2011 International Conference on Broadband and Wireless Computing, Communication and Applications 2011
DOI: 10.1109/bwcca.2011.64
|View full text |Cite
|
Sign up to set email alerts
|

Automatic, Selective and Secure Deletion of Digital Evidence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 19 publications
(14 citation statements)
references
References 3 publications
0
14
0
Order By: Relevance
“…In this aspect it is interesting to note that Apple's stock Photos application specifically did not generate, in our experiments, the temporary files described in this paper, whereas other 3rd party applications offering added security to store this kind of information are likely to generate the standard AirPrint traces when printing documents. As a general solution, in order to limit the possibility of recovering data from the filesystem, some techniques aimed at performing a secure deletion could be adopted, such as the one presented in [34] for the Android OS.…”
Section: Discussionmentioning
confidence: 99%
“…In this aspect it is interesting to note that Apple's stock Photos application specifically did not generate, in our experiments, the temporary files described in this paper, whereas other 3rd party applications offering added security to store this kind of information are likely to generate the standard AirPrint traces when printing documents. As a general solution, in order to limit the possibility of recovering data from the filesystem, some techniques aimed at performing a secure deletion could be adopted, such as the one presented in [34] for the Android OS.…”
Section: Discussionmentioning
confidence: 99%
“…The current framework does not implement any obfuscation methods to hide its execution. Running the framework from external media as suggested in [6] could help strengthen the validity of a forged alibi.…”
Section: Limitations and Future Workmentioning
confidence: 99%
“…It is based on the removal of unwanted traces by means of a secure deletion procedure. According to the definition given in [32], the secure deletion of an information is a task that involves the removal of any traces of this information from the system, as well as any evidence left by the deletion procedure itself. The core of a secure deletion procedure is the wiping function, which should guarantee complete removal of the selected data from the system.…”
Section: B Unwanted Evidence Handlingmentioning
confidence: 99%