2011 IEEE 35th Annual Computer Software and Applications Conference Workshops 2011
DOI: 10.1109/compsacw.2011.68
|View full text |Cite
|
Sign up to set email alerts
|

Towards an Engineering Approach to File Carver Construction

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…The previous studies for the hidden data recovery investigated how to search and extract artifacts of deleted data upon unallocated storage space of camera devices and how to assemble found fragments [3,9]. Most of previous studies [10][11][12][13][14][15] have employed the carving technique that searches exhaustedly artifacts of deleted files upon unallocated storage space of camera systems. For more efficient searching operation, some of them [13][14][15] utilized a specific unique header and a footer signature of deleted data format.…”
Section: Corrupted Partially Recoveredmentioning
confidence: 99%
“…The previous studies for the hidden data recovery investigated how to search and extract artifacts of deleted data upon unallocated storage space of camera devices and how to assemble found fragments [3,9]. Most of previous studies [10][11][12][13][14][15] have employed the carving technique that searches exhaustedly artifacts of deleted files upon unallocated storage space of camera systems. For more efficient searching operation, some of them [13][14][15] utilized a specific unique header and a footer signature of deleted data format.…”
Section: Corrupted Partially Recoveredmentioning
confidence: 99%
“…Many tools and methods can be used to create and analyze memory dumps. We obtain the target memory dump of a Virtual Machine (VM) created using Oracle's Virtual Box 6 . Then, the RAM pages are investigated to carve PDF's textual data objects, see Figure 2.…”
Section: Step 1: Carving Pdf Objectsmentioning
confidence: 99%
“…File recovery and carving are popular approaches used in DF to reconstruct files [6]. File recovery techniques utilize the metadata of the underlying file system to recover files.…”
Section: Introductionmentioning
confidence: 99%
“…In order to make the trade-off between precision and runtime performance configurable we have implemented three model-transformations on Derric descriptions, based on an analysis of validation techniques in file carving [3]. Each transformation removes constraints so that more permissive specifications are obtained.…”
Section: Transforming Derric Modelsmentioning
confidence: 99%