Data Erasure. Alex Applegate. Mississippi State University Digital Forensics 1

Size: px
Start display at page:

Download "Data Erasure. Alex Applegate. Mississippi State University Digital Forensics 1"

Transcription

1 Data Erasure Alex Applegate 1

2 Overview Simple File Deletion Permanent File Deletion Data Wiping Can Wiped Data Be Recovered? Deletion on Solid State Drives 2

3 Simple File Deletion When a file is deleted in a GUI, either by using the delete key or using the rightclick menu (or its equivalent) leaves a file completely intact on the hard drive. Only the location pointer is updated by the file system Windows -> Recycle Bin Macintosh -> Trash Can Linux -> Trash 3

4 Permanent File Deletion A file can be deleted from the file system, but the underlying file is still largely, if not completely, unchanged on the actual hard drive File pointer deleted from the file table and associated clusters on hard drive marked as unallocated Those clusters are then available to be overwritten 4

5 Data Wiping An application can be used to intentionally overwrite clusters deallocated by file deletion Writes binary zeroes, ones, or random data for one or more passes Still no file associated with clusters Clusters are still marked as unallocated 5

6 Can Wiped Data Be Recovered? In 1996, Peter Gutmann wrote a paper discussing data recovery using magnetic force microscopy (MFM) and the possibility to detect data leakage Described 35 possible write patterns that would ensure maximal effectiveness on any hard drive Paper in 2000 demonstrated that even the recovered information was almost completely unusable; fractional bytes and not all the time 6

7 Gutmann s Whisker Data Leakage 7

8 Can Wiped Data Be Recovered? (cont d) Gutmann published follow-up in 2001 indicating new drive technology made data leakage as indicated by the 1996 paper highly unlikely In 2006, perpendicular storage was introduced making the possibility even more remote 8

9 MFM Images Between 2000 and

10 Perpendicular Storage 10

11 Perpendicular Storage (cont d) 11

12 MFM Image After

13 Why Is There Still Concern? Solid State Hard Drives complicate the issue instructions still written for spinning disks, SSD controllers do not necessarily do what they re told DoD Standard requires 3 pass wipes for secret data, 7 passes for top secret indicating unknown government technique for recovering wiped data Additionally, a 2009 paper analyzed the actual results of commercial tools, and even wiped data was able to be recovered most of the time 13

14 Deletion on Solid State Drives Most new drives perform deletion via a garbage collection routine or by TRIM Storage is in fixed sized blocks Data is all or nothing, no slack space or overwrites Whether by GC or TRIM, removal of unallocated blocks (controlled by OS) happens every few minutes Forensics has traditionally been able to access historical artifacts even when a file location has been properly wiped These get cleaned up by SSDs Newer operating systems are making logs and building snapshots Even if something is deleted by the user, it isn t deallocated if it s referenced in a snapshot 14

15 Summary Simple File Deletion Permanent File Deletion Data Wiping Can Wiped Data Be Recovered? Deletion on Solid State Drives 15

16 Data Erasure QUESTIONS? 16

17 References Gutmann, P., 1996, Secure Deletion of Data from Magnetic and Solid State Memory, Proceedings of the 6 th Conference on USENIX Security Gutmann, P., 2001, Data Remanence in Semiconductor Devices, Proceedings of the 10 th Conference on USENIX Security Wright, C. and D. Kleiman, 2008, Overwriting Hard Drive Data: The Great Wiping Controversy, Information Systems Security Pajek, P. and E. Pimenidis, 2009, Antiforensics and Their Impact on Computer Forensic Investigations, ICGS3 DoD/NIST Standard

FILE SYSTEMS, PART 2. CS124 Operating Systems Winter , Lecture 24

FILE SYSTEMS, PART 2. CS124 Operating Systems Winter , Lecture 24 FILE SYSTEMS, PART 2 CS124 Operating Systems Winter 2015-2016, Lecture 24 2 Files and Processes The OS maintains a buffer of storage blocks in memory Storage devices are often much slower than the CPU;

More information

FILE SYSTEMS, PART 2. CS124 Operating Systems Fall , Lecture 24

FILE SYSTEMS, PART 2. CS124 Operating Systems Fall , Lecture 24 FILE SYSTEMS, PART 2 CS124 Operating Systems Fall 2017-2018, Lecture 24 2 Last Time: File Systems Introduced the concept of file systems Explored several ways of managing the contents of files Contiguous

More information

Advancements in SSD Forensics

Advancements in SSD Forensics Advancements in SSD Forensics Jeff Hedlesky, Guidance Software David Sun, S34A Chris Bross, DriveSavers www.encase.com/ceic www.s34a.com www.drivesavers.com Presentation Overview Introduction Background

More information

WipeDrive Home 9. IMPORTANT! PLEASE READ CAREFULLY:... 3 General Information... 3 WipeDrive Overview... 3 System Requirements...

