2021
DOI: 10.1111/1556-4029.14907
|View full text |Cite
|
Sign up to set email alerts
|

Forensic analysis of anti‐forensic file‐wiping tools on Windows

Abstract: This paper presents forensic analysis of anti‐forensic file‐wiping tools on the Windows platform. The goal is to identify and extract the evidence of the tools used to wipe files and the files wiped by them on the Windows operating system. To achieve this goal, we analyzed the changes made by these tools to metadata structures of Windows file systems during file wiping. We also analyzed Registry keys and .lnk files to collect the evidence. Our experiments used four file‐wiping tools (SecureDelete v1.0, Secure … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 24 publications
(37 reference statements)
0
7
0
Order By: Relevance
“…Open&SavePidlMRU is an artifact that contains information about files that have been opened or saved by an application [7]. We determined that Open&SavePidlMRU could potentially have traces of file-wiping tools as it also saves records of exe files.…”
Section: Openandsavepidlmrumentioning
confidence: 99%
See 3 more Smart Citations
“…Open&SavePidlMRU is an artifact that contains information about files that have been opened or saved by an application [7]. We determined that Open&SavePidlMRU could potentially have traces of file-wiping tools as it also saves records of exe files.…”
Section: Openandsavepidlmrumentioning
confidence: 99%
“…LastVisitedPidlMRU artifact provides information about the application used to view or store files in Open&SavePidlMRU, as well as the locations of files that were previously accessed by those applications [7]. Therefore, it can be determined that if a file-wiping tool was used, traces of it may remain in this artifact.…”
Section: Lastvisitedpidlmrumentioning
confidence: 99%
See 2 more Smart Citations
“…For example, an email client toast notification might hold data and metadata-sender, date/time-about incoming emails. Although the amount of data are limited, it might be useful when common forensic artifacts have provided no valuable data, or the machine was cleaned with anti-forensic software [5,6]. Additional details about anti-forensic software are presented in Section 3.1.…”
Section: Introductionmentioning
confidence: 99%