2009
DOI: 10.1016/j.diin.2009.06.009
|View full text |Cite
|
Sign up to set email alerts
|

Using shellbag information to reconstruct user activities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 2 publications
0
9
0
Order By: Relevance
“…For specific situations and contexts, automated event reconstruction can however be performed. For example, Zhu et al [8] present the idea of reconstructing user activities based on ShellBag information stored in the Windows Registry. Commonly, this information is used by the operating system to store user preferences, such as window sizes and positions.…”
Section: B Related Workmentioning
confidence: 99%
“…For specific situations and contexts, automated event reconstruction can however be performed. For example, Zhu et al [8] present the idea of reconstructing user activities based on ShellBag information stored in the Windows Registry. Commonly, this information is used by the operating system to store user preferences, such as window sizes and positions.…”
Section: B Related Workmentioning
confidence: 99%
“…To accurately infer information from given facts an investigator must understand the underlying relation between the observed facts and the inferred conclusion. For example Zhu [11] states, "To infer events from the Registry it requires an investigator to understand the relationship between Registry information and occurred activities". This means that when a user does an action that affects data stored in the Windows Registry, the investigator can only begin to infer what the user action was once the investigator understands not only how but also why that particular piece of data has been modified in the registry.…”
Section: Automatic Detection Of User Eventsmentioning
confidence: 99%
“…As described in [8], the registry value associated with this folder includes the timestamp when the ShellBag information was first updated in the registry. Therefore, three events can be inferred: In this example, more than one event is inferred from a single registry record.…”
Section: Inferred Eventsmentioning
confidence: 99%
“…Zhu, et al [8] have proposed several rules that use ShellBag information to determine if a folder was accessed. Specifically, the information under the BagMRU registry key (located at HKCU\Software\Microsoft\ Windows\ShellNoRoam\BagMRU) and the Bags key (located at HKCU\ Software\Microsoft\Windows\ShellNoRoam\Bags) can be used to determine if the folder was accessed during a particular period.…”
Section: Checking Inferred Eventsmentioning
confidence: 99%