25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

chapter evaluates possible image fragment identification methods; this research<br />

enables an approach to be created to improve the accuracy of identifying<br />

potential image-only thumbnail cache file fragments. The aim of this chapter is<br />

to maximise the number of file fragments available for the reassembly process;<br />

this led to a substantial number of standard image fragments being falsely<br />

identified as thumbnail cache fragments. It was determined that having a large<br />

number of false positives for the image category was preferable as it makes<br />

successful reassembly more likely.<br />

Chapter 9 describes the research conducted into methods of reassembling the<br />

thumbnail cache file fragments identified in Chapters 7 and 8. A general<br />

reassembly model was constructed based upon the methodology for<br />

reassembling a jigsaw puzzle. Each file type used in the thumbnail caches’<br />

examined in Chapters 5 and 6 was then separately considered to assist with<br />

the reassembly and validation of the file fragment sequences produced. This<br />

Chapter concludes with a description of the artefacts identified from data set 3<br />

which contained data taken from unallocated space using the implemented<br />

identification and reassembly approaches.<br />

Chapter 10 evaluates the evidential value of both complete and deleted<br />

fragments of operating system thumbnail caches. The evidential value of the<br />

thumbnail caches identified in Chapters 5 and 6, as well as the fragments<br />

recovered and reassembled at the end of Chapter 9, are evaluated against the<br />

criteria set in Chapter 4. This chapter highlights the fact that some artefacts,<br />

such as thumbnail caches from previous windows installations, can only be<br />

recovered from unallocated space. It also highlights the increased evidential<br />

value of using complete and deleted fragments of thumbnail caches together to<br />

increase understanding of the system’s activity.<br />

Page 8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!