstTool을 사용한 데이터 은닉 및 와이핑(Wiping) 기법····················· 64나. Bootice로 생성한 은닉 영역에 파일 저장 기법 ······································ 65다. Bootice 및 EasyBoot로 생성한 은닉 영역 탐지 회피 기법······················ 662. 은닉된 Bootable OS 안티포렌식 ········································ 68V. 안티포렌식 대응·························································· 731. 은닉 영역 탐지 및 추출······················································· 73가. 은닉 영역 탐지 ·································································· 74나. 데이터 추출········································································ 76다. 데이터 카빙(Carving)······················································ 772. 은닉된 Bootable OS 사용 흔적·········································· 78가. NTFS 로그 파일 분석···················································· 79나. NTFS ADS 분석······························································ 81다. Windows 휴지통 아티팩트 분석··································· 833. 탐지 도구 ················································································· 85VI. 고찰·············································································· 89VII. 결론············································································· 90참고문헌 ··········································································· 92영문초록(Abstract) ························································ 96
0