Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2010.17C.2.159

A Study of Trace for Data Wiping Tools  

Kim, Yeon-Soo (고려대학교 정보경영공학전문대학원)
Bang, Je-Wan (고려대학교 정보경영공학전문대학원)
Kim, Jin-Kook (고려대학교 정보경영공학전문대학원)
Lee, Sang-Jin (고려대학교 정보경영공학전문대학원)
Abstract
The data wiping is a technique which perfectly deletes data in a storage to prevent data recovery. Currently, management of stored data is important because of increasing an accident of personal information leakage. Especially, if you need to discard data contained personal information, using a wiping tool which permanently deletes data to prevent unnecessary personal information leakage. The data wiping is also used for data security and privacy protection. However the data wiping can be used intentionally destruction of evidence. This intentionally destruction of evidence is important clues of forensic investigation. This paper demonstrates the methods for detecting the usage of wiping tools in digital forensic investigation.
Keywords
Forensic Investigation; Data Wiping; Data Recovery;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Peter F. Bennison and Philip J. Lasher, “Data security issues relating to end of life equipment,” IEEE International Symposium on Electronics and the Environment, pp.317-320, 2004.
2 Forte, D. and Power, R., “A tour through the realm of anti-forensics,” Computer Fraud & Security, Vol.2007, Issue.6, pp.18-20, 2007.   DOI   ScienceOn
3 Peter Gutmann, “Secure Deletion of Data from Magnetic and Solid-State Memory,” Sixth USENIX Security Symposium, 1996.
4 Eraser 5.86.1, Heidi Computers Ltd. (http://eraser.heidi.ie/)
5 DoD 5220.22-M, “National Industrial Security Program Operating Manual(NISPOM),” 2006. (http://www.dtic.mil/whs/directives/corres/html/522022m.htm)
6 John R. Mallery, “Secure File Deletion: Fact or Fiction?,” SANS GSEC Practical Assignment, Version 1.2e, 2006.
7 Simon Innes, “Secure Deletion and the Effectiveness of Evidence Elimination Software,” 3rd Australian Computer, Network & Information Forensics Conference, 2005.
8 Matthew Geiger, “Evaluating Commercial Counter-Forensic Tools,” the 5th Annual Digital Forensic Research Workshop, 2005.
9 Brian Carrier, “File System Forensic Analysis,” Addison-Wesly, 2005.
10 East-Tec Eraser 2008(8.9), EAST Technologies (http://www.east-tec.com/consumer/eraser/index.htm)
11 Harlan Carvey, “Windows Forensic Analysis DVD Toolkit,” SYNGRESS, pp.226-228, 2007.
12 QuickClean 6.01.0003, McAfee, Inc. (http://www.mcafeestore. com/dr/sat4/ecMAIN.Entry10SP=10023&PN=1&xid=50147&V1=797957&CUR=840&DSP=&PGRP=0&ABCODE=&CACHE ID=0)
13 SecureClean 4.0, WhiteCanyon Inc. (http://www.whitecanyon.com/secureclean-clean-hard-drive.php)
14 Steve Anson and Steve Bunting, “Mastering, Windows Network Forensics and Investigation,” Wiley Publishing, Inc. 2007.
15 DataEraser 2.0, HAURI, Inc. (http://www.hauri.co.kr/customer/product/product_view.html?product_uid=NDk=&prodcut_group=MTI=)
16 T Bosschert, “Battling Anti-Forensics: Beating the U3 Stick,” Journal of Digital Forensic Practice, 2006.   DOI   ScienceOn
17 Harry Velupillai and Pontjho Mokhonoana, “Evaluation of Registry Data Removal by Shredder Programs,” Advances in Digital Forensics IV, Springer Boston, pp.51-58, 2008.   DOI
18 FINALeRASER 4.0.6.0220, FINALDATA (http://www.finaldata.co.kr/Products/?s=PRD&c=4)
19 Harlan Carvey, “The Windows Registry as a forensic resource,” Digital Investigation, Vol.2, Issue.3, pp.201-205, 2005.   DOI   ScienceOn