25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

consequences of the method used. For example the research conducted into<br />

the reasons subrecords are created in Section 5.6.1 was broken down into<br />

smaller research areas; focused experiments, such as the use of different<br />

methods for adding files which is described in Section 5.6.1.1, assist in<br />

maintaining a relationship between the original data and the artefact. The<br />

artefacts identified as a consequence of the user behaviour were documented<br />

throughout this chapter and could be applied to artefacts identified during<br />

forensic investigations.<br />

Any artefact presented in Court must be shown to have been extracted and<br />

interpreted using a scientific method. Each artefact identified from the Ubuntu<br />

and Kubuntu thumbnail caches can be checked to ensure it has a valid<br />

structure and syntax; sub-records use the standard PNG file format. Section 5.8<br />

shows methods in which the thumbnail cache could be tampered with; however<br />

the remainder of the system would also require editing to ensure that all<br />

relationships between artefacts on the system remained valid. The artefact can<br />

provide a set of data which may also assist with identifying or disproving a type<br />

of associated behaviour. The ability to corroborate the artefacts with other<br />

system data can provide further validation of the interpretation of the data which<br />

is presented to the Court.<br />

5.11.2 Interpretation of results<br />

Thumbnail cache artefacts can provide information on potential user activity; in<br />

order to put the artefact in the context it is necessary to establish the potential<br />

system activity which led to its current state. Therefore the analyst may need to<br />

defend that the artefact is a result of the system working properly. Some of the<br />

thumbnail cache artefacts identified show the creation algorithm which can<br />

assist with verifying the artefact and related system artefacts. This research has<br />

investigated the manipulation of the thumbnail cache artefacts [Section 5.8]; it<br />

has shown that parts of the thumbnail cache can be manipulated. However for<br />

Page<br />

100

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!