메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색

논문 기본 정보

자료유형
학위논문
저자정보

홍표길 (부산가톨릭대학교, 부산가톨릭대학교 일반대학원)

지도교수
김도현
발행연도
2023
저작권
부산가톨릭대학교 논문은 저작권에 의해 보호받습니다.

이용수19

표지
AI에게 요청하기
추천
검색

이 논문의 연구 히스토리 (3)

초록· 키워드

오류제보하기
본 연구에서는 USB 플래시 드라이브에 은닉 영역을 생성하는 방식으로
안티포렌식 행위를 수행하는 도구들을 다방면으로 수집한 결과
FbinstTool, Bootice, EasyBoot를 발견했다. 위 도구들은 모두 USB 플래시
드라이브에 은닉 영역을 생성하는 기능이 존재한다. 그래서 위의 3가지 도
구를 사용하여 생성한 은닉 영역의 구조를 분석하여 은닉된 데이터의 메타
데이터 위치 및 실제 데이터 등을 확인하고 분석한 결과를 통해 은닉 영역
의 구조 분석 및 은닉된 데이터를 추출, 카빙(Carving)하는 알고리즘을 제
안한다. 그리고 제안한 알고리즘을 통해 구현한 탐지 도구도 소개한다. 또
한 EasyBoot는 FbinstTool과 Bootice와 다르게 은닉된 파티션으로 부팅하
는 기능이 존재한다. 본 연구에서는 은닉된 파티션에 Windows PE를 삽입
하여 부팅과정과 부팅 후의 남는 아티팩트들을 조사했다. 조사한 결과를
통해 Windows PE와 같은 Live OS의 아티팩트 추출 방안을 제시한다.

목차

목차
국문초록··················································································· ⅰ
표 목 차 ··················································································· ⅴ
그림목차··················································································· ⅵ
I. 서론 ··················································································· 1
1. 연구의 배경 ··············································································· 1
2. 연구의 목적 ··············································································· 2
II. 선행 연구 및 배경 지식 ·············································· 4
1. 선행 연구 ··················································································· 4
가. 안티포렌식 동향 ·································································· 4
나. 데이터 은닉에 대한 안티포렌식 연구···························· 5
2. 배경 지식 ··················································································· 7
가. 파일 시스템·········································································· 7
(1) 파티션 관리···································································· 9
(2) Bootloader····································································· 14
나. 실행파일 역공학 ································································ 15
(1) 정적 분석······································································ 16
(2) 동적 분석······································································ 22
III. 은닉 영역 파일 시스템 및
부트로더 분석····························································· 28
1. 은닉 영역 생성 도구 소개 ··················································· 28
가. FbinstTool·········································································· 28
나. Bootice················································································ 31
다. EasyBoot············································································ 34
2. 생성된 은닉 영역 구조 분석 ··············································· 37
가. FbinstTool ···················································································· 37
나. Bootice ·························································································· 45
다. EasyBoot ······················································································ 53
3. 은닉 운영체제 부팅 과정 분석··········································· 56
IV. 은닉 영역을 활용한 안티포렌식···························· 64
1. 데이터 은닉 안티포렌식 ······················································· 64
가. FbinstTool을 사용한 데이터 은닉 및 와이핑(Wiping) 기법····················· 64
나. Bootice로 생성한 은닉 영역에 파일 저장 기법 ······································ 65
다. Bootice 및 EasyBoot로 생성한 은닉 영역 탐지 회피 기법······················ 66
2. 은닉된 Bootable OS 안티포렌식 ········································ 68
V. 안티포렌식 대응·························································· 73
1. 은닉 영역 탐지 및 추출······················································· 73
가. 은닉 영역 탐지 ·································································· 74
나. 데이터 추출········································································ 76
다. 데이터 카빙(Carving)······················································ 77
2. 은닉된 Bootable OS 사용 흔적·········································· 78
가. NTFS 로그 파일 분석···················································· 79
나. NTFS ADS 분석······························································ 81
다. Windows 휴지통 아티팩트 분석··································· 83
3. 탐지 도구 ················································································· 85
VI. 고찰·············································································· 89
VII. 결론············································································· 90
참고문헌 ··········································································· 92
영문초록(Abstract) ························································ 96

최근 본 자료

전체보기

댓글(0)

0