A Data Backup Method Based on File System Filter Driver

Author(s):  
Zhao Zhongmeng ◽  
Yao Hangtian
2009 ◽  
Vol 29 (1) ◽  
pp. 168-171 ◽  
Author(s):  
Hong-yin HU ◽  
Feng YAO ◽  
Cheng-wan HE
Keyword(s):  

2012 ◽  
Vol 31 (6) ◽  
pp. 1498-1501 ◽  
Author(s):  
Cheng-long CAO ◽  
De-sheng FU ◽  
Feng-yan CAO
Keyword(s):  

2013 ◽  
Vol 433-435 ◽  
pp. 1742-1746 ◽  
Author(s):  
Yuan Wu ◽  
Xiao Chun Chen

Using the Minifilter framework and AES group encryption algorithm, the paper develops a filter driver for encrypting the file of particular types under the security directory. The principle of the file system filter driver is discussed here, and makes a special research about the file operation process especially for word format. This paper also makes a deep analysis of transformation mechanism between the plaintext and ciphertext, and the implementation algorithms of encryption and decryption. Finally, the paper describes the method of path filtering in detail.


2013 ◽  
Vol 347-350 ◽  
pp. 2827-2831
Author(s):  
Zhen Qi Wang ◽  
Wei Ping Wang

In order to develop a more practical, higher security and less time-consuming webpage tamper-resistant system, we proposed a webpage tamper-resistant strategy on the basis of original tamper-resistant strategies and technologies in the paper. This strategy adopted the file system filter driver and event-triggered technology. It also controlled users writing operations through the file filter driver of the bottom of the system, which can efficiently and actively prevent attackers illegal tampering. At the same time, it had also set up a monitoring module. The monitoring module and the tamper-resistant module formed a self-protection mechanism of the ring. Therefore, the strategy can greatly improve the security of system.


2020 ◽  
Vol 5 (1) ◽  
pp. 89
Author(s):  
Nasirudin Nasirudin ◽  
Sunardi Sunardi ◽  
Imam Riadi

Technological advances are growing rapidly, including mobile device technology, one of which is an Android smartphone that is experiencing rapid progress with a variety of features so that it can spoil its users, with the rapid development of smartphone technology, many users benefit, but many are disadvantaged by the growing smartphone. technology, so that many perpetrators or persons who commit crimes and seek profits with smartphone facilities. Case simulation by securing Samsung Galaxy A8 brand android smartphone evidence using the MOBILedit forensic express forensic tool with the National Institute of Standards and Technology (NIST) method which consists of four stages of collection, examination, analysis and reporting. The results of testing the Samsung Galaxy A8 android smartphone are carried out with the NIST method and the MOBILedit Forensic Express tool obtained by data backup, extraction and analysis so that there are findings sought for investigation and evidence of crimes committed by persons using android smartphone facilities.


Sign in / Sign up

Export Citation Format

Share Document