2020
DOI: 10.1016/s1361-3723(20)30030-0
|View full text |Cite
|
Sign up to set email alerts
|

File system anti-forensics – types, techniques and tools

Abstract: Forensics paved the way for the growth of anti-forensics, and the time has come for anti-forensics to return the favour. For that purpose, it is imperative that forensic investigators and practitioners are armed with the knowledge of contemporary anti-forensics types, techniques and tools. This article aims to provide technical information and a comprehensive understanding of file system anti-forensics types, techniques and tools so as to facilitate investigators' ability to collect technically credible and le… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 9 publications
0
14
0
1
Order By: Relevance
“…Memory forensic techniques increase day by day from a string search to deep search, memory structural analysis, operating systems analysis, etc. Several researchers worked on different technologies of computer forensics such as: memory forensics [32], [33], [34], [35], [36], volatile memory [35], [37], [38], [39], [40], [41], log forensics [42], [43], [44], [45], [46], [47], operating system [48], [49], [50], [51], [52], [53] etc. Table 2 presents the literature review of current research work in the areas of memory forensics, computer forensics, IoT forensics, and log forensics.…”
Section: Research Backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…Memory forensic techniques increase day by day from a string search to deep search, memory structural analysis, operating systems analysis, etc. Several researchers worked on different technologies of computer forensics such as: memory forensics [32], [33], [34], [35], [36], volatile memory [35], [37], [38], [39], [40], [41], log forensics [42], [43], [44], [45], [46], [47], operating system [48], [49], [50], [51], [52], [53] etc. Table 2 presents the literature review of current research work in the areas of memory forensics, computer forensics, IoT forensics, and log forensics.…”
Section: Research Backgroundmentioning
confidence: 99%
“…Storage disks have defined mechanisms, structures, and RAID configurations to store and retrieve data. The disk is divided into small units such as tracks and sectors to manage its operations efficiently [49], [120]. The operating system manages data in files, and each OS has a specific file system.…”
Section: ) File System and Disk Forensicsmentioning
confidence: 99%
“…Anti‐forensics can be used by users to intentionally make changes to smartphone data to hide their involvement in criminal activities and erase incriminating events [56]. Manipulation in the form of deletion is possible by simply removing the SQLite database files.…”
Section: Limitations and Future Scopementioning
confidence: 99%
“…However, it has become difficult to recover data from Apple devices in recent iOS versions that has the potential to thwart data recovery efforts. Finally, anti-forensics (Wani et al, 2020b) can intentionally make changes to the data residing in the Android device (Wani et al, 2020a), which can be explored to ensure sanitisation of data.…”
Section: Future Workmentioning
confidence: 99%