Site updated: 2019-04-15 16:02:09

This commit is contained in:
Cool-Y 2019-04-15 16:02:11 +08:00
parent 5b0124d0be
commit 4f3f0034a2
12 changed files with 26 additions and 26 deletions

View File

@ -652,8 +652,8 @@
<div class="post-nav-prev post-nav-item"> <div class="post-nav-prev post-nav-item">
<a href="/2019/04/15/Caving-db-storage/" rel="prev" title="Caving_db_storage"> <a href="/2019/04/15/Caving-db-storage/" rel="prev" title="复原数据库存储以检测和跟踪安全漏洞">
Caving_db_storage <i class="fa fa-chevron-right"></i> 复原数据库存储以检测和跟踪安全漏洞 <i class="fa fa-chevron-right"></i>
</a> </a>
</div> </div>

View File

@ -79,13 +79,13 @@
<meta name="description" content="Carving database storage to detect and trace security breaches 复原数据库存储以检测和跟踪安全漏洞原文下载 MotivationDBMS(数据库管理系统) 通常用于存储和处理敏感数据因此投入了大量精力使用访问控制策略来保护DBMS。 一旦用户在DBMS中获得提升权限无论是合理的还是通过攻击的实施的安全方案可以绕过因此无法再"> <meta name="description" content="Carving Database Storage to Detect and Trace Security Breaches 复原数据库存储以检测和跟踪安全漏洞原文下载 MotivationDBMS(数据库管理系统) 通常用于存储和处理敏感数据因此投入了大量精力使用访问控制策略来保护DBMS。 一旦用户在DBMS中获得提升权限无论是合理的还是通过攻击的实施的安全方案可以绕过因此无法再">
<meta name="keywords" content="数据库,复原文件,取证"> <meta name="keywords" content="数据库,复原文件,取证">
<meta property="og:type" content="article"> <meta property="og:type" content="article">
<meta property="og:title" content="Caving_db_storage"> <meta property="og:title" content="复原数据库存储以检测和跟踪安全漏洞">
<meta property="og:url" content="https://cool-y.github.io/2019/04/15/Caving-db-storage/index.html"> <meta property="og:url" content="https://cool-y.github.io/2019/04/15/Caving-db-storage/index.html">
<meta property="og:site_name" content="混元霹雳手"> <meta property="og:site_name" content="混元霹雳手">
<meta property="og:description" content="Carving database storage to detect and trace security breaches 复原数据库存储以检测和跟踪安全漏洞原文下载 MotivationDBMS(数据库管理系统) 通常用于存储和处理敏感数据因此投入了大量精力使用访问控制策略来保护DBMS。 一旦用户在DBMS中获得提升权限无论是合理的还是通过攻击的实施的安全方案可以绕过因此无法再"> <meta property="og:description" content="Carving Database Storage to Detect and Trace Security Breaches 复原数据库存储以检测和跟踪安全漏洞原文下载 MotivationDBMS(数据库管理系统) 通常用于存储和处理敏感数据因此投入了大量精力使用访问控制策略来保护DBMS。 一旦用户在DBMS中获得提升权限无论是合理的还是通过攻击的实施的安全方案可以绕过因此无法再">
<meta property="og:locale" content="zh-Hans"> <meta property="og:locale" content="zh-Hans">
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555310640/paper/%E5%9B%BE%E7%89%871.png"> <meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555310640/paper/%E5%9B%BE%E7%89%871.png">
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555310736/paper/%E6%8D%95%E8%8E%B7.png"> <meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555310736/paper/%E6%8D%95%E8%8E%B7.png">
@ -99,10 +99,10 @@
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555312234/paper/%E5%9B%BE%E7%89%879.png"> <meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555312234/paper/%E5%9B%BE%E7%89%879.png">
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555312316/paper/%E5%9B%BE%E7%89%8710.png"> <meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555312316/paper/%E5%9B%BE%E7%89%8710.png">
<meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555312359/paper/%E5%9B%BE%E7%89%8711.png"> <meta property="og:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555312359/paper/%E5%9B%BE%E7%89%8711.png">
<meta property="og:updated_time" content="2019-04-15T07:58:50.738Z"> <meta property="og:updated_time" content="2019-04-15T08:01:31.751Z">
<meta name="twitter:card" content="summary"> <meta name="twitter:card" content="summary">
<meta name="twitter:title" content="Caving_db_storage"> <meta name="twitter:title" content="复原数据库存储以检测和跟踪安全漏洞">
<meta name="twitter:description" content="Carving database storage to detect and trace security breaches 复原数据库存储以检测和跟踪安全漏洞原文下载 MotivationDBMS(数据库管理系统) 通常用于存储和处理敏感数据因此投入了大量精力使用访问控制策略来保护DBMS。 一旦用户在DBMS中获得提升权限无论是合理的还是通过攻击的实施的安全方案可以绕过因此无法再"> <meta name="twitter:description" content="Carving Database Storage to Detect and Trace Security Breaches 复原数据库存储以检测和跟踪安全漏洞原文下载 MotivationDBMS(数据库管理系统) 通常用于存储和处理敏感数据因此投入了大量精力使用访问控制策略来保护DBMS。 一旦用户在DBMS中获得提升权限无论是合理的还是通过攻击的实施的安全方案可以绕过因此无法再">
<meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555310640/paper/%E5%9B%BE%E7%89%871.png"> <meta name="twitter:image" content="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555310640/paper/%E5%9B%BE%E7%89%871.png">
@ -139,7 +139,7 @@
<title>Caving_db_storage | 混元霹雳手</title> <title>复原数据库存储以检测和跟踪安全漏洞 | 混元霹雳手</title>
@ -335,7 +335,7 @@
<h1 class="post-title" itemprop="name headline">Caving_db_storage</h1> <h1 class="post-title" itemprop="name headline">复原数据库存储以检测和跟踪安全漏洞</h1>
<div class="post-meta"> <div class="post-meta">
@ -397,7 +397,7 @@
<span id="/2019/04/15/Caving-db-storage/" class="leancloud_visitors" data-flag-title="Caving_db_storage"> <span id="/2019/04/15/Caving-db-storage/" class="leancloud_visitors" data-flag-title="复原数据库存储以检测和跟踪安全漏洞">
<span class="post-meta-divider">|</span> <span class="post-meta-divider">|</span>
<span class="post-meta-item-icon"> <span class="post-meta-item-icon">
<i class="fa fa-eye"></i> <i class="fa fa-eye"></i>
@ -455,7 +455,7 @@
<h1 id="Carving-database-storage-to-detect-and-trace-security-breaches"><a href="#Carving-database-storage-to-detect-and-trace-security-breaches" class="headerlink" title="Carving database storage to detect and trace security breaches"></a>Carving database storage to detect and trace security breaches</h1><blockquote> <h1 id="Carving-Database-Storage-to-Detect-and-Trace-Security-Breaches"><a href="#Carving-Database-Storage-to-Detect-and-Trace-Security-Breaches" class="headerlink" title="Carving Database Storage to Detect and Trace Security Breaches"></a>Carving Database Storage to Detect and Trace Security Breaches</h1><blockquote>
<p>复原数据库存储以检测和跟踪安全漏洞<br><a href="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555312497/paper/2016-paper_carving_database_storage_to_detect_and.pdf" target="_blank" rel="noopener">原文下载</a></p> <p>复原数据库存储以检测和跟踪安全漏洞<br><a href="https://res.cloudinary.com/dozyfkbg3/image/upload/v1555312497/paper/2016-paper_carving_database_storage_to_detect_and.pdf" target="_blank" rel="noopener">原文下载</a></p>
</blockquote> </blockquote>
<h2 id="Motivation"><a href="#Motivation" class="headerlink" title="Motivation"></a>Motivation</h2><h3 id="DBMS-数据库管理系统"><a href="#DBMS-数据库管理系统" class="headerlink" title="DBMS(数据库管理系统)"></a>DBMS(数据库管理系统)</h3><ul> <h2 id="Motivation"><a href="#Motivation" class="headerlink" title="Motivation"></a>Motivation</h2><h3 id="DBMS-数据库管理系统"><a href="#DBMS-数据库管理系统" class="headerlink" title="DBMS(数据库管理系统)"></a>DBMS(数据库管理系统)</h3><ul>
@ -748,7 +748,7 @@
<div class="post-toc-content"><ol class="nav"><li class="nav-item nav-level-1"><a class="nav-link" href="#Carving-database-storage-to-detect-and-trace-security-breaches"><span class="nav-number">1.</span> <span class="nav-text">Carving database storage to detect and trace security breaches</span></a><ol class="nav-child"><li class="nav-item nav-level-2"><a class="nav-link" href="#Motivation"><span class="nav-number">1.1.</span> <span class="nav-text">Motivation</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#DBMS-数据库管理系统"><span class="nav-number">1.1.1.</span> <span class="nav-text">DBMS(数据库管理系统)</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#例子"><span class="nav-number">1.1.2.</span> <span class="nav-text">例子</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#思路一览"><span class="nav-number">1.1.3.</span> <span class="nav-text">思路一览</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#提出方法"><span class="nav-number">1.1.4.</span> <span class="nav-text">提出方法</span></a></li></ol></li><li class="nav-item nav-level-2"><a class="nav-link" href="#Reliability-of-database-logs"><span class="nav-number">1.2.</span> <span class="nav-text">Reliability of database logs</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#Detecting-hidden-record-modifications"><span class="nav-number">1.3.