• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

A reference database of Windows artifacts for file-wiping tool execution analysis.

作者信息

Joo Dabin, Lee Jiwon, Jeong Doowon

机构信息

College of Police and Criminal Justice, Dongguk University, Seoul, South Korea.

出版信息

J Forensic Sci. 2023 May;68(3):856-870. doi: 10.1111/1556-4029.15240. Epub 2023 Apr 5.

DOI:10.1111/1556-4029.15240
PMID:37017258
Abstract

Anti-forensic technology can play an effective role in protecting information, but it can make forensic investigations difficult. Specifically, file-wiping permanently erases evidence, making it challenging for investigators to determine whether a file ever existed and prolonging the investigation process. To address this issue, forensic researchers have studied anti-forensic techniques that detect file-wiping activities. Many previous studies have focused on the effects of file-wiping tools on $MFT, $LogFile, and $DATA, rather than on Windows artifacts. Additionally, previous studies that have examined Windows artifacts have considered different artifacts, making it difficult to study them in a comprehensive manner. To address this, we focused on analyzing traces in 13 Windows artifacts of 10 file-wiping tools' operations in the Windows operating system comprehensively. For our experiments, we installed each file-wiping tool on separate virtual machines and checked the traces that the tools left behind in each artifact. We then organized the results in a database format. Our analysis revealed that most of the tools left traces on other artifacts, except for JumpList, Open&SavePidlMRU, and lnk. There were also some cases where traces remained on the other three artifacts. Based on our research, forensic investigators can quickly identify whether a file-wiping tool has been used, and it can assist in decision-making for evidence collection and forensic triage.

摘要

相似文献

1
A reference database of Windows artifacts for file-wiping tool execution analysis.
J Forensic Sci. 2023 May;68(3):856-870. doi: 10.1111/1556-4029.15240. Epub 2023 Apr 5.
2
Forensic analysis of anti-forensic file-wiping tools on Windows.Windows 上反取证文件擦除工具的法医分析。
J Forensic Sci. 2022 Mar;67(2):562-587. doi: 10.1111/1556-4029.14907. Epub 2021 Oct 7.
3
Digital Stratigraphy: Contextual Analysis of File System Traces in Forensic Science.数字地层学:法医学中文件系统痕迹的语境分析。
J Forensic Sci. 2018 Sep;63(5):1383-1391. doi: 10.1111/1556-4029.13722. Epub 2017 Dec 28.
4
We are meeting on Microsoft Teams: Forensic analysis in Windows, Android, and iOS operating systems.我们正在微软团队上开会:关于Windows、安卓和iOS操作系统中的法医分析。
J Forensic Sci. 2023 Mar;68(2):434-460. doi: 10.1111/1556-4029.15208. Epub 2023 Feb 3.
5
A forensic examination of four popular cross-platform file-sharing apps with Wi-Fi P2P.对四个流行的跨平台文件共享应用程序与 Wi-Fi P2P 的法医检查。
J Forensic Sci. 2021 Jan;66(1):315-322. doi: 10.1111/1556-4029.14574. Epub 2020 Sep 28.
6
An Evidence-Based Forensic Taxonomy of Windows Phone Communication Apps.基于证据的Windows Phone通信应用法医分类法。
J Forensic Sci. 2018 May;63(3):868-881. doi: 10.1111/1556-4029.13624. Epub 2017 Aug 17.
7
Large-scale digital forensic investigation for Windows registry on Apache Spark.基于 Apache Spark 的 Windows 注册表大规模数字取证调查。
PLoS One. 2022 Dec 7;17(12):e0267411. doi: 10.1371/journal.pone.0267411. eCollection 2022.
8
Media analyses based on Microsoft NTFS file ownership.
Forensic Sci Int. 2006 Oct 16;162(1-3):44-8. doi: 10.1016/j.forsciint.2006.06.014. Epub 2006 Jul 28.
9
Artifacts of CD burning in the Microsoft Windows master file table.
J Forensic Sci. 2012 Jan;57(1):103-7. doi: 10.1111/j.1556-4029.2011.01919.x. Epub 2011 Oct 7.
10
Dataset of Windows operating system forensics artefacts.Windows操作系统取证工件数据集。
Data Brief. 2024 Jun 28;55:110693. doi: 10.1016/j.dib.2024.110693. eCollection 2024 Aug.

引用本文的文献

1
Data trace as the scientific foundation for trusted metrological data: a review for future metrology direction.数据溯源作为可信计量数据的科学基础:对未来计量方向的综述
PeerJ Comput Sci. 2025 Aug 14;11:e3106. doi: 10.7717/peerj-cs.3106. eCollection 2025.