z-logo
open-access-imgOpen Access
Column: File Cabinet Forensics
Author(s) -
Simson Garfinkel
Publication year - 2011
Publication title -
˜the œjournal of digital forensics, security and law
Language(s) - English
Resource type - Journals
eISSN - 1558-7223
pISSN - 1558-7215
DOI - 10.15394/jdfsl.2011.1103
Subject(s) - digital forensics , reverse engineering , computer science , law enforcement , column (typography) , computer security , cabinet (room) , computer forensics , work (physics) , world wide web , data science , engineering , telecommunications , law , operating system , political science , mechanical engineering , frame (networking)
Researchers can spend their time reverse engineering, performing reverse analysis, or making substantive contributions to digital forensics science. Although work in all of these areas is important, it is the scientific breakthroughs that are the most critical for addressing the challenges that we face. Reverse Engineering is the traditional bread-and-butter of digital forensics research. Companies like Microsoft and Apple deliver computational artifacts (operating systems, applications and phones) to the commercial market. These artifacts are bought and used by billions. Some have evil intent, and (if society is lucky), the computers end up in the hands of law enforcement. Unfortunately the original vendors rarely provide digital forensics tools that make their systems amenable to analysis by law enforcement. Hence the need for reverse engineering. (see PDF for full column)

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom