Telecommunications Science ›› 2011, Vol. 27 ›› Issue (1): 105-109.doi: 10.3969/j.issn.1000-0801.2011.01.021

• research and development • Previous Articles     Next Articles

Analysis and Forensics of Malware in Suspicious Computer Based on Four Class Trust Model Abstract This paper analyzes the weaknesses and difficulties of traditional computer forensics technology in the field of analyzing the malicious code evidentiary,proposes a suspicious computer forensics model based on four class trust mechanism. It describes a static forensics method for the suspicious terminals and by large amounts of experiments,shows the feasibility,accuracy and efficiency of four class trust mechanism in the application of malicious code forensics.

Deyu Miao,Xuebin Kang,Xinguang Xiao   

  1. Beijing Antiy Electronic Equipment Co.,Ltd.,Beijing 100084,China
  • Online:2011-01-15 Published:2011-01-15

Abstract:

Key words: four class trust, suspicious terminal, malicious code, computer forensics, trust mechanism

No Suggested Reading articles found!