References
- Peter F. Bennison and Philip J. Lasher, “Data security issues relating to end of life equipment,” IEEE International Symposium on Electronics and the Environment, pp.317-320, 2004.
- Forte, D. and Power, R., “A tour through the realm of anti-forensics,” Computer Fraud & Security, Vol.2007, Issue.6, pp.18-20, 2007. https://doi.org/10.1016/S1361-3723(07)70079-9
- John R. Mallery, “Secure File Deletion: Fact or Fiction?,” SANS GSEC Practical Assignment, Version 1.2e, 2006.
- Peter Gutmann, “Secure Deletion of Data from Magnetic and Solid-State Memory,” Sixth USENIX Security Symposium, 1996.
- DoD 5220.22-M, “National Industrial Security Program Operating Manual(NISPOM),” 2006. (http://www.dtic.mil/whs/directives/corres/html/522022m.htm)
- Simon Innes, “Secure Deletion and the Effectiveness of Evidence Elimination Software,” 3rd Australian Computer, Network & Information Forensics Conference, 2005.
- Matthew Geiger, “Evaluating Commercial Counter-Forensic Tools,” the 5th Annual Digital Forensic Research Workshop, 2005.
- Brian Carrier, “File System Forensic Analysis,” Addison-Wesly, 2005.
- DataEraser 2.0, HAURI, Inc. (http://www.hauri.co.kr/customer/product/product_view.html?product_uid=NDk=&prodcut_group=MTI=)
- East-Tec Eraser 2008(8.9), EAST Technologies (http://www.east-tec.com/consumer/eraser/index.htm)
- Eraser 5.86.1, Heidi Computers Ltd. (http://eraser.heidi.ie/)
- FINALeRASER 4.0.6.0220, FINALDATA (http://www.finaldata.co.kr/Products/?s=PRD&c=4)
- QuickClean 6.01.0003, McAfee, Inc. (http://www.mcafeestore. com/dr/sat4/ecMAIN.Entry10SP=10023&PN=1&xid=50147&V1=797957&CUR=840&DSP=&PGRP=0&ABCODE=&CACHE ID=0)
- SecureClean 4.0, WhiteCanyon Inc. (http://www.whitecanyon.com/secureclean-clean-hard-drive.php)
- Steve Anson and Steve Bunting, “Mastering, Windows Network Forensics and Investigation,” Wiley Publishing, Inc. 2007.
- T Bosschert, “Battling Anti-Forensics: Beating the U3 Stick,” Journal of Digital Forensic Practice, 2006. https://doi.org/10.1080/15567280701417975
- Harlan Carvey, “Windows Forensic Analysis DVD Toolkit,” SYNGRESS, pp.226-228, 2007.
- Harlan Carvey, “The Windows Registry as a forensic resource,” Digital Investigation, Vol.2, Issue.3, pp.201-205, 2005. https://doi.org/10.1016/j.diin.2005.07.003
- Harry Velupillai and Pontjho Mokhonoana, “Evaluation of Registry Data Removal by Shredder Programs,” Advances in Digital Forensics IV, Springer Boston, pp.51-58, 2008. https://doi.org/10.1007/978-0-387-84927-0