A Study of Trace for Data Wiping Tools |
Kim, Yeon-Soo
(고려대학교 정보경영공학전문대학원)
Bang, Je-Wan (고려대학교 정보경영공학전문대학원) Kim, Jin-Kook (고려대학교 정보경영공학전문대학원) Lee, Sang-Jin (고려대학교 정보경영공학전문대학원) |
1 | Peter F. Bennison and Philip J. Lasher, “Data security issues relating to end of life equipment,” IEEE International Symposium on Electronics and the Environment, pp.317-320, 2004. |
2 | Forte, D. and Power, R., “A tour through the realm of anti-forensics,” Computer Fraud & Security, Vol.2007, Issue.6, pp.18-20, 2007. DOI ScienceOn |
3 | Peter Gutmann, “Secure Deletion of Data from Magnetic and Solid-State Memory,” Sixth USENIX Security Symposium, 1996. |
4 | Eraser 5.86.1, Heidi Computers Ltd. (http://eraser.heidi.ie/) |
5 | DoD 5220.22-M, “National Industrial Security Program Operating Manual(NISPOM),” 2006. (http://www.dtic.mil/whs/directives/corres/html/522022m.htm) |
6 | John R. Mallery, “Secure File Deletion: Fact or Fiction?,” SANS GSEC Practical Assignment, Version 1.2e, 2006. |
7 | Simon Innes, “Secure Deletion and the Effectiveness of Evidence Elimination Software,” 3rd Australian Computer, Network & Information Forensics Conference, 2005. |
8 | Matthew Geiger, “Evaluating Commercial Counter-Forensic Tools,” the 5th Annual Digital Forensic Research Workshop, 2005. |
9 | Brian Carrier, “File System Forensic Analysis,” Addison-Wesly, 2005. |
10 | East-Tec Eraser 2008(8.9), EAST Technologies (http://www.east-tec.com/consumer/eraser/index.htm) |
11 | Harlan Carvey, “Windows Forensic Analysis DVD Toolkit,” SYNGRESS, pp.226-228, 2007. |
12 | QuickClean 6.01.0003, McAfee, Inc. (http://www.mcafeestore. com/dr/sat4/ecMAIN.Entry10SP=10023&PN=1&xid=50147&V1=797957&CUR=840&DSP=&PGRP=0&ABCODE=&CACHE ID=0) |
13 | SecureClean 4.0, WhiteCanyon Inc. (http://www.whitecanyon.com/secureclean-clean-hard-drive.php) |
14 | Steve Anson and Steve Bunting, “Mastering, Windows Network Forensics and Investigation,” Wiley Publishing, Inc. 2007. |
15 | DataEraser 2.0, HAURI, Inc. (http://www.hauri.co.kr/customer/product/product_view.html?product_uid=NDk=&prodcut_group=MTI=) |
16 | T Bosschert, “Battling Anti-Forensics: Beating the U3 Stick,” Journal of Digital Forensic Practice, 2006. DOI ScienceOn |
17 | Harry Velupillai and Pontjho Mokhonoana, “Evaluation of Registry Data Removal by Shredder Programs,” Advances in Digital Forensics IV, Springer Boston, pp.51-58, 2008. DOI |
18 | FINALeRASER 4.0.6.0220, FINALDATA (http://www.finaldata.co.kr/Products/?s=PRD&c=4) |
19 | Harlan Carvey, “The Windows Registry as a forensic resource,” Digital Investigation, Vol.2, Issue.3, pp.201-205, 2005. DOI ScienceOn |