25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

“Clear documentation is defined as something which another analyst could<br />

read, understand and use to repeat the described processes.” [Chapter<br />

4.3.1]<br />

The identification methods implemented were documented in Chapter 7, and<br />

the image fragment identification was further discussed in Chapter 8; an<br />

analyst could use the documentation to replicate the experiments. If necessary,<br />

an analyst could confirm the research results by replicating the experiments;<br />

however it may be difficult for a typical analyst to implement both the statistical<br />

and neural network identification methods described in Chapter 7. In Section<br />

2.2.2 the use of dual tool verification was discussed; if a second tool or an<br />

analyst working by hand could independently achieve the same result then this<br />

could be used for corroboration. Each implemented method provides a log<br />

which contains: the classification of each fragment, the original position of the<br />

fragment on the disk, and the reason for the classification [Section 7.9]. The log<br />

provides sufficient information about individual fragments to allow an analyst to<br />

corroborate the classification by hand or with a second tool; therefore the logs<br />

can be used to understand the process and corroborate the results.<br />

The reassembly methods implemented in Chapter 9 also provide logs which<br />

contain: the original location of the fragment, its position in the reassembled file,<br />

and the reason for its current reassembled position. This information can be<br />

used by an analyst to identify the fragments of a reassembled file by hand on<br />

the original disk and follow the information provided in the log to verify the<br />

reassembled file [Section 9.3]. The reassembly methods described in Chapter<br />

9 are based on structural and syntactical properties of the individual file types;<br />

an analyst could use the information provided to replicate the method and<br />

corroborate the results.<br />

Page<br />

268

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!