What is essential data in digital forensic analysis?

Freiling F, Gruhn M (2015)


Publication Language: English

Publication Type: Conference contribution, Original article

Publication year: 2015

Pages Range: 40-48

Conference Proceedings Title: Proceedings of the 9th International Conference on IT Security Incident Management & IT Forensics

Event location: Magdeburg

ISBN: 978-1-4799-9902-6

DOI: 10.1109/IMF.2015.20

Abstract

In his seminal work on file system forensic analysis, Carrier defined the notion of essential data as "those that areneeded to save and retrieve files." He argues that essential data is therefore more trustworthy since it has to be correctin order for the user to use the file system. In many practical settings, however, it is unclear whether a specific pieceof data is essential because either file system specifications are ambiguous or the importance of a specific data fielddepends on the operating system that processes the file system data. We therefore revisit Carrier's definition andshow that there are two types of essential data: strong and weak. While strongly essential corresponds to Carrier'sdefinition, weakly essential refers to application specific interpretations. We empirically show the amount of stronglyand weakly essential data in DOS/MBR and GPT partition systems, thereby complementing and extending Carrier'sfindings.

Authors with CRIS profile

How to cite

APA:

Freiling, F., & Gruhn, M. (2015). What is essential data in digital forensic analysis? In Proceedings of the 9th International Conference on IT Security Incident Management & IT Forensics (pp. 40-48). Magdeburg.

MLA:

Freiling, Felix, and Michael Gruhn. "What is essential data in digital forensic analysis?" Proceedings of the 9th International Conference on IT Security Incident Management & IT Forensics, Magdeburg 2015. 40-48.

BibTeX: Download