Netinfo Security ›› 2021, Vol. 21 ›› Issue (12): 60-69.doi: 10.3969/j.issn.1671-1122.2021.12.009
Previous Articles Next Articles
NI Xueli1,2,3(), WANG Qun1,2,3, LIANG Guangjun1,2,3
Received:
2021-09-22
Online:
2021-12-10
Published:
2022-01-11
Contact:
NI Xueli
E-mail:nixueli@jspi.edu.cn
CLC Number:
NI Xueli, WANG Qun, LIANG Guangjun. Research on Authentication Method of WeChat Evidence[J]. Netinfo Security, 2021, 21(12): 60-69.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2021.12.009
[1] | GU Guoyan, LOU Linli, GONG Feng, et al. Authentication of Electronic Evidence-Taking WeChat as an Example[J]. Journal of Southeast University(Philosophy and Social Science), 2017, 19(S2):62-66. |
古国妍, 娄琳莉, 贡凤, 等. 电子证据的鉴真——以微信为例[J]. 东南大学学报(哲学社会科学版), 2017, 19(S2):62-66. | |
[2] | PAN Ziwen, HU Yingying. Discussion on WeChat Evidence Preservation Notarization[J]. Legal System and Society, 2015(36):137-139, 141. |
潘子文, 胡莹莹. 关于微信证据保全公证的探讨[J]. 法制与社会, 2015(36):137-139,141. | |
[3] | TAN Yuzhe. Analysis of the Obstacles and Countermeasures in the Application of Electronic Evidence in Civil Litigation-Taking WeChat Evidence as an Example[D]. Chengdu: Southwestern University of Finance and Economics, 2019. |
谭羽哲. 探析电子证据在民事诉讼中的运用障碍与对策——以微信证据为例[D]. 成都:西南财经大学, 2019. | |
[4] | BAI Jinguo, SUN Hongsheng, HU Zeming. A Recovery Method of Deleted Data Based on SQLite3 File Format[J]. Journal of Chinese Computer Systems, 2016, 37(3):505-509. |
白晋国, 孙红胜, 胡泽明. 一种基于SQLite3文件格式的删除数据恢复方法[J]. 小型微型计算机系统, 2016, 37(3):505-509. | |
[5] | WU Hao, CHEN Liquan, SHA Jing, et al. SQLite Data Recovery Scheme Based on Feature Matching Localization[J]. Journal of Nanjing University of Posts and Telecommunications(Natural Science Edition), 2018, 38(1):106-112. |
吴昊, 陈立全, 沙晶, 等. 一种基于特征匹配定位的SQLite数据恢复方法[J]. 南京邮电大学学报(自然科学版), 2018, 38(1):106-112. | |
[6] | ZHANG Lijun, FEI Yu, JI Qingbing. The Forensic Analysis of WeChat Message[C]// IEEE. 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control(IMCCC), July 21-23, 2016, Harbin, China. Piscataway: IEEE, 2016: 500-503. |
[7] | NI Xueli, LIANG Guangjun. Recovery Method of WeChat Revoking Message Based on Dynamic Memory Analysis[J]. Computer Engineering and Applications, 2021, 56(23):146-153. |
倪雪莉, 梁广俊. 引入动态内存分析的微信撤回消息恢复方法[J]. 计算机工程与应用, 2021, 56(23):146-153. | |
[8] | ZENG Yudi. Study on the Quotation Rules of Electronic Evidence[D]. Changchun: Jilin University, 2018. |
曾宇迪. 电子数据质证规则研究[D]. 长春:吉林大学, 2018. | |
[9] | JIANG Hongming, WU Pingping. Several Issues of Blockchain Evidence in the Online Procedure Rule of People’s Court[J]. Journal of Law Application, 2021, 32(7):150-163. |
蒋鸿铭, 吴平平. 《人民法院在线诉讼规则》区块链证据规则若干问题探析[J]. 法律适用, 2021, 32(7):150-163. | |
[10] |
SHARMA P, ARORA D, SAKTHIVEL T. Enhanced Forensic Process for Improving Mobile Cloud Traceability in Cloud-based Mobile Applications[J]. Procedia Computer Science, 2020, 167(1):907-917.
