信息网络安全 ›› 2021, Vol. 21 ›› Issue (12): 60-69.doi: 10.3969/j.issn.1671-1122.2021.12.009

• 入选论文 • 上一篇    下一篇

微信证据的鉴真方法研究

倪雪莉1,2,3(), 王群1,2,3, 梁广俊1,2,3   

  1. 1.江苏警官学院计算机信息与网络安全系,南京 210031
    2.江苏省电子数据取证分析工程研究中心,南京 210031
    3.江苏省公安厅数字取证重点实验室,南京 210031
  • 收稿日期:2021-09-22 出版日期:2021-12-10 发布日期:2022-01-11
  • 通讯作者: 倪雪莉 E-mail:nixueli@jspi.edu.cn
  • 作者简介:倪雪莉(1990—),女,江苏,讲师,硕士,主要研究方向为信息安全、电子数据取证|王群(1971—),男,甘肃,教授,博士, 主要研究方向为网络空间安全治理、电子数据取证|梁广俊(1982—),男,安徽,讲师,博士,主要研究方向为电子数据取证、网络空间安全
  • 基金资助:
    江苏省高校自然科学研究重大项目(20KJA520004)

Research on Authentication Method of WeChat Evidence

NI Xueli1,2,3(), WANG Qun1,2,3, LIANG Guangjun1,2,3   

  1. 1. Department of Computer Information and Cyber Security, Jiangsu Police Institute, Nanjing 210031, China
    2. Jiangsu Electronic Data Forensics and Analysis Engineering Research Center, Nanjing 210031, China
    3. Jiangsu Provincial Public Security Department Key Laboratory of Digital Forensics,Nanjing 210031, China
  • Received:2021-09-22 Online:2021-12-10 Published:2022-01-11
  • Contact: NI Xueli E-mail:nixueli@jspi.edu.cn

摘要:

近年来,微信证据在庭审中出现的频率越来越高,与传统证据相比,微信证据由于主体和内容的虚拟性,其真实性常常受到质疑。现有的微信证据审查实践缺乏明确的流程规范且鉴真技术尚不完善,针对这一现状,基于微信账户的特征及微信数据库的存储加密原理,文章提出一种针对微信证据的鉴真取证模型,该模型结合法律维度,从主体的认证、消息的完整性确认、消息内容的鉴真等方面着手,覆盖证据的固定保全、分析鉴定全流程,体现了程序规则与技术措施的有效结合。通过引入微信索引库比对技术进行微信消息的篡改检测实验,验证了该模型的正确性和可行性。

关键词: 微信证据, 鉴真模型, SQLite数据库加密技术, 电子数据取证

Abstract:

In recent years, WeChat evidence appears increasingly frequently in the court trial. Compared with the traditional evidence, the authenticity of WeChat evidence is questioned due to the virtuality of the subject and content. The existing WeChat evidence review practice lacks clear rules and the distinguishing technology is not perfect. Based on the characteristics of WeChat account and the storage and encryption principles of WeChat database, this paper proposed an authentication model for WeChat evidence. The model creatively combined legal dimensions with the authentication of the subject, the integrity of the message, the authentication of the content and so on. Furthermore, this model covered the whole process of evidence preservation, analysis and identification. It reflected the effective combination of procedural rules and technical measures. Finally, the tamper detection experiment of WeChat messages based on WeChat Index database is carried out to verify the correctness and feasibility of the model.

Key words: WeChat evidence, authentication model, database, electronic forensics

中图分类号: