Full Text

Turn on search term navigation

Copyright Association of Digital Forensics, Security and Law 2010

Abstract

The recovery of digital evidence of crimes from storage media is an increasingly time consuming process as the capacity of the storage media is in a state of constant growth. It is also a difficult and complex task for the forensic investigator to analyse all of the locations in the storage media. These two factors, when combined, may result in a delay in bringing a case to court. The concept of this paper is to start the initial forensic analysis of the storage media in locations that are most likely to contain digital evidence, the Windows Registry. Consequently, the forensic analysis process and the recovery of digital evidence may take less time than would otherwise be required. In this paper, the Registry structure of Windows 7 is discussed together with several elements of information within the Registry of Windows 7 that may be valuable to a forensic investigator. These elements were categorized into five groups which are system, application, networks, attached devices and the history lists. We have discussed the values of identified elements to a forensic investigator. Also, a tool was implemented to perform the function of extracting these elements and presents them in usable form to a forensics investigator.. [PUBLICATION ABSTRACT]

Details

Title
Forensic Analysis of the Windows 7 Registry
Author
Alghafli, Khawla Abdulla; Jones, Andrew; Martin, Thomas Anthony
Pages
5-29
Publication year
2010
Publication date
2010
Publisher
Association of Digital Forensics, Security and Law
ISSN
15587215
e-ISSN
15587223
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
856214797
Copyright
Copyright Association of Digital Forensics, Security and Law 2010