WipeDrive Home 9. IMPORTANT! PLEASE READ CAREFULLY:... 3 General Information... 3 WipeDrive Overview... 3 System Requirements... Table of Contents IMPORTANT! PLEASE READ CAREFULLY:... 3 General Information... 3 WipeDrive... 3 Overview... 3 System Requirements... 3 Key Features... 4 Secure Removal of HPA and DCO... 4 Secure Erase

More information

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems

Guide to Computer Forensics and Investigations Fourth Edition. Chapter 6 Working with Windows and DOS Systems Guide to Computer Forensics and Investigations Fourth Edition Chapter 6 Working with Windows and DOS Systems Understanding Disk Drives Disk drives are made up of one or more platters coated with magnetic

More information

CSE 4482 Computer Security Management: Assessment and Forensics. Computer Forensics: Working with Windows and DOS Systems

CSE 4482 Computer Security Management: Assessment and Forensics. Computer Forensics: Working with Windows and DOS Systems CSE 4482 Computer Security Management: Assessment and Forensics Computer Forensics: Working with Windows and DOS Systems Instructor: N. Vlajic,, Fall 2010 Required reading: Guide to Computer Forensics

More information

EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture)

EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture) EI 338: Computer Systems Engineering (Operating Systems & Computer Architecture) Dept. of Computer Science & Engineering Chentao Wu wuct@cs.sjtu.edu.cn Download lectures ftp://public.sjtu.edu.cn User:

More information

File System Concepts File Allocation Table (FAT) New Technology File System (NTFS) Extended File System (EXT) Master File Table (MFT)

File System Concepts File Allocation Table (FAT) New Technology File System (NTFS) Extended File System (EXT) Master File Table (MFT) File System Concepts File Allocation Table (FAT) New Technology File System (NTFS) Extended File System (EXT) Master File Table (MFT) 1 FILE SYSTEM CONCEPTS: FILE ALLOCATION TABLE (FAT) Alex Applegate

More information

Report For Algonquin Township Highway Department

Report For Algonquin Township Highway Department Report For Algonquin Township Highway Department Prepared For: Prepared By: Robert Hanlon Attorney at Law robert@robhanlonlaw.com Andy Garrett Garrett Discovery Inc agarrett@garrettdiscovery.com Date:

More information

ASSESSING TRACE EVIDENCE LEFT BY SECURE DELETION PROGRAMS

ASSESSING TRACE EVIDENCE LEFT BY SECURE DELETION PROGRAMS Chapter 15 ASSESSING TRACE EVIDENCE LEFT BY SECURE DELETION PROGRAMS Paul Burke and Philip Craiger Abstract Secure deletion programs purport to permanently erase files from digital media. These programs

More information

Table of Contents. ShredIt X Read Me.

Table of Contents. ShredIt X Read Me. ShredIt X Read Me www.mireth.com support@mireth.com Table of Contents The Right Software For The Job About ShredIt X... 3 System Requirements...3 All about shredding... 4 ShredIt Safety Features...4 How

More information

Disk Geometry and Layout

Disk Geometry and Layout Disk Geometry and Layout Alex Applegate 1 Overview Secondary Storage Disk Addressing Master Book Record ATA Interface Host Protected Area Device Configuration Overlay Bad Blocks 2 Secondary Storage Usually

More information

Capturing RAM. Alex Applegate. Mississippi State University Digital Forensics 1

Capturing RAM. Alex Applegate. Mississippi State University Digital Forensics 1 Capturing RAM Alex Applegate 1 Overview Capture Problems Causing a Process Dump Full Manual Memory Dump Binary Block Copy Tribble Cold Boot Recovery Firewire DMA Attack 2 Capture Problems RAM has many

More information

CS24: INTRODUCTION TO COMPUTING SYSTEMS. Spring 2015 Lecture 25

CS24: INTRODUCTION TO COMPUTING SYSTEMS. Spring 2015 Lecture 25 CS24: INTRODUCTION TO COMPUTING SYSTEMS Spring 2015 Lecture 25 LAST TIME: PROCESS MEMORY LAYOUT! Explored how Linux uses IA32! All processes have a similar layout Each process has its own page table structure

More information

File Shredders. and, just what is a file?

