Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Forensic exploration on windows File History

Full metadata record
DC Field Value Language
dc.contributor.authorChoi, J.-
dc.contributor.authorPark, J.-
dc.contributor.authorLee, S.-
dc.date.accessioned2021-12-05T05:42:00Z-
dc.date.available2021-12-05T05:42:00Z-
dc.date.created2021-08-31-
dc.date.issued2021-
dc.identifier.issn2666-2825-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/129538-
dc.description.abstractNowadays, a proliferation of flash-memory-based storage devices makes it more difficult to recover deleted files in unallocated areas. Thus, it becomes more important for forensic examiners to find and utilize backed up data generated by specially prepared backup features. As an interesting example of them, File History (FH) included since Windows 8 is a backup feature that can be set and operated by a user. To enable FH, it is required to select a storage device for file backup operations which can be almost any type of storage devices, including a local drive, USB flash drive, network drive, etc. This special backup feature of course allows users to restore backed up files and delete old backup versions whenever they want. Therefore, it is necessary to be able to analyze forensic artifacts that show user behaviors relating to FH, during examination of Windows systems. In this paper, we deeply explore Windows FH feature from a digital forensics perspective. As a result, this paper proposes a three-step examination procedure along with detailed considerations for each step. We also analyze impacts of several anti-forensic actions that users can perform intentionally or unintentionally. Finally, this work develops an open-source tool for identifying FH related artifacts and analyzing user behaviors on backup operations. © 2021 Elsevier Ltd-
dc.languageEnglish-
dc.language.isoen-
dc.publisherElsevier Ltd-
dc.titleForensic exploration on windows File History-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, S.-
dc.identifier.doi10.1016/j.fsidi.2021.301134-
dc.identifier.scopusid2-s2.0-85101346882-
dc.identifier.bibliographicCitationForensic Science International: Digital Investigation, v.36-
dc.relation.isPartOfForensic Science International: Digital Investigation-
dc.citation.titleForensic Science International: Digital Investigation-
dc.citation.volume36-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordAuthorAnti-forensic implication-
dc.subject.keywordAuthorFile backup-
dc.subject.keywordAuthorFile history-
dc.subject.keywordAuthorForensic artifact-
dc.subject.keywordAuthorForensic procedure-
dc.subject.keywordAuthorLog analysis-
dc.subject.keywordAuthorMulti-source data analysis-
dc.subject.keywordAuthorOpen-source tool-
dc.subject.keywordAuthorUser behavior analysis-
dc.subject.keywordAuthorWindows forensics-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher LEE, SANG JIN photo

LEE, SANG JIN
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE