forensic.ps...

- AV AC AU C I A
发布: 1999-10-01
修订: 2025-04-13

Software Forensics - Can We Track Code to its Authors? Viruses,worms,trojan horses,and crackers all exis tand threaten the security of our computer systems. Often, we are aware of an intrusion only after it has occurred. On some occasions, we may have a fragment of code left behind - used by an adversary to gain access or damage the system. A natural question to ask is ?Can we use this remnant of code to positively identify the culprit?? In this paper, we detail some of the features of code remnants that might be analyzed and then used to identify their authors. We further outline some of the difficulties involved in tracing an intruder by analyzing code. We conclude by discussing some future work that needs to be done before this approach can be properly evaluated. We refer to our process as software forensics, similar to medical forensics: we are examining the remains to obtain evidence about the factors involved.

0%
暂无可用Exp或PoC
当前有0条受影响产品信息