TY - GEN
T1 - Analysis of Digital Forensics Artifacts Based on Deletion Methods in Mobile Wiping Applications
AU - Kim, Jiyoun
AU - Seo, Seunghee
AU - Seok, Byoungjin
AU - Lee, Changhoon
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - Personal information is a valuable resource for identifying individuals and, holds significant value. To protect this information, there is increasing interest among users in the complete deletion of data. However, despite being an important measure for protecting personal information, complete data deletion may be perceived as an anti-forensic measure. This paper provides an analysis of artifacts related to the use of mobile wiping applications from a digital forensic perspective, and this findings can contribute to the development of techniques for detecting applications. To this end, three mobile wiping applications that support standard data deletion techniques were analyzed by deleting camera, screenshots, download images. Then, we analyzed the residual traces left after deletion, the traces of the deletion techniques used, and whether the data was completely deleted according to the deletion techniques. The results showed that while all three applications performed deletion at the original location of the data, some data remained in other locations, indicating that the data was not completely erased. Additionally, it was found that the deletion of cache data varied between applications, traces and related artifacts of the deletion techniques used were left behind. The paper also discusses how analysis results can be applied in digital forensic investigations.
AB - Personal information is a valuable resource for identifying individuals and, holds significant value. To protect this information, there is increasing interest among users in the complete deletion of data. However, despite being an important measure for protecting personal information, complete data deletion may be perceived as an anti-forensic measure. This paper provides an analysis of artifacts related to the use of mobile wiping applications from a digital forensic perspective, and this findings can contribute to the development of techniques for detecting applications. To this end, three mobile wiping applications that support standard data deletion techniques were analyzed by deleting camera, screenshots, download images. Then, we analyzed the residual traces left after deletion, the traces of the deletion techniques used, and whether the data was completely deleted according to the deletion techniques. The results showed that while all three applications performed deletion at the original location of the data, some data remained in other locations, indicating that the data was not completely erased. Additionally, it was found that the deletion of cache data varied between applications, traces and related artifacts of the deletion techniques used were left behind. The paper also discusses how analysis results can be applied in digital forensic investigations.
KW - deletion method
KW - deletion traces
KW - mobile forensic
KW - trace of use
KW - wiping application
UR - https://www.scopus.com/pages/publications/85217361055
U2 - 10.1109/PLATCON63925.2024.10830673
DO - 10.1109/PLATCON63925.2024.10830673
M3 - Conference contribution
AN - SCOPUS:85217361055
T3 - 2024 International Conference on Platform Technology and Service, PlatCon 2024 - Proceedings
SP - 177
EP - 181
BT - 2024 International Conference on Platform Technology and Service, PlatCon 2024 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 10th International Conference on Platform Technology and Service, PlatCon 2024
Y2 - 26 August 2024 through 28 August 2024
ER -