25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

5.2, and 5.5) to replicate the experiments and verify the artefacts presented.<br />

The ability to replicate the results based on the descriptions provided in the<br />

chapter show the use of clear documentation; an analyst would be familiar<br />

with this style of documentation. A research paper on this work using the same<br />

style of documentation was available to analysts [Morris 2010] and was used in<br />

a lecture on thumbnail caches delivered at the Centre for Forensic Computing,<br />

<strong>Cranfield</strong> <strong>University</strong> in January 2012.<br />

In Section 5.5 the structures found in thumbnail cache artefacts are identified,<br />

this led to the experiments in Section 5.6 which enabled relationships to be<br />

formed between the artefacts and the behaviour which led to their current state.<br />

In order to corroborate the information retrieved from the thumbnail cache it was<br />

necessary to form relationships with other system artefacts which are in<br />

Section 5.7.The thumbnail cache artefacts identified during this research are<br />

justifiable as they are identified using a standard replicable process that<br />

enables the verification of the artefacts presented.<br />

The features identified in the thumbnail cache motivate the requirement to<br />

identify and provide corroboration. For example, if an analyst was investigating<br />

claims a suspect had being viewing illegal material and used a file browser, the<br />

thumbnail cache would contain a small graphic representation of a source file,<br />

and a location it had resided in [Section 5.5].It would also provide information<br />

about user behaviour which may or may not have led to the creation of the<br />

artefacts in the thumbnail cache. In order to identify the user behaviour<br />

associated with the artefacts and verify the information stored in the thumbnail<br />

cache it is necessary to form corroborative relationships with other artefacts on<br />

the system [Section 5.6]. Therefore for an analyst to put the information<br />

recovered from the thumbnail cache into context he would need to corroborate<br />

the information; this could be achieved by identifying other sources of<br />

information about the source file on the system. Whilst Ubuntu relies upon the<br />

last modification time for deciding whether to regenerate an image, Kubuntu<br />

Page 98

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!