25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

In Chapter 9.5 a decision was taken to present the analyst with all valid image<br />

reconstructions. The file system information relating to fragments in unallocated<br />

space may not be available; this can make forming relationships between<br />

fragments difficult. There may be multiple versions of the thumbnail cache and<br />

subrecords relating to individual files which may lead to a file fragment<br />

reassembly which appears valid but was not an actual file on the device. This<br />

led to the decision to present the analyst with all valid image reconstructions;<br />

allowing the analyst to review the logs showing the reasoning which led to each<br />

reconstructed images. The analyst can then verify the information and make<br />

their own decision about what artefacts to present in their report.<br />

11.8 Conclusion<br />

In conclusion, this research has taken a large research question and logically<br />

broken it down into smaller research goals with the aim of supporting or<br />

disproving the central hypothesis. This has been achieved by creating a set of<br />

criteria in order to evaluate the evidential value of thumbnail cache artefacts; the<br />

criteria were developed by evaluating the potential constraints on digital<br />

evidence and applying this information to the thumbnail cache. The<br />

development of the criteria before performing further investigation ensured that<br />

the criteria were independent of the results of this research. This research has<br />

described both the structure and behaviour of several popular implementations<br />

of the thumbnail cache; this research could have been improved by further<br />

investigation into the thumbs.db format.<br />

This research compared a variety of commonly implemented file fragment<br />

identification techniques; identification methods independently attempted to<br />

identify file fragments based solely on their content. Reassembly methods were<br />

based on the structural and behavioural research performed as this was<br />

deemed the most suitable method for Forensic Computing. Further research<br />

Page<br />

288

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!