2016
DOI: 10.1016/j.diin.2016.02.001
|View full text |Cite
|
Sign up to set email alerts
|

A forensic insight into Windows 10 Jump Lists

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
14
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 18 publications
(14 citation statements)
references
References 2 publications
0
14
0
Order By: Relevance
“…In doing so, it creates a prefetch file for each application that holds important forensic artifacts such as the total count of executions and the date/time of the last eight executions [13]. Other examples of OS functionalities and services that yield valuable artifacts are the AmCache [14], thumbcache files [15], JumpLists [16,17], Windows Search Indexer [18], Cortana digital assistant [19,20], and the system resource usage monitor (SRUM) [21], to name just a few. Singh and Singh give a broad overview of the forensic artifacts created whenever Windows OS executes an application [22].…”
Section: Related Workmentioning
confidence: 99%
“…In doing so, it creates a prefetch file for each application that holds important forensic artifacts such as the total count of executions and the date/time of the last eight executions [13]. Other examples of OS functionalities and services that yield valuable artifacts are the AmCache [14], thumbcache files [15], JumpLists [16,17], Windows Search Indexer [18], Cortana digital assistant [19,20], and the system resource usage monitor (SRUM) [21], to name just a few. Singh and Singh give a broad overview of the forensic artifacts created whenever Windows OS executes an application [22].…”
Section: Related Workmentioning
confidence: 99%
“…Recently, Jump Lists has been one of the most important forensic artifacts. The function of Jump Lists is firstly introduced by the release of Windows 7 and keeps the function in new Windows systems [1], but the format of Jump Lists of Windows 7/8 is different from that of Window 10. The same with many forensic artifacts, the purpose of Jump Lists is to provide users with increasing usability and convenience.…”
Section: Introductionmentioning
confidence: 99%
“…In the experiment of Antonovich [3], FTK, Encase and a Jump Lists parser (JumpLister [4]) cooperate to look at Jump Lists data. Owing to those characteristics which Jump Lists helps the investigation of digital forensics significantly, Jump Lists has got many discussions about how to access records of Jump Lists since Jump Lists was introduced [1] and many Jump Lists analysis tools have been developed [1][3]- [10]. Furthermore, Smith [11] identified the fraudulent documents by Windows 7 Jump Lists.…”
Section: Introductionmentioning
confidence: 99%
“…Singh & Singh (2016) have shown the traces of recently accessed files and run applications in Jump Lists on a Windows system. The authors demonstrated that the traces of run applications persist even after the applications are removed from the system.…”
Section: Introductionmentioning
confidence: 99%