</span> <span class="nav-text">Detecting hidden record modifications</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#Deleted-records"><span class="nav-number">1.3.1.</span> <span class="nav-text">Deleted records</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#Inserted-records"><span class="nav-number">1.3.2.</span> <span class="nav-text">Inserted records</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#Updated-records"><span class="nav-number">1.3.3.</span> <span class="nav-text">Updated records</span></a></li></ol></li><li class="nav-item nav-level-2"><a class="nav-link" href="#Detecting-inconsistencies-for-read-only-queries"><span class="nav-number">1.4.</span> <span class="nav-text">Detecting inconsistencies for read-only queries</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#Full-table-scan"><span class="nav-number">1.4.1.</span> <span class="nav-text">Full table scan</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#Index-access"><span class="nav-number">1.4.2.</span> <span class="nav-text">Index access</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#Conclusions-and-future-work"><span class="nav-number">1.4.3.</span> <span class="nav-text">Conclusions and future work</span></a></li></ol></li></ol></li></ol></div> <div class="post-toc-content"><ol class="nav"><li class="nav-item nav-level-1"><a class="nav-link" href="#Carving-Database-Storage-to-Detect-and-Trace-Security-Breaches"><span class="nav-number">1.</span> <span class="nav-text">Carving Database Storage to Detect and Trace Security Breaches</span></a><ol class="nav-child"><li class="nav-item nav-level-2"><a class="nav-link" href="#Motivation"><span class="nav-number">1.1.</span> <span class="nav-text">Motivation</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#DBMS-数据库管理系统"><span class="nav-number">1.1.1.</span> <span class="nav-text">DBMS(数据库管理系统)</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#例子"><span class="nav-number">1.1.2.</span> <span class="nav-text">例子</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#思路一览"><span class="nav-number">1.1.3.</span> <span class="nav-text">思路一览</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#提出方法"><span class="nav-number">1.1.4.</span> <span class="nav-text">提出方法</span></a></li></ol></li><li class="nav-item nav-level-2"><a class="nav-link" href="#Reliability-of-database-logs"><span class="nav-number">1.2.</span> <span class="nav-text">Reliability of database logs</span></a></li><li class="nav-item nav-level-2"><a class="nav-link" href="#Detecting-hidden-record-modifications"><span class="nav-number">1.3.</span> <span class="nav-text">Detecting hidden record modifications</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#Deleted-records"><span class="nav-number">1.3.1.</span> <span class="nav-text">Deleted records</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#Inserted-records"><span class="nav-number">1.3.2.</span> <span class="nav-text">Inserted records</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#Updated-records"><span class="nav-number">1.3.3.</span> <span class="nav-text">Updated records</span></a></li></ol></li><li class="nav-item nav-level-2"><a class="nav-link" href="#Detecting-inconsistencies-for-read-only-queries"><span class="nav-number">1.4.</span> <span class="nav-text">Detecting inconsistencies for read-only queries</span></a><ol class="nav-child"><li class="nav-item nav-level-3"><a class="nav-link" href="#Full-table-scan"><span class="nav-number">1.4.1.</span> <span class="nav-text">Full table scan</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#Index-access"><span class="nav-number">1.4.2.</span> <span class="nav-text">Index access</span></a></li><li class="nav-item nav-level-3"><a class="nav-link" href="#Conclusions-and-future-work"><span class="nav-number">1.4.3.</span> <span class="nav-text">Conclusions and future work</span></a></li></ol></li></ol></li></ol></div>
</div> </div>

