2013
DOI: 10.1007/978-3-642-36818-9_30
|View full text |Cite
|
Sign up to set email alerts
|

A Recovery Approach for SQLite History Recorders from YAFFS2

Abstract: Abstract. Nowadays, forensic on flash memories has drawn much attention. In this paper, a recovery method for SQLite database history records (I.e. updated and deleted records) form YAFFS2 is proposed. Based on the out-of-place-write strategies in NAND flash memory required by YAFFS2, the SQLite history recorders can be recovered and ordered into timeline by their timestamps. The experiment results show that the proposed method can recover the updated or deleted records correctly. Our method can help investiga… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(16 citation statements)
references
References 4 publications
0
16
0
Order By: Relevance
“…YAFFS is the first file system designed for flash memory. YAFFS2 is the latest version, which is compatible to YAFFS1 and supports greater storage capacity [5]. The other features are listed as below.…”
Section: Yaffs2mentioning
confidence: 99%
See 1 more Smart Citation
“…YAFFS is the first file system designed for flash memory. YAFFS2 is the latest version, which is compatible to YAFFS1 and supports greater storage capacity [5]. The other features are listed as below.…”
Section: Yaffs2mentioning
confidence: 99%
“…Consider the following scenario: the file size of message.db is reduced from 100KB to 80KB by file system because of garbage collection. The schemes proposed in [4] or [5] cannot recovery records belong to the reduced 20KB data because they don't exist in message.db any more. For this situation, a recovery scheme is proposed in this paper.…”
Section: Introductionmentioning
confidence: 99%
“…Accordingly, the corporate IRT plays a central role in investigating the causes for some information security incidents. Basically, digital trails like logs or temporary cache data, which are the decisive probative evidences in some criminal cases [12][13][14]21]. Unfortunately, they are being ignored most of the time because they need digital forensics experts with sophisticated domain knowledge to systematically and technically disclose them.…”
Section: Literature Reviewsmentioning
confidence: 99%
“…Furthermore, the policy violation of corporate computing resources and the associate information security auditing will be a relentless occurring and stringent challenging issue with a plethora of business organizations in the private sectors. Undoubtedly, in the forthcoming future, the pressing necessity of IRT within the corporate and the related digital evidences expertise will be an urgent demand of voluminous organizations [2,17,21].…”
Section: Literature Reviewsmentioning
confidence: 99%
“…Even though this method had a high recovery rate and a timeline of operation could be built, it was only applicable to specific applications. Q. Li [5] and B. Wu [6] recovered historical deleted WAL and database files from file system by using the features of file system. The timeline of operations was built successfully.…”
Section: Introductionmentioning
confidence: 99%