Title of article :
Analyzing Registry, Log Files, and Prefetch Files in Finding Digital Evidence in Graphic Design Applications
Author/Authors :
Mabuto, Enos K. University of Pretoria - Department of Computer Science, South Africa , Venter, Hein S. University of Pretoria - Department of Computer Science, South Africa
From page :
137
To page :
150
Abstract :
The products of graphic design applications, leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphic design applications, and then analyzing the files associated with these applications. When analyzing digital forensic artifacts generated by an application, the specific focus is on determining whether the graphic design application was installed, whether the application was used, and determining whether an association can be made between the application’s actions and such a digital crime. This is accomplished by locating such information from the registry, log files and prefetch files. The file analysis involves analyzing files associated with these applications for file signatures and metadata. In the end it becomes possible to determine if a system has been used for creating counterfeit documents or not.
Keywords :
Digital Evidence , Digital Forensics , Digital Forensic Artifacts , Graphic Design Applications.
Journal title :
ISeCure - The ISC International Journal of Information Security
Journal title :
ISeCure - The ISC International Journal of Information Security
Record number :
2542725
Link To Document :
بازگشت