2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC) 2021
DOI: 10.1109/ccwc51732.2021.9376133
|View full text |Cite
|
Sign up to set email alerts
|

Discord Forensics: The Logs Keep Growing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…To our understanding, only a limited number of studies have delved into digital forensic analysis specifically focusing on the Discord application with no extensive research found on android and the lack of research on iOS platforms. Additionally, there is a notable absence of research comprehensively addressing memory, network, and storage forensic analysis on both Windows and Linux operating systems which is what we are addressing in this research [20,29].…”
Section: Other Relevant Workmentioning
confidence: 99%
“…To our understanding, only a limited number of studies have delved into digital forensic analysis specifically focusing on the Discord application with no extensive research found on android and the lack of research on iOS platforms. Additionally, there is a notable absence of research comprehensively addressing memory, network, and storage forensic analysis on both Windows and Linux operating systems which is what we are addressing in this research [20,29].…”
Section: Other Relevant Workmentioning
confidence: 99%
“…These artifacts are essential components of digital forensic investigations and provide valuable evidence that can be used to reconstruct events, analyze user behavior, and establish a timeline of digital activities. Many researchers aim to retrieve artifacts when conducting digital forensic analysis of social media applications [26][27][28][29][30][31][32]60,65,66,69,137,147].…”
Section: Artifact Analysismentioning
confidence: 99%
“…One of the more common databases seen in this review is LevelDB, which is an open-source on-disk key-value store developed by Google. LevelDb is used by Microsoft Teams [31], Discord [29,30], Riot.im [30], and others. These database files contain extensive information about the user and their activities.…”
Section: Decryption Of Databasesmentioning
confidence: 99%
“…Memory forensic techniques increase day by day from a string search to deep search, memory structural analysis, operating systems analysis, etc. Several researchers worked on different technologies of computer forensics such as: memory forensics [32], [33], [34], [35], [36], volatile memory [35], [37], [38], [39], [40], [41], log forensics [42], [43], [44], [45], [46], [47], operating system [48], [49], [50], [51], [52], [53] etc. Table 2 presents the literature review of current research work in the areas of memory forensics, computer forensics, IoT forensics, and log forensics.…”
Section: Research Backgroundmentioning
confidence: 99%
“…Instant messenger forensics to examine pieces of evidence collected through instant messenger applications, chat, and shared data. Media/USB/Memory card forensics helps analyze removable media investigations-Malware forensics helps identify malware objects and their behavior [105], [46], [106], [107]. Some other computer forensics domains, such as cloud forensic are used to examine crimes committed using cloud platforms, and database forensics help investigate data storage and privacy-related crimes [24], [108].…”
Section: H Othersmentioning
confidence: 99%