A Visualization Jump Lists tool for Digital Forensics of Windows

被引:1
作者
Weng, Shiuh-Ku [1 ]
Tu, Jung-Yi [2 ]
机构
[1] Natl Def Univ, Chung Cheng Inst Technol, Dept Comp Sci & Informat Engn, Taoyuan 33551, Taiwan
[2] Natl Chung Shan Inst Sci & Technol, Taoyuan 33551, Taiwan
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2020年 / 14卷 / 01期
关键词
Visualization; Digital Forensics; Jump Lists;
D O I
10.3837/tiis.2020.01.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a visualization digital forensics tool, called JumpList Analyzer, is implemented. The tool can analyze the complicated Jump Lists files, and then the results are demonstrated by visualization. To compare the proposed tool with the other Jump Lists tools, the proposed tool is the only one can display the analyzed results by visualization. The visualization will help the investigators more easily to find the evidence than the other tools showing the analyzed results by texts only. In the experiment, the proposed JumpList Analyzer is demonstrated its convenience at identifying artifacts for doing digital forensics in a financial fraud case. In addition, the proposed tool can also be used to reveal the computer user's behavior or background.
引用
收藏
页码:221 / 239
页数:19
相关论文
共 18 条
  • [1] [Anonymous], 2019, TKINTER PYTHON INTER
  • [2] Antonovich Chris., 2014, Jump List Forensics. Leahy Center for Digital Investigation
  • [3] Ghafarian A., 2015, P ANN ADFSL C DIG FO
  • [4] Hunter J., 2019, MATPLOTLIB
  • [5] Lagadec P., 2018, OLEFILE PYTHON MODUL
  • [6] Larson T., 2011, FORENSIC EXAMINATION
  • [7] Lyness R., 2012, FORENSIC FOCUS
  • [8] Nir Softer, 2018, JUMPLISTSVIEW V1 16
  • [9] A forensic insight into Windows 10 Jump Lists
    Singh, Bhupendra
    Singh, Upasna
    [J]. DIGITAL INVESTIGATION, 2016, 17 : 1 - 13
  • [10] Sjogren M., 2018, UWP JUMP LISTS DONE