Research on Security Mechanism and Forensics of SQLite Database
暂无分享,去创建一个
With the rapid development of information technology and wireless communication technology, SQLite database has been widely used in various occasions in peacetime. SQLite database, as a relatively common database in the Android operating system, usually contains a series of key information such as call records and short messages. Research on SQLite database has a certain positive effect on public security electronic evidence collection. This article hopes to study the security mechanism and cracking method of SQLite database, the encryption and decryption mechanism and operation method of open source software such as SQL Cipher, and the actual forensic operation of WeChat as an example to conduct the research of SQLite database forensic analysis.
[1] Murilo Tito Pereira. Forensic analysis of the Firefox 3 Internet history and recovery of deleted SQLite records , 2009, Digit. Investig..
[2] Wang Dong-yang. Analysis and Design of the Security Mechanisms of Embedded Database SQLite , 2009 .
[3] Han Yuan-lin. Application of Rainbow Table in Password Cracking , 2010 .