doi: 10.1016/j.procs.2020.03.390 URL |
[11] | MING Zhenya. Analysis on Forensics of WeChat Program Database Based on Android System[D]. Shanghai: East China University of Political Science and Law, 2019. |
明振亚. 基于Android系统的微信小程序数据库取证问题分析[D]. 上海:华东政法大学, 2019. | |
[12] | DONG Hui. Research On Extraction and Authenticity Identification Method of WeChat Voice[D]. Lanzhou: Gansu Political Science and Law Institute, 2019. |
董慧. 微信语音的提取及真实性鉴定方法研究[D]. 兰州:甘肃政法学院, 2019. | |
[13] | HAN Bei. Research and Application of SQLite Data-base[D]. Nanjing: Nanjing University of Posts and Telecommunications, 2019. |
韩贝. SQLite数据库研究与应用[D]. 南京:南京邮电大学, 2019. | |
[14] | WANG Chunlan, KANG Pengcheng. Overview of SQLite Data Recovery Technology for Android Phones[J]. Technology Innovation and Application, 2019, 8(32):160-161, 164. |
王春兰, 康鹏程. Android手机的Sqlite数据恢复技术综述[J]. 科技创新与应用, 2019, 8(32):160-161,164. | |
[15] | KIM G, PARK M, LEE S, et al. A Study on the Decryption Methods of Telegram X and BBM-enterprise Databases in Mobile and PC[EB/OL]. https://doi.org/10.1016/j.fsidi.2020.300998, 2021-08-30. |
[16] | CHANG Yacui. Research and Application of Remote Forensics Analysis for Android Phone[D]. Chongqin: Chongqing University of Posts and Telecommunications, 2017. |
常亚翠. 面向Android手机远程取证分析的研究与应用[D]. 重庆:重庆邮电大学, 2017. | |
[17] | ZHU Yashuai. Research on Authentication Rules of Electronic Evidence in Criminal Cases[D]. Beijing: People’s Public Security University of China, 2019. |
朱亚帅. 刑事案件电子数据认证规则问题研究[D]. 北京:中国人民公安大学, 2019. | |
[18] | LI Xiaolong, YU Nenghai, ZHANG Xinpeng, et al. Overview of Digital Media Forensics Technology[J]. Journal of Image and Graphics, 2021, 26(6):1216-1226. |
李晓龙, 俞能海, 张新鹏, 等. 数字媒体取证技术综述[J]. 中国图象图形学报, 2021, 26(6):1216-1226. | |
[19] | CAO Taixun. Network Crime Profile Based on Intelligent Analysis of Electronic Data Forensics[J]. Netinfo Security, 2019, 19(9):31-35. |
曹太训. 基于电子数据取证智能化分析技术的网络犯罪侧写[J]. 信息网络安全, 2019, 19(9):31-35. | |
[20] | LIAO Genwei. Research on Forensic Expertise of Electronic Data Authenticity[M]. Beijing: Law Press China, 2015. |
廖根为. 电子数据真实性司法鉴定研究[M]. 北京: 法律出版社, 2015. |
[1] | TU Guoqing, YANG Yanhao, LIU Shubo. Vulnerability Analysis of Geohash Code Against k-nearest Neighbor Attack [J]. Netinfo Security, 2021, 21(2): 10-15. |
[2] | YU Lu, LUO Senlin. A Method of Internal Intrusion Detection of Database in RBAC Mode [J]. Netinfo Security, 2020, 20(2): 83-90. |
[3] | HOU Lin, FENG Da, XUAN Pengkai, ZHOU Fucai. Outsourcing Database Join Query Verification Scheme Based on Authentication Tree [J]. Netinfo Security, 2020, 20(2): 91-97. |
[4] | Wenming WANG, Quanyu WANG, Yinghao WANG, Haopan REN. Research and Design of Intelligent Monitoring and Early Warning Database System for Sensitive Areas [J]. Netinfo Security, 2019, 19(12): 1-9. |
[5] | Qinghe DONG, Qian HE, Bingcheng JIANG, Peng LIU. Scheme of Cloud Database Oriented Multi-tenant Attribute-based Security Isolation and Data Protection [J]. Netinfo Security, 2018, 18(7): 60-68. |
[6] | Lin LI, Zhenhuan LI, Xiaolin CHANG, Zhen HAN. Analyzer for Caché Database Communication Protocol [J]. Netinfo Security, 2018, 18(4): 38-46. |
[7] | Haoyang LIU. Research on Online Forensic of MS SQL Database [J]. Netinfo Security, 2016, 16(9): 26-30. |
[8] | Haiping JI, Lei XU, Xiaoling YU, Chungen XU. Research on Hierarchical Identity-based Encryption Management System in Cloud Computing [J]. Netinfo Security, 2016, 16(5): 30-36. |
[9] | Junzheng XIANG, Hequn XIAN, Chengliang TIAN, Min LI. Research on Method of Key Words Quick Search in Encrypted Databases [J]. Netinfo Security, 2016, 16(10): 28-33. |
[10] | Yan SONG, Qing ZHOU, Guo-shuang ZHANG, Xin WANG. A Ciphertext Search Scheme Based on DAS [J]. Netinfo Security, 2015, 15(9): 10-14. |
[11] | Gang YANG, Tao WEN, Yu-qing ZHANG. Design and Implementation of Android Vulnerability Database [J]. Netinfo Security, 2015, 15(9): 240-244. |
[12] | Xiao-miao DAI, Lei GUAN, Guang-jun HU. A Solution to Detecting Security Incidents in Police Network Based on the Big Data Technology [J]. Netinfo Security, 2015, 15(9): 245-248. |
[13] | Qing-yun LI, Wen YU. Transition Design of Relational Database into HBase [J]. Netinfo Security, 2015, 15(1): 51-55. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||