2018
DOI: 10.1016/j.cose.2018.01.006
|View full text |Cite
|
Sign up to set email alerts
|

Program execution analysis in Windows: A study of data sources, their format and comparison of forensic capability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

2
6

Authors

Journals

citations
Cited by 16 publications
(11 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…The IconCache.db file is located in the %UserProfile%\AppData\ Local\ folder and contains information about the executed application path, but not the icon image data. It is known that the application records are stored in the order of execution and remain even after the program is removed, making it useful for forensic analysis [16].…”
Section: Iconcachedbmentioning
confidence: 99%
“…The IconCache.db file is located in the %UserProfile%\AppData\ Local\ folder and contains information about the executed application path, but not the icon image data. It is known that the application records are stored in the order of execution and remain even after the program is removed, making it useful for forensic analysis [16].…”
Section: Iconcachedbmentioning
confidence: 99%
“…Other examples of OS functionalities and services that yield valuable artifacts are the AmCache [14], thumbcache files [15], JumpLists [16,17], Windows Search Indexer [18], Cortana digital assistant [19,20], and the system resource usage monitor (SRUM) [21], to name just a few. Singh and Singh give a broad overview of the forensic artifacts created whenever Windows OS executes an application [22]. In [20], the same authors analyze the digital forensic arti- provided new forensic artifacts.…”
Section: Related Workmentioning
confidence: 99%
“…The execution of Your Phone application in a PC leaves the usual Windows artifacts such as Prefetch, SRUM, Jump Lists, ShimCache, Timeline, to name just a few [22]. Additionally, thumbnails of the photos/screenshots may exist in Windows's thumbcache.db [15].…”
Section: Other Artifactsmentioning
confidence: 99%
“…Jump list information is maintained on a per application basis. However, not all applications create jump lists; these include host-based applications such as Regedit, Command Prompt and Run [12]. This chapter presents a methodology for recovering deleted jump list entries in Windows 10 systems.…”
Section: Introductionmentioning
confidence: 99%