2013 International Conference on Availability, Reliability and Security 2013
DOI: 10.1109/ares.2013.62
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Literature Review of File Carving

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 25 publications
(9 citation statements)
references
References 41 publications
0
9
0
Order By: Relevance
“…Our study belongs to the category of hidden data recovery. The previous studies for the hidden data recovery investigated how to search and extract artifacts of deleted data upon unallocated storage space of camera devices and how to assemble found fragments [3,9]. Most of previous studies [10][11][12][13][14][15] have employed the carving technique that searches exhaustedly artifacts of deleted files upon unallocated storage space of camera systems.…”
Section: Corrupted Partially Recoveredmentioning
confidence: 99%
“…Our study belongs to the category of hidden data recovery. The previous studies for the hidden data recovery investigated how to search and extract artifacts of deleted data upon unallocated storage space of camera devices and how to assemble found fragments [3,9]. Most of previous studies [10][11][12][13][14][15] have employed the carving technique that searches exhaustedly artifacts of deleted files upon unallocated storage space of camera systems.…”
Section: Corrupted Partially Recoveredmentioning
confidence: 99%
“…Multiple-type files contains many file types. In order to achieve a variety of file types to assemble at the same time, we use the method of Parallel Unique Path (PUP) [14], it means multiple-type files to detect their subsequent data cluster at the same time. PUP is described below: By file header signature detected K file header and put them into the beginning of K linked list, each linked list is a reconstruction path stored a file.…”
Section: Support Vector Machinementioning
confidence: 99%
“…File carving [17,18] and timestamps are two key concepts in digital forensics. Unfortunately both concepts are laden with complex operations and a large amount of uncertainty regarding the correctness of the results.…”
Section: Introductionmentioning
confidence: 99%