File Shredders. and, just what is a file? File Shredders. File shredders delete a file but they do that in a way that is different from how the Windows operating system (and all regular Windows applications) delete files. To understand the difference,

More information

Sentient Storage: Do SSDs have a mind of their own? Tom Kopchak

Sentient Storage: Do SSDs have a mind of their own? Tom Kopchak Sentient Storage: Do SSDs have a mind of their own? Tom Kopchak :: @tomkopchak About me Why we're here Current forensic practices for working with hard drives are well-defined Solid state drives behave

More information

The forensic effectiveness of virtual disk sanitization

The forensic effectiveness of virtual disk sanitization The forensic effectiveness of virtual disk sanitization Joshua Sablatura Department of Computer Science Sam Houston State University Huntsville, Texas, 77341 Email:jds088@shsu.edu Umit Karabiyik Department

More information

Some reasons to repair your boot-loader might include installing Microsoft Windows after you have installed Ubuntu, adding or removing a hard drive.

Some reasons to repair your boot-loader might include installing Microsoft Windows after you have installed Ubuntu, adding or removing a hard drive. How To Recover Linux After Install Windows 7 Over If you have Windows 7 dual booting with Ubuntu and you want Windows 7 To do this I am going to show you how to create a system recovery disk, how to After

More information

Computer Forensics: Investigating Data and Image Files, 2nd Edition. Chapter 3 Forensic Investigations Using EnCase

Computer Forensics: Investigating Data and Image Files, 2nd Edition. Chapter 3 Forensic Investigations Using EnCase Computer Forensics: Investigating Data and Image Files, 2nd Edition Chapter 3 Forensic Investigations Using EnCase Objectives After completing this chapter, you should be able to: Understand evidence files

More information

Disk Drill by LaWanda Warren

Disk Drill by LaWanda Warren Disk Drill by LaWanda Warren GOAL OF PROJECT If you're a forensic investigator or even an everyday computer user and you want to recover some files or images from corrupt hard drive or even an external

More information

The ability to reliably determine file timestamps on modern filesystems using copy-on-write

The ability to reliably determine file timestamps on modern filesystems using copy-on-write The ability to reliably determine file timestamps on modern filesystems using copy-on-write The specifics of storing metadata on filesystems without copy-on-write Old filesystems like NTFS, FAT, and EXT,

More information

Chapter Two File Systems. CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D.

Chapter Two File Systems. CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D. Chapter Two File Systems CIS 4000 Intro. to Forensic Computing David McDonald, Ph.D. 1 Learning Objectives At the end of this section, you will be able to: Explain the purpose and structure of file systems

More information

CHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed.

CHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed. CHAPTER 11: IMPLEMENTING FILE SYSTEMS (COMPACT) By I-Chen Lin Textbook: Operating System Concepts 9th Ed. File-System Structure File structure Logical storage unit Collection of related information File

More information

How to Rescue a Deleted File Using the Free Undelete 360 Program

How to Rescue a Deleted File Using the Free Undelete 360 Program R 095/1 How to Rescue a Deleted File Using the Free Program This article shows you how to: Maximise your chances of recovering the lost file View a list of all your deleted files in the free Restore a

More information

Running head: FTK IMAGER 1

Running head: FTK IMAGER 1 Running head: FTK IMAGER 1 FTK Imager Jean-Raymond Ducasse CSOL-590 June 26, 2017 Thomas Plunkett FTK IMAGER 2 FTK Imager Outline Process for Adding Individual Files & Folders as Evidence Items Although

More information

Blancco File Eraser Security Target. For the Common Criteria Certification of Blancco File Eraser Version

Blancco File Eraser Security Target. For the Common Criteria Certification of Blancco File Eraser Version Blancco File Eraser Security Target For the Common Criteria Certification of Blancco File Eraser Version 2.0 www.blancco.com Table of Content 1 Security Target Introduction... 3 1.1 ST Reference... 3 1.2

More information

Forensic and Anti-Forensic on modern Computer Systems

Forensic and Anti-Forensic on modern Computer Systems Forensic and Anti-Forensic on modern Computer Systems Alexander Krenhuber 1 and Andreas Niederschick 1 Johannes Kepler Universität Linz, Institut für Informationsverarbeitung und Mikroprozessortechnik

More information

Some Basic Terminology

Some Basic Terminology Some Basic Terminology A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Here are a few terms you'll run into: A Application Files Program files environment where you can create and edit the kind of

More information

Ontrack EasyRecovery 11 New Features Guide. S.M.A.R.T. Analysis Recovering from a VMware VMDK image Secure Data Erasure

Ontrack EasyRecovery 11 New Features Guide. S.M.A.R.T. Analysis Recovering from a VMware VMDK image Secure Data Erasure Ontrack EasyRecovery 11 New Features Guide S.M.A.R.T. Analysis Recovering from a VMware VMDK image Secure Data Erasure S.M.A.R.T. Analysis S.M.A.R.T. Scan identifies the amount and type of data being used,

