2021
DOI: 10.1007/978-981-15-8711-5_5
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Preserving Anti-forensic Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 85 publications
0
2
0
Order By: Relevance
“…However, the offender could modify evidence of interest by deleting, editing, and clearing messages on the cache. The action is anti-forensics -data concealment by implementing data hiding and trail obfuscation techniques to remain anonymous or undetected [11], [12]. In addition to antiforensic issues, it could lead to incomplete attributes of collected artifacts and affect the integrity of digital evidence [13].…”
Section: Introductionmentioning
confidence: 99%
“…However, the offender could modify evidence of interest by deleting, editing, and clearing messages on the cache. The action is anti-forensics -data concealment by implementing data hiding and trail obfuscation techniques to remain anonymous or undetected [11], [12]. In addition to antiforensic issues, it could lead to incomplete attributes of collected artifacts and affect the integrity of digital evidence [13].…”
Section: Introductionmentioning
confidence: 99%
“…Among many anti-forensic attacks, file wiping is the most common anti-forensic attack in which a file is completely overwritten by some random data [3]. File wiping aims to ensure that any forensic effort to recover the wiped file (both data and metadata) is rendered useless [4]. However, file wiping has faced controversial opinions in digital forensics on the required number of passes for complete overwriting [5].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, a recent study has demonstrated that a single wipe procedure is enough to make any reasonable data recovery impossible in modern magnetic drives [9]. Since file wiping is also commonly used for protecting privacy [4], many tools are available for free across all the platforms for wiping data. Also, transparent-per-file wiping extensions have been proposed, and are available both as purging extensions to the library and as stackable file systems [10,11].…”
Section: Introductionmentioning
confidence: 99%