2021 3rd International Cyber Resilience Conference (CRC) 2021
DOI: 10.1109/crc50527.2021.9392502
|View full text |Cite
|
Sign up to set email alerts
|

Data Wiping Tool: ByteEditor Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…There are four types of anti‐forensic techniques, including artifact wiping, data hiding, trail obfuscation, and attacks against forensic technology [2, 3]. Among them, artifact wiping, particularly file‐wiping, can have a significant impact on forensic investigations as it overwrites the source of evidence with zeroes, known patterns, or random data [4, 5]. As it can erase evidence permanently, hinder investigations, and increase analysis time [6], determining whether the file‐wiping tool has been executed is crucial in digital forensics, which requires the rapid extraction of information from evidence.…”
Section: Introductionmentioning
confidence: 99%
“…There are four types of anti‐forensic techniques, including artifact wiping, data hiding, trail obfuscation, and attacks against forensic technology [2, 3]. Among them, artifact wiping, particularly file‐wiping, can have a significant impact on forensic investigations as it overwrites the source of evidence with zeroes, known patterns, or random data [4, 5]. As it can erase evidence permanently, hinder investigations, and increase analysis time [6], determining whether the file‐wiping tool has been executed is crucial in digital forensics, which requires the rapid extraction of information from evidence.…”
Section: Introductionmentioning
confidence: 99%