More information

SMORE: A Cold Data Object Store for SMR Drives

SMORE: A Cold Data Object Store for SMR Drives SMORE: A Cold Data Object Store for SMR Drives Peter Macko, Xiongzi Ge, John Haskins Jr.*, James Kelley, David Slik, Keith A. Smith, and Maxim G. Smith Advanced Technology Group NetApp, Inc. * Qualcomm

More information

Forensic Discovery. Wietse Venema IBM T.J.Watson Research, USA

Forensic Discovery. Wietse Venema IBM T.J.Watson Research, USA Forensic Discovery Wietse Venema wietse@porcupine.org IBM T.J.Watson Research, USA Overview Information on retired disks. Information on overwritten disks. Persistence of deleted file information. Persistence

More information

SSD (Solid State Disk)

SSD (Solid State Disk) SSD (Solid State Disk) http://en.wikipedia.org/wiki/solid-state_drive SSD (Solid State Disk) drives Most SSD drives gives very good performance 4x ~ 100x No noise, low weight, power and heat generation

More information

Page Mapping Scheme to Support Secure File Deletion for NANDbased Block Devices

Page Mapping Scheme to Support Secure File Deletion for NANDbased Block Devices Page Mapping Scheme to Support Secure File Deletion for NANDbased Block Devices Ilhoon Shin Seoul National University of Science & Technology ilhoon.shin@snut.ac.kr Abstract As the amount of digitized

More information

The What, Why and How of the Pure Storage Enterprise Flash Array. Ethan L. Miller (and a cast of dozens at Pure Storage)

The What, Why and How of the Pure Storage Enterprise Flash Array. Ethan L. Miller (and a cast of dozens at Pure Storage) The What, Why and How of the Pure Storage Enterprise Flash Array Ethan L. Miller (and a cast of dozens at Pure Storage) Enterprise storage: $30B market built on disk Key players: EMC, NetApp, HP, etc.

More information

IRIS LLC Sample Interrogatories for Electronic Discovery. UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction]

IRIS LLC Sample Interrogatories for Electronic Discovery. UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction] IRIS LLC Sample Interrogatories for Electronic Discovery UNITED STATES DISTRICT COURT DISTRICT OF [Jurisdiction] Court File No.: Plaintiff, INTERROGATORIES TO [Party Name v. Defendant, I. Definition. The

More information

TODAY AND TOMORROW. Storage CHAPTER

TODAY AND TOMORROW. Storage CHAPTER 1 TODAY AND TOMORROW 3 Storage CHAPTER Storage Systems Characteristics All storage systems have specific characteristics Storage medium (what data is stored on) Can be removable or nonremovable from the

More information

Google Cloud Whitepaper September Data deletion on Google Cloud Platform

Google Cloud Whitepaper September Data deletion on Google Cloud Platform Google Cloud Whitepaper September 2018 Data deletion on Google Cloud Platform Table of contents Overview 3 CIO-level summary 3 Introduction 4 Data storage and replication 5 Secure and effective data deletion

More information

Chapter 10: Mass-Storage Systems

Chapter 10: Mass-Storage Systems Chapter 10: Mass-Storage Systems Silberschatz, Galvin and Gagne 2013 Chapter 10: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space

More information

Chapter 10: Mass-Storage Systems. Operating System Concepts 9 th Edition

Chapter 10: Mass-Storage Systems. Operating System Concepts 9 th Edition Chapter 10: Mass-Storage Systems Silberschatz, Galvin and Gagne 2013 Chapter 10: Mass-Storage Systems Overview of Mass Storage Structure Disk Structure Disk Attachment Disk Scheduling Disk Management Swap-Space

More information

InfoWatch CryptoStorage. User Guide

InfoWatch CryptoStorage. User Guide InfoWatch CryptoStorage User Guide I N F O W A T C H C R Y P T O S T O R A G E User Guide ZAO InfoWatch Phone/fax: +7(495)22-900-22 http://www.infowatch.com Last edited: December 2008 Table of Contents

More information

Overprovisioning and the SanDisk X400 SSD

Overprovisioning and the SanDisk X400 SSD and the SanDisk X400 SSD Improving Performance and Endurance with Rev 1.2 October 2016 CSS Technical Marketing Western Digital Technologies, Inc. 951 SanDisk Dr. Milpitas, CA 95035 Phone (408) 801-1000

More information

Hard facts. Hard disk drives

Hard facts. Hard disk drives Hard facts Text by PowerQuest, photos and drawings Vlado Damjanovski 2004 What is a hard disk? A hard disk or hard drive is the part of your computer responsible for long-term storage of information. Unlike

More information

C13: Files and Directories: System s Perspective

C13: Files and Directories: System s Perspective CISC 7310X C13: Files and Directories: System s Perspective Hui Chen Department of Computer & Information Science CUNY Brooklyn College 4/19/2018 CUNY Brooklyn College 1 File Systems: Requirements Long

