25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

activity. All the non-standard subrecords were recovered providing a variety of<br />

information about icons, network places and drive allocations.<br />

The thumbnail caches recovered show that it is possible to recover fragments<br />

from previous thumbnail caches on the system. The caches may be from<br />

previously installed operating systems, deleted user accounts or from thumbnail<br />

caches deleted by the system or user to enhance system performance or<br />

privacy. Whilst the range of thumbnail caches is wide it is difficult to determine<br />

where the thumbnail cache was originally from. However using the live file set it<br />

is possible to determine earlier versions of the current thumbnail cache.<br />

For the Linux thumbnail cache PNG visual thumbnails all identified fragments<br />

were successfully reassembled however they required a significant amount of<br />

processing time. The visual thumbnails provide the same range of information<br />

as those detailed in Chapter 5. The visual thumbnails which contain the URI<br />

assist in forming a relationship with individual source files; the visual thumbnails<br />

can also be used to form relationships with the system. As with the Windows<br />

thumbnail cache it is not possible to determine whether the thumbnails come<br />

from the current or a previous installation of an operating system. It is also<br />

difficult to determine the user account. Information such as who had permission<br />

to access a URI stored in a visual thumbnail can assist with forming further<br />

relationships between the information in unallocated space and the live file set.<br />

9.10 Discussion<br />

Each of the reassembly methods implemented during this research used<br />

knowledge of the structure and syntax of the file types; the general method<br />

provided a structure for the reassembly which was supplemented by providing<br />

information on the unique characteristics of each file type. Whilst other<br />

reassembly methods could have been selected the use of file characteristics<br />

Page<br />

263

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!