View File

@ -325,7 +325,7 @@
<a class="post-title-link" href="/2019/04/15/Caving-db-storage/" itemprop="url"> <a class="post-title-link" href="/2019/04/15/Caving-db-storage/" itemprop="url">
<span itemprop="name">Caving_db_storage</span> <span itemprop="name">复原数据库存储以检测和跟踪安全漏洞</span>
</a> </a>

View File

@ -325,7 +325,7 @@
<a class="post-title-link" href="/2019/04/15/Caving-db-storage/" itemprop="url"> <a class="post-title-link" href="/2019/04/15/Caving-db-storage/" itemprop="url">
<span itemprop="name">Caving_db_storage</span> <span itemprop="name">复原数据库存储以检测和跟踪安全漏洞</span>
</a> </a>

View File

@ -325,7 +325,7 @@
<a class="post-title-link" href="/2019/04/15/Caving-db-storage/" itemprop="url"> <a class="post-title-link" href="/2019/04/15/Caving-db-storage/" itemprop="url">
<span itemprop="name">Caving_db_storage</span> <span itemprop="name">复原数据库存储以检测和跟踪安全漏洞</span>
</a> </a>

View File

@ -307,7 +307,7 @@
<a class="post-title-link" href="/2019/04/15/Caving-db-storage/" itemprop="url"> <a class="post-title-link" href="/2019/04/15/Caving-db-storage/" itemprop="url">
<span itemprop="name">Caving_db_storage</span> <span itemprop="name">复原数据库存储以检测和跟踪安全漏洞</span>
</a> </a>

View File

@ -320,7 +320,7 @@
<h1 class="post-title" itemprop="name headline"> <h1 class="post-title" itemprop="name headline">
<a class="post-title-link" href="/2019/04/15/Caving-db-storage/" itemprop="url">Caving_db_storage</a></h1> <a class="post-title-link" href="/2019/04/15/Caving-db-storage/" itemprop="url">复原数据库存储以检测和跟踪安全漏洞</a></h1>
<div class="post-meta"> <div class="post-meta">
@ -372,7 +372,7 @@
<span id="/2019/04/15/Caving-db-storage/" class="leancloud_visitors" data-flag-title="Caving_db_storage"> <span id="/2019/04/15/Caving-db-storage/" class="leancloud_visitors" data-flag-title="复原数据库存储以检测和跟踪安全漏洞">
<span class="post-meta-divider">|</span> <span class="post-meta-divider">|</span>
<span class="post-meta-item-icon"> <span class="post-meta-item-icon">
<i class="fa fa-eye"></i> <i class="fa fa-eye"></i>
@ -432,7 +432,7 @@
Carving database storage to detect and trace security breaches Carving Database Storage to Detect and Trace Security Breaches
复原数据库存储以检测和跟踪安全漏洞原文下载 复原数据库存储以检测和跟踪安全漏洞原文下载
MotivationDBMS(数据库管理系统) MotivationDBMS(数据库管理系统)

File diff suppressed because one or more lines are too long

View File

@ -4,7 +4,7 @@
<url> <url>
<loc>https://cool-y.github.io/2019/04/15/Caving-db-storage/</loc> <loc>https://cool-y.github.io/2019/04/15/Caving-db-storage/</loc>
<lastmod>2019-04-15T07:58:50.738Z</lastmod> <lastmod>2019-04-15T08:01:31.751Z</lastmod>
</url> </url>

View File

@ -307,7 +307,7 @@
<a class="post-title-link" href="/2019/04/15/Caving-db-storage/" itemprop="url"> <a class="post-title-link" href="/2019/04/15/Caving-db-storage/" itemprop="url">
<span itemprop="name">Caving_db_storage</span> <span itemprop="name">复原数据库存储以检测和跟踪安全漏洞</span>
</a> </a>

View File

@ -307,7 +307,7 @@
<a class="post-title-link" href="/2019/04/15/Caving-db-storage/" itemprop="url"> <a class="post-title-link" href="/2019/04/15/Caving-db-storage/" itemprop="url">
<span itemprop="name">Caving_db_storage</span> <span itemprop="name">复原数据库存储以检测和跟踪安全漏洞</span>
</a> </a>

View File

@ -307,7 +307,7 @@
<a class="post-title-link" href="/2019/04/15/Caving-db-storage/" itemprop="url"> <a class="post-title-link" href="/2019/04/15/Caving-db-storage/" itemprop="url">
<span itemprop="name">Caving_db_storage</span> <span itemprop="name">复原数据库存储以检测和跟踪安全漏洞</span>
</a> </a>