More information

Tricky issues in file systems

Tricky issues in file systems Tricky issues in file systems Taylor Riastradh Campbell campbell@mumble.net riastradh@netbsd.org EuroBSDcon 2015 Stockholm, Sweden October 4, 2015 What is a file system? Standard Unix concept: hierarchy

More information

Multi-version Data recovery for Cluster Identifier Forensics Filesystem with Identifier Integrity

Multi-version Data recovery for Cluster Identifier Forensics Filesystem with Identifier Integrity Multi-version Data recovery for Cluster Identifier Forensics Filesystem with Identifier Integrity Mohammed Alhussein, Duminda Wijesekera Department of Computer Science George Mason University Fairfax,

More information

TRANSACTIONAL FLASH CARSTEN WEINHOLD. Vijayan Prabhakaran, Thomas L. Rodeheffer, Lidong Zhou

TRANSACTIONAL FLASH CARSTEN WEINHOLD. Vijayan Prabhakaran, Thomas L. Rodeheffer, Lidong Zhou Department of Computer Science Institute for System Architecture, Operating Systems Group TRANSACTIONAL FLASH Vijayan Prabhakaran, Thomas L. Rodeheffer, Lidong Zhou CARSTEN WEINHOLD MOTIVATION Transactions

More information

Manually Wipe Hard Drive Software Windows 7 Clean

Manually Wipe Hard Drive Software Windows 7 Clean Manually Wipe Hard Drive Software Windows 7 Clean How to format a hard drive in Windows Vista, 7 or 8: plus how to format hard drive from This program will totally erase and format your hard disk, allowing

More information

Manually Wipe Hard Drive Windows 7 Command Prompt Format

Manually Wipe Hard Drive Windows 7 Command Prompt Format Manually Wipe Hard Drive Windows 7 Command Prompt Format Pro tip: Use Windows 8's Format command to perform a secure disk wipe He asked me what program I would recommend for securely wiping a disk. Microsoft

More information

SECUDRIVE Sanitizer Portable User Guide

SECUDRIVE Sanitizer Portable User Guide SECUDRIVE Sanitizer Portable User Guide Doc Ver. 2.0.27.238 2014-04-24 Brainzsquare, Inc. TABLE OF CONTENTS 1 Overview... 3 1.1 Features... 3 2 PC Sanitization... 5 2.1 Program Package... 5 2.2 Running

More information

File Systems: Interface and Implementation

File Systems: Interface and Implementation File Systems: Interface and Implementation CSCI 315 Operating Systems Design Department of Computer Science Notice: The slides for this lecture have been largely based on those from an earlier edition

More information

Testing the Date Maintenance of the File Allocation Table File System

Testing the Date Maintenance of the File Allocation Table File System Abstract Testing the Date Maintenance of the File Allocation Table File Tom Waghorn Edith Cowan University e-mail: twaghorn@student.ecu.edu.au The directory entries used in the File Allocation Table filesystems

More information

ShredIt Read Me www.mireth.com support@mireth.com Table of Contents The Right Software For The Job About ShredIt... 2 System Requirements...2 All about shredding... 3 ShredIt Safety Features...3 How a

More information

Why SaaS isn t Backup

Why SaaS isn t Backup EBOOK LOGO HERE Why SaaS isn t Backup Yes, You need to backup your cloud data. 1 One of the most business friendly innovations in recent years has been the proliferation of cloud apps like Google Apps,,

More information

The Villages Computer Club - no meeting Friday 7/5/2013 due to Holiday. The next ipad meeting will be on Tuesday July 2,2013 at 1:30, Colony Cottage.

The Villages Computer Club - no meeting Friday 7/5/2013 due to Holiday. The next ipad meeting will be on Tuesday July 2,2013 at 1:30, Colony Cottage. The Villages Computer Club - no meeting Friday 7/5/2013 due to Holiday. The next ipad meeting will be on Tuesday July 2,2013 at 1:30, Colony Cottage. We will be discussing various apps and then a Basic

More information

Machine Language and System Programming

Machine Language and System Programming زبان ماشين وبرنامه نويسی سيستم Machine Language and System Programming جلسه دوازدھم دانشگاه صنعتی ھمدان پاييز 1389 Objectives Explain the purpose and structure of file systems Describe Microsoft file structures

More information

Defense Security Service Office of the Designated Approval Authority Process for Clearing a Blackberry

Defense Security Service Office of the Designated Approval Authority Process for Clearing a Blackberry Defense Security Service Office of the Designated Approval Authority Process for Clearing a Blackberry This process is recommended for use by Industry when a Blackberry must be cleared as a result of a

