Detailed Information

Cited 1 time in webofscience Cited 1 time in scopus
Metadata Downloads

A reference database of Windows artifacts for file-wiping tool execution analysis

Full metadata record
DC Field Value Language
dc.contributor.authorJoo, Dabin-
dc.contributor.authorLee, Jiwon-
dc.contributor.authorJeong, Doowon-
dc.date.accessioned2024-08-08T10:01:28Z-
dc.date.available2024-08-08T10:01:28Z-
dc.date.issued2023-05-
dc.identifier.issn0022-1198-
dc.identifier.issn1556-4029-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/21236-
dc.description.abstractAnti-forensic technology can play an effective role in protecting information, but it can make forensic investigations difficult. Specifically, file-wiping permanently erases evidence, making it challenging for investigators to determine whether a file ever existed and prolonging the investigation process. To address this issue, forensic researchers have studied anti-forensic techniques that detect file-wiping activities. Many previous studies have focused on the effects of file-wiping tools on $MFT, $LogFile, and $DATA, rather than on Windows artifacts. Additionally, previous studies that have examined Windows artifacts have considered different artifacts, making it difficult to study them in a comprehensive manner. To address this, we focused on analyzing traces in 13 Windows artifacts of 10 file-wiping tools' operations in the Windows operating system comprehensively. For our experiments, we installed each file-wiping tool on separate virtual machines and checked the traces that the tools left behind in each artifact. We then organized the results in a database format. Our analysis revealed that most of the tools left traces on other artifacts, except for JumpList, Open&SavePidlMRU, and lnk. There were also some cases where traces remained on the other three artifacts. Based on our research, forensic investigators can quickly identify whether a file-wiping tool has been used, and it can assist in decision-making for evidence collection and forensic triage.-
dc.format.extent15-
dc.language영어-
dc.language.isoENG-
dc.publisherWILEY-
dc.titleA reference database of Windows artifacts for file-wiping tool execution analysis-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1111/1556-4029.15240-
dc.identifier.scopusid2-s2.0-85151475840-
dc.identifier.wosid000963009100001-
dc.identifier.bibliographicCitationJournal of Forensic Sciences, v.68, no.3, pp 856 - 870-
dc.citation.titleJournal of Forensic Sciences-
dc.citation.volume68-
dc.citation.number3-
dc.citation.startPage856-
dc.citation.endPage870-
dc.type.docTypeArticle-
dc.description.isOpenAccessY-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaLegal Medicine-
dc.relation.journalWebOfScienceCategoryMedicine, Legal-
dc.subject.keywordAuthoranti-forensics-
dc.subject.keywordAuthordatabase-
dc.subject.keywordAuthorfile-wiping tool-
dc.subject.keywordAuthorWindows artifcacts-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Police and Criminal Justice > Department of Police Administration > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE