Cited 1 time in
A reference database of Windows artifacts for file-wiping tool execution analysis
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Joo, Dabin | - |
| dc.contributor.author | Lee, Jiwon | - |
| dc.contributor.author | Jeong, Doowon | - |
| dc.date.accessioned | 2024-08-08T10:01:28Z | - |
| dc.date.available | 2024-08-08T10:01:28Z | - |
| dc.date.issued | 2023-05 | - |
| dc.identifier.issn | 0022-1198 | - |
| dc.identifier.issn | 1556-4029 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/21236 | - |
| dc.description.abstract | Anti-forensic technology can play an effective role in protecting information, but it can make forensic investigations difficult. Specifically, file-wiping permanently erases evidence, making it challenging for investigators to determine whether a file ever existed and prolonging the investigation process. To address this issue, forensic researchers have studied anti-forensic techniques that detect file-wiping activities. Many previous studies have focused on the effects of file-wiping tools on $MFT, $LogFile, and $DATA, rather than on Windows artifacts. Additionally, previous studies that have examined Windows artifacts have considered different artifacts, making it difficult to study them in a comprehensive manner. To address this, we focused on analyzing traces in 13 Windows artifacts of 10 file-wiping tools' operations in the Windows operating system comprehensively. For our experiments, we installed each file-wiping tool on separate virtual machines and checked the traces that the tools left behind in each artifact. We then organized the results in a database format. Our analysis revealed that most of the tools left traces on other artifacts, except for JumpList, Open&SavePidlMRU, and lnk. There were also some cases where traces remained on the other three artifacts. Based on our research, forensic investigators can quickly identify whether a file-wiping tool has been used, and it can assist in decision-making for evidence collection and forensic triage. | - |
| dc.format.extent | 15 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | WILEY | - |
| dc.title | A reference database of Windows artifacts for file-wiping tool execution analysis | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1111/1556-4029.15240 | - |
| dc.identifier.scopusid | 2-s2.0-85151475840 | - |
| dc.identifier.wosid | 000963009100001 | - |
| dc.identifier.bibliographicCitation | Journal of Forensic Sciences, v.68, no.3, pp 856 - 870 | - |
| dc.citation.title | Journal of Forensic Sciences | - |
| dc.citation.volume | 68 | - |
| dc.citation.number | 3 | - |
| dc.citation.startPage | 856 | - |
| dc.citation.endPage | 870 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Legal Medicine | - |
| dc.relation.journalWebOfScienceCategory | Medicine, Legal | - |
| dc.subject.keywordAuthor | anti-forensics | - |
| dc.subject.keywordAuthor | database | - |
| dc.subject.keywordAuthor | file-wiping tool | - |
| dc.subject.keywordAuthor | Windows artifcacts | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