More information

Dynamic Storage Allocation

Dynamic Storage Allocation 6.172 Performance Engineering of Software Systems LECTURE 10 Dynamic Storage Allocation Charles E. Leiserson October 12, 2010 2010 Charles E. Leiserson 1 Stack Allocation Array and pointer A un Allocate

More information

Virtual Swap Space in SunOS

Virtual Swap Space in SunOS Virtual Swap Space in SunOS Howard Chartock Peter Snyder Sun Microsystems, Inc 2550 Garcia Avenue Mountain View, Ca 94043 howard@suncom peter@suncom ABSTRACT The concept of swap space in SunOS has been

More information

Ravi Kant Chaurasia *1, Dr. Priyanka Sharma 2 *1 M.Tech Cyber Security, Raksha Shakti University, Ahmedabad, Gujarat, India ABSTRACT I.

Ravi Kant Chaurasia *1, Dr. Priyanka Sharma 2 *1 M.Tech Cyber Security, Raksha Shakti University, Ahmedabad, Gujarat, India ABSTRACT I. International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Solid State Drive (SSD) Forensics Analysis : A

More information

Microsoft File Allocation Table

Microsoft File Allocation Table Microsoft File Allocation Table CSC362, Information Security originally appeared in late 1970s for small disks with simple folder structures uses a FAT to index files (naturally) the original FAT- 12 gave

More information

Secure Erasure of Flash Memory

Secure Erasure of Flash Memory Secure Erasure of Flash Memory Adrian Caulfield, Laura Grupp, Joel Coburn, Ameen Akel, Steven Swanson Non-volatile Systems Laboratory Department of Computer Science and Engineering University of California,

More information

How Do I Delete Files From My Startup Disk Macbook Pro

How Do I Delete Files From My Startup Disk Macbook Pro How Do I Delete Files From My Startup Disk Macbook Pro If your Apple/Mac computer is displaying the error message that the hard You need to make. The one place I least like to see a beach ball is on my

More information

Steganos Safe Professional th June 2007

Steganos Safe Professional th June 2007 Steganos Safe Professional 2007 26 th June 2007 Contents Page Introduction 4 Installation and Deployment 5 Managing and Policies 6 Recovery Using EDK 8 Setting Up Network Shares 8 Creating A Key Pair 8

More information

Memory - Paging. Copyright : University of Illinois CS 241 Staff 1

Memory - Paging. Copyright : University of Illinois CS 241 Staff 1 Memory - Paging Copyright : University of Illinois CS 241 Staff 1 Physical Frame Allocation How do we allocate physical memory across multiple processes? What if Process A needs to evict a page from Process

More information

User Guide. Version Number 1.1

User Guide. Version Number 1.1 User Guide Version Number 1.1 Copyright 2002, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work

More information

Technical concepts. Some basics of computers today. Comp 399

Technical concepts. Some basics of computers today. Comp 399 Technical concepts Some basics of computers today. Comp 399 Admin Anyone new?. http://www.cnn.com/2013/07/12/tech/social-media http://tv.msnbc.com/2013/08/13/pre-trial-hearings- Locard's Exchange Principle

More information

Forensic Analysis of Windows 10 Volume Shadow Copy Service

Forensic Analysis of Windows 10 Volume Shadow Copy Service Forensic Analysis of Windows 10 Volume Shadow Copy Service Ahmad Ghafarian, Ph.D. Dept. of Computer Science & Information Systems Mike Cottrell College of Business University of North Georgia Dahlonega,

More information

CS720 - Operating Systems

CS720 - Operating Systems CS720 - Operating Systems File Systems File Concept Access Methods Directory Structure File System Mounting File Sharing - Protection 1 File Concept Contiguous logical address space Types: Data numeric

More information

How to Restore a Windows System to Bare Metal

How to Restore a Windows System to Bare Metal This article refers to the Barracuda Backup Legacy Release firmware or newer, except where noted. Bare metal recovery allows you to restore a complete Microsoft Windows system, including data, settings,

More information

File Systems: Allocation Issues, Naming, and Performance CS 111. Operating Systems Peter Reiher

File Systems: Allocation Issues, Naming, and Performance CS 111. Operating Systems Peter Reiher File Systems: Allocation Issues, Naming, and Performance Operating Systems Peter Reiher Page 1 Outline Allocating and managing file system free space File naming and directories File volumes File system

More information

Heap Management. Heap Allocation

Heap Management. Heap Allocation Heap Management Heap Allocation A very flexible storage allocation mechanism is heap allocation. Any number of data objects can be allocated and freed in a memory pool, called a heap. Heap allocation is

More information

Data Erasure Software Changes

Data Erasure Software Changes Data Erasure Software Changes Current Process Permanent data erasure goes beyond basic file deletion and format commands which only remove part of the information stored on a device. The Secure Data Erasure

More information

StackVsHeap SPL/2010 SPL/20

StackVsHeap SPL/2010 SPL/20 StackVsHeap Objectives Memory management central shared resource in multiprocessing RTE memory models that are used in Java and C++ services for Java/C++ programmer from RTE (JVM / OS). Perspectives of

More information

Computer Forensics CCIC Training

Computer Forensics CCIC Training Computer Forensics CCIC Training Chapter 7: Recycle Bin Lauren Pixley and Cassidy Elwell May 2017 (Version 1) This work by California Cyber Training Complex is licensed under a Creative Commons Attribution-NonCommercial

More information

JOURNALING FILE SYSTEMS. CS124 Operating Systems Winter , Lecture 26

JOURNALING FILE SYSTEMS. CS124 Operating Systems Winter , Lecture 26 JOURNALING FILE SYSTEMS CS124 Operating Systems Winter 2015-2016, Lecture 26 2 File System Robustness The operating system keeps a cache of filesystem data Secondary storage devices are much slower than

More information

Chapter 11: Implementing File-Systems

Chapter 11: Implementing File-Systems Chapter 11: Implementing File-Systems Chapter 11 File-System Implementation 11.1 File-System Structure 11.2 File-System Implementation 11.3 Directory Implementation 11.4 Allocation Methods 11.5 Free-Space

More information

1:1 Drive Duplicator and Eraser for 2.5in / 3.5in SATA Drives

1:1 Drive Duplicator and Eraser for 2.5in / 3.5in SATA Drives 1:1 Drive Duplicator and Eraser for 2.5in / 3.5in SATA Drives Product ID: SATDUP11 The SATDUP11 standalone hard drive duplicator eraser enables you to copy 1-to-1, or erase up to 2 SATA hard drives simultaneously

More information

DiskClon : Disk duplicator and wiper. A Windows Embedded Partner

DiskClon : Disk duplicator and wiper. A Windows Embedded Partner : Disk duplicator and wiper Summary of product Disk wiping function Introduction of product Efficiency of wiping process Various additional service User interface Appearance: Portable Appearance: DC3000-16HL

More information

The Google File System

The Google File System October 13, 2010 Based on: S. Ghemawat, H. Gobioff, and S.-T. Leung: The Google file system, in Proceedings ACM SOSP 2003, Lake George, NY, USA, October 2003. 1 Assumptions Interface Architecture Single

More information

6.172 Performance Engineering of Software Systems Spring Lecture 9. P after. Figure 1: A diagram of the stack (Image by MIT OpenCourseWare.

6.172 Performance Engineering of Software Systems Spring Lecture 9. P after. Figure 1: A diagram of the stack (Image by MIT OpenCourseWare. 6.172 Performance Engineering of Software Systems Spring 2009 Lecture 9 MIT OpenCourseWare Dynamic Storage Allocation Stack allocation: LIFO (last-in-first-out) Array and pointer A used unused P before

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions CB-ISA225-U3 - IDE/SATA TO USB 3.0 Adapter 1. Will the CB-ISA225-U3 works with my Windows 8, 8.1, 10 or Mac OS X (10.6 or newer)? Yes, it will work correctly. 2. Does this device

More information

Overview IN this chapter we will study. William Stallings Computer Organization and Architecture 6th Edition

Overview IN this chapter we will study. William Stallings Computer Organization and Architecture 6th Edition William Stallings Computer Organization and Architecture 6th Edition Chapter 4 Cache Memory Overview IN this chapter we will study 4.1 COMPUTER MEMORY SYSTEM OVERVIEW 4.2 CACHE MEMORY PRINCIPLES 4.3 ELEMENTS

More information

Forensic Discovery. Wietse Venema IBM T.J.Watson Research, USA

Forensic Discovery. Wietse Venema IBM T.J.Watson Research, USA Forensic Discovery Wietse Venema wietse@porcupine.org IBM T.J.Watson Research, USA Global hard disk market (Millions of units, source: Dataquest) 250 200 150 100 Retired Shipped 50 0 1997 1998 1999 2000

More information

Chapter 14: File-System Implementation

Chapter 14: File-System Implementation Chapter 14: File-System Implementation Directory Implementation Allocation Methods Free-Space Management Efficiency and Performance Recovery 14.1 Silberschatz, Galvin and Gagne 2013 Objectives To describe

More information

Computer Architecture and System Software Lecture 09: Memory Hierarchy. Instructor: Rob Bergen Applied Computer Science University of Winnipeg

Computer Architecture and System Software Lecture 09: Memory Hierarchy. Instructor: Rob Bergen Applied Computer Science University of Winnipeg Computer Architecture and System Software Lecture 09: Memory Hierarchy Instructor: Rob Bergen Applied Computer Science University of Winnipeg Announcements Midterm returned + solutions in class today SSD

