A forensic insight into Windows 10 Jump Lists

被引:18
作者
Singh, Bhupendra [1 ]
Singh, Upasna [1 ]
机构
[1] Def Inst Adv Technol DU, Dept Comp Engn, Pune, Maharashtra, India
关键词
Jump lists; Windows forensics; Windows; 10; LNK file analysis; DestList;
D O I
10.1016/j.diin.2016.02.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The records maintained by Jump Lists have the potential to provide a rich source of evidence about users' historic activity to the forensic investigator. The structure and artifacts recorded by Jump Lists have been widely discussed in various forensic communities since its debut in Microsoft Windows 7. However, this feature has more capabilities to reveal evidence in Windows 10, due to its modified structure. There is no literature published on the structure of Jump Lists in Windows 10 and the tools that can successfully parse the Jump Lists in Windows 7/8, do not work properly for Windows 10. In this paper, we have identified the structure of Jump Lists in Windows 10 and compared it with Windows 7/8. Further, a proof-of-concept tool called JumpListExt (Jump List Extractor) is developed on the basis of identified structure that can parse Jump Lists in Windows 10, individually as well as collectively. Several experiments were conducted to detect anti-forensic attempts like evidence destruction, evidence modification and evidence forging carried out on the records of Jump Lists. Furthermore, we demonstrated the type of artifacts recorded by Jump Lists of four popular web browsers with normal and private browsing mode. Finally, the forensic capability of Jump Lists in Windows 10 is demonstrated in terms of activity timeline constructed over a period of time using Jump Lists. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:1 / 13
页数:13
相关论文
共 11 条
  • [1] Lalli HS, 2012, J DIGIT FORENSICS SE, V7, P15
  • [2] Larson T., 2011, FORENSIC EXAMINATION
  • [3] Lyness R., 2012, FORENSIC ANAL WINDOW
  • [4] CAT Detect (Computer Activity Timeline Detection): A tool for detecting inconsistency in computer activity timelines
    Marrington, Andrew
    Baggili, Ibrahim
    Mohay, George
    Clark, Andrew
    [J]. DIGITAL INVESTIGATION, 2011, 8 : S52 - S61
  • [5] MiTec, 2010, STRUCT STOR VIEW
  • [6] MSDN, 2015, MS SHLLINK SHELL LIN
  • [7] MSDN, 2015, MS CFB COMP FIL BIN
  • [8] NirSoft, 2013, JUMPL
  • [9] Parsonage H, 2010, MEANING LINKFILES FO
  • [10] Using jump lists to identify fraudulent documents
    Smith, G. Stevenson
    [J]. DIGITAL INVESTIGATION, 2013, 9 (3-4) : 193 - 199