A reference database of Windows artifacts for file-wiping tool execution analysis

被引:1
作者
Joo, Dabin [1 ]
Lee, Jiwon [1 ]
Jeong, Doowon [1 ]
机构
[1] Dongguk Univ, Coll Police & Criminal Justice, Seoul, South Korea
关键词
anti-forensics; database; file-wiping tool; Windows artifcacts;
D O I
10.1111/1556-4029.15240
中图分类号
DF [法律]; D9 [法律]; R [医药、卫生];
学科分类号
0301 ; 10 ;
摘要
Anti-forensic technology can play an effective role in protecting information, but it can make forensic investigations difficult. Specifically, file-wiping permanently erases evidence, making it challenging for investigators to determine whether a file ever existed and prolonging the investigation process. To address this issue, forensic researchers have studied anti-forensic techniques that detect file-wiping activities. Many previous studies have focused on the effects of file-wiping tools on $MFT, $LogFile, and $DATA, rather than on Windows artifacts. Additionally, previous studies that have examined Windows artifacts have considered different artifacts, making it difficult to study them in a comprehensive manner. To address this, we focused on analyzing traces in 13 Windows artifacts of 10 file-wiping tools' operations in the Windows operating system comprehensively. For our experiments, we installed each file-wiping tool on separate virtual machines and checked the traces that the tools left behind in each artifact. We then organized the results in a database format. Our analysis revealed that most of the tools left traces on other artifacts, except for JumpList, Open&SavePidlMRU, and lnk. There were also some cases where traces remained on the other three artifacts. Based on our research, forensic investigators can quickly identify whether a file-wiping tool has been used, and it can assist in decision-making for evidence collection and forensic triage.
引用
收藏
页码:856 / 870
页数:15
相关论文
共 24 条
  • [1] Afrifa I., 2020, Journal of Digital Forensics, Security Law, V15, P1, DOI DOI 10.15394/JDFSL.2020.1615
  • [2] Forensic analysis of anti-forensic file-wiping tools on Windows
    AlHarbi, Rayed
    AlZahrani, Ali
    Bhat, Wasim Ahmad
    [J]. JOURNAL OF FORENSIC SCIENCES, 2022, 67 (02) : 562 - 587
  • [3] Carlton GH, 2012, J DIGIT FORENSICS SE, V7, P113
  • [4] Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy
    Conlan, Kevin
    Baggili, Ibrahim
    Breitinger, Frank
    [J]. DIGITAL INVESTIGATION, 2016, 18 : S66 - S75
  • [5] Duby A., IEEE T INF FOREN SEC, DOI [10.1109/CCWC54503.2022.9720874, DOI 10.1109/CCWC54503.2022.9720874]
  • [6] Hexacorn, 2013, JUMP LIST FIL NAM AP
  • [7] Digital tool marks (DTMs): a forensic analysis of file wiping software
    Horsman, Graeme
    [J]. AUSTRALIAN JOURNAL OF FORENSIC SCIENCES, 2021, 53 (01) : 96 - 111
  • [8] Hosgor EC., 2020, INT J SPORT PHYSIOL, V18, P46, DOI [10.5281/zenodo.4425257, DOI 10.5281/ZENODO.4425257]
  • [9] Kim Yeonsoo, 2010, [The KIPS Transactions : Part C, 정보처리학회논문지C], V17, P159
  • [10] Lagny B., ANAL AMCACHE