More information

EaseUS Partition Master

EaseUS Partition Master EaseUS Partition Master User Guide Table of content Table of content... - 2 - Overview... - 1 - Welcome... - 1 - Edition comparison... - 1 - Getting started... - 2 - Hardware requirements... - 2 - Supported

More information

Analyzing the Impact of a Virtual Machine on a Host Machine

Analyzing the Impact of a Virtual Machine on a Host Machine Publications 2009 Analyzing the Impact of a Virtual Machine on a Host Machine Greg Dorn Chris Marberry Scott Conrad Philip Craiger University of Central Florida, craigerj@erau.edu Follow this and additional

More information

Forensic Discovery. Lesson 1 Reference: Farmer & Venema. Mississippi State University Digital Forensics 1

Forensic Discovery. Lesson 1 Reference: Farmer & Venema. Mississippi State University Digital Forensics 1 Forensic Discovery Lesson 1 Reference: Farmer & Venema 1 The Spirit of Forensic Discovery Now, a few words on looking for things: When you go looking for something specific, your chances of finding it

More information

FFS: The Fast File System -and- The Magical World of SSDs

FFS: The Fast File System -and- The Magical World of SSDs FFS: The Fast File System -and- The Magical World of SSDs The Original, Not-Fast Unix Filesystem Disk Superblock Inodes Data Directory Name i-number Inode Metadata Direct ptr......... Indirect ptr 2-indirect

More information

Perform page replacement. (Fig 8.8 [Stal05])

Perform page replacement. (Fig 8.8 [Stal05]) Virtual memory Operations and policies Chapters 3.4. 3.7 1 Policies and methods Fetch policy (Noutopolitiikka) When to load page to memory? Placement policy (Sijoituspolitiikka ) Where to place the new

More information

Using WinDirStat to Find Large Files

Using WinDirStat to Find Large Files Using WinDirStat to Find Large Files Ronald Ross rross@spkaa.com WinDirStat is a utility which can be used on Windows to locate large files as candidates for deletion (or for whatever reason). The contents

More information

File Carving Using Sequential Hypothesis Testing

File Carving Using Sequential Hypothesis Testing File Carving Using Sequential Hypothesis Testing Anandabrata (Pasha) Pal, Taha Sencar and Nasir Memon Introduction File Carving: recovery without file system meta-data. Recovery based on file structure/content

More information

Downloaded from various sources on the NET

Downloaded from various sources on the NET Overview Computers. Hardware components of a Computer. Purpose and functions of computer operating systems. Evolution of computer operating systems. Operating systems available today. Downloaded from various

More information

Installing Windows 7 Lesson 2

Installing Windows 7 Lesson 2 Installing Windows 7 Lesson 2 Objectives Select the appropriate installation option Perform a clean installation of Windows 7 Migrate user files and settings to Windows 7 Perform an upgrade to Windows

More information

Partition External Hard Drive Without Losing Data Mac Os X

Partition External Hard Drive Without Losing Data Mac Os X Partition External Hard Drive Without Losing Data Mac Os X If your Mac's hard drive is small and your Time Machine hard drive is big, At the same time, external hard drives are cheaper and roomier than

More information

File systems, databases, cloud storage

File systems, databases, cloud storage File systems, databases, cloud storage file: a sequence of bytes stored on a computer content is arbitrary (just bytes); any structure is imposed by the creator of the file, not by the operating system

More information

CMSC 330: Organization of Programming Languages

CMSC 330: Organization of Programming Languages CMSC 330: Organization of Programming Languages Memory Management and Garbage Collection CMSC 330 - Spring 2013 1 Memory Attributes! Memory to store data in programming languages has the following lifecycle

More information

CS3600 SYSTEMS AND NETWORKS

CS3600 SYSTEMS AND NETWORKS CS3600 SYSTEMS AND NETWORKS NORTHEASTERN UNIVERSITY Lecture 11: File System Implementation Prof. Alan Mislove (amislove@ccs.neu.edu) File-System Structure File structure Logical storage unit Collection

More information

Microsoft Office 2007, 2010 Registry Artifacts Dustin Hurlbut September 16, 2010

Microsoft Office 2007, 2010 Registry Artifacts Dustin Hurlbut September 16, 2010 Microsoft Office 2007, 2010 Registry Artifacts Dustin Hurlbut September 16, 2010 INTRODUCTION Previous versions of Microsoft Office used application specific registry artifacts to track opened documents.

More information

File Systems and Volumes

File Systems and Volumes File Systems and Volumes Section II. Basic Forensic Techniques and Tools CSF: Forensics Cyber-Security MSIDC, Spring 2015 Nuno Santos Summary! Data organization in storage systems! File deletion and recovery!

More information