• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

Windows 上反取证文件擦除工具的法医分析。

Forensic analysis of anti-forensic file-wiping tools on Windows.

机构信息

Faculty of Computer & Information Systems, Islamic University of Madinah, Madinah, Saudi Arabia.

Department of Computer Sciences, University of Kashmir, Srinagar, India.

出版信息

J Forensic Sci. 2022 Mar;67(2):562-587. doi: 10.1111/1556-4029.14907. Epub 2021 Oct 7.

DOI:10.1111/1556-4029.14907
PMID:34617280
Abstract

This paper presents forensic analysis of anti-forensic file-wiping tools on the Windows platform. The goal is to identify and extract the evidence of the tools used to wipe files and the files wiped by them on the Windows operating system. To achieve this goal, we analyzed the changes made by these tools to metadata structures of Windows file systems during file wiping. We also analyzed Registry keys and .lnk files to collect the evidence. Our experiments used four file-wiping tools (SecureDelete v1.0, Secure Eraser v5.2, PC Shredder v1.1, and Blank and Secure v5.88) to wipe files on three Windows file systems (FAT32, exFAT and NTFS). The results suggest that FAT32 and exFAT file system directory structures and $MFT entries of NTFS file system can confirm the use of wiping tools, identify these tools and provide the remnants of the wiped files. Also, $LogFile and $UsnJrnl files of NTFS file system, and Windows Registry keys provide detailed evidence of wiping tools used and the files wiped by them. We also found that the contents of resident and non-resident alternate data streams, $LogFile and $UsnJrnl files, and Windows Registry keys are not wiped by these tools. Finally, this study makes many recommendations, highlights the limitations of the work and points out the future scope.

摘要

本文对 Windows 平台上的反取证文件擦除工具进行了法医分析。目的是识别和提取用于在 Windows 操作系统上擦除文件的工具以及被它们擦除的文件的证据。为了实现这一目标,我们分析了这些工具在擦除文件期间对 Windows 文件系统元数据结构所做的更改。我们还分析了注册表项和.lnk 文件以收集证据。我们的实验使用了四种文件擦除工具(SecureDelete v1.0、Secure Eraser v5.2、PC Shredder v1.1 和 Blank and Secure v5.88)在三种 Windows 文件系统(FAT32、exFAT 和 NTFS)上擦除文件。结果表明,FAT32 和 exFAT 文件系统目录结构以及 NTFS 文件系统的 $MFT 条目可以确认使用了擦除工具,识别这些工具并提供被擦除文件的残余。此外,NTFS 文件系统的 $LogFile 和 $UsnJrnl 文件以及 Windows 注册表项提供了有关使用的擦除工具以及被它们擦除的文件的详细证据。我们还发现,驻留和非驻留备用数据流、$LogFile 和 $UsnJrnl 文件以及 Windows 注册表项的内容不会被这些工具擦除。最后,本研究提出了许多建议,强调了工作的局限性,并指出了未来的范围。

相似文献

1
Forensic analysis of anti-forensic file-wiping tools on Windows.Windows 上反取证文件擦除工具的法医分析。
J Forensic Sci. 2022 Mar;67(2):562-587. doi: 10.1111/1556-4029.14907. Epub 2021 Oct 7.
2
A reference database of Windows artifacts for file-wiping tool execution analysis.
J Forensic Sci. 2023 May;68(3):856-870. doi: 10.1111/1556-4029.15240. Epub 2023 Apr 5.
3
Dataset of Windows operating system forensics artefacts.Windows操作系统取证工件数据集。
Data Brief. 2024 Jun 28;55:110693. doi: 10.1016/j.dib.2024.110693. eCollection 2024 Aug.
4
Media analyses based on Microsoft NTFS file ownership.
Forensic Sci Int. 2006 Oct 16;162(1-3):44-8. doi: 10.1016/j.forsciint.2006.06.014. Epub 2006 Jul 28.
5
FASTAFS: file system virtualisation of random access compressed FASTA files.FASTAFS:随机访问压缩 FASTA 文件的文件系统虚拟化。
BMC Bioinformatics. 2021 Nov 1;22(1):535. doi: 10.1186/s12859-021-04455-3.
6
Can computer forensic tools be trusted in digital investigations?在数字调查中,计算机取证工具值得信赖吗?
Sci Justice. 2021 Mar;61(2):198-203. doi: 10.1016/j.scijus.2020.10.002. Epub 2020 Oct 28.
7
In-Depth Analysis of Computer Memory Acquisition Software for Forensic Purposes.
J Forensic Sci. 2016 Jan;61 Suppl 1:S110-6. doi: 10.1111/1556-4029.12979. Epub 2015 Nov 17.
8
Artifacts of CD burning in the Microsoft Windows master file table.
J Forensic Sci. 2012 Jan;57(1):103-7. doi: 10.1111/j.1556-4029.2011.01919.x. Epub 2011 Oct 7.
9
Large-scale digital forensic investigation for Windows registry on Apache Spark.基于 Apache Spark 的 Windows 注册表大规模数字取证调查。
PLoS One. 2022 Dec 7;17(12):e0267411. doi: 10.1371/journal.pone.0267411. eCollection 2022.
10
Digital Stratigraphy: Contextual Analysis of File System Traces in Forensic Science.数字地层学:法医学中文件系统痕迹的语境分析。
J Forensic Sci. 2018 Sep;63(5):1383-1391. doi: 10.1111/1556-4029.13722. Epub 2017 Dec 28.