{"title":"基于通用标准的loT设备取证功能分析","authors":"Gábor Bréda, P. J. Varga, Zsolt Illési","doi":"10.1109/SISY.2018.8524813","DOIUrl":null,"url":null,"abstract":"The increased popularity of the Internet of Things (loT) increased the exposure to malicious attacks of such devices. The security of loT devices is under continuous analysis and there are great improvements in this field, but it appears that the computer forensic specific needs are not taken into considerations. This paper analyses the forensic requirements, and identifies the minimal functional requirements of the loT devices, based on the Common Criteria (CC). This paper also highlights some functional requirements and concerns that are not in CC, but which are essential to a forensic investigation.","PeriodicalId":6647,"journal":{"name":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","volume":"78 1","pages":"000261-000264"},"PeriodicalIF":0.0000,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Forensic Functional Profile of loT Devices-Based on Common Criteria\",\"authors\":\"Gábor Bréda, P. J. Varga, Zsolt Illési\",\"doi\":\"10.1109/SISY.2018.8524813\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The increased popularity of the Internet of Things (loT) increased the exposure to malicious attacks of such devices. The security of loT devices is under continuous analysis and there are great improvements in this field, but it appears that the computer forensic specific needs are not taken into considerations. This paper analyses the forensic requirements, and identifies the minimal functional requirements of the loT devices, based on the Common Criteria (CC). This paper also highlights some functional requirements and concerns that are not in CC, but which are essential to a forensic investigation.\",\"PeriodicalId\":6647,\"journal\":{\"name\":\"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)\",\"volume\":\"78 1\",\"pages\":\"000261-000264\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SISY.2018.8524813\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SISY.2018.8524813","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Forensic Functional Profile of loT Devices-Based on Common Criteria
The increased popularity of the Internet of Things (loT) increased the exposure to malicious attacks of such devices. The security of loT devices is under continuous analysis and there are great improvements in this field, but it appears that the computer forensic specific needs are not taken into considerations. This paper analyses the forensic requirements, and identifies the minimal functional requirements of the loT devices, based on the Common Criteria (CC). This paper also highlights some functional requirements and concerns that are not in CC, but which are essential to a forensic investigation.