The National Software Reference Library (NSRL) is an essential data source for forensic investigators, providing in its Reference Data Set (RDS) a set of hash values of known software. However, the NSRL RDS has not previously been tested against a broad spectrum of real-world data. The current work did this using a corpus of 36 million files on 2337 drives from 21 countries. These experiments answered a number of important questions about the NSRL RDS, including what fraction of files it recognizes of different types. NSRL coverage by vendor/product was also tested, finding 51 % of the vendor/product names in our corpus had no hash values at all in NSRL. It is shown that coverage or “recall” of the NSRL can be improved with additions from o...
Internet use, intelligent communication tools, and social media have all become an integral part of ...
Digital forensic application suites are large, expensive, complex software products, offering a rang...
Handling forensic investigations gets more and more difficult as the amount of data one has to analy...
AbstractAnti-forensic tools, techniques and methods are becoming a formidable obstacle for the digit...
Abstract. For digital forensics, eliminating the uninteresting is often more critical than finding t...
Digital Forensics is a nascent field that faces a number of technical, procedural and cultural diffi...
Much effort has been expended in recent years to cre-ate large sets of hash codes from known files. ...
The availability of data corpora is important for research, development, and education in digital fo...
Part 2: FORENSIC TECHNIQUESInternational audienceThe large amounts of data that have to be processed...
Forensic analysis commonly involves searching for personal identifiable information in an investigat...
Anti-forensic tools, techniques and methods are becoming a formidable obstacle for the digital foren...
The digital forensic community relies on a small number of complex tools to analyse digital evidence...
Hierarchical storage system namespaces are notorious for their immense size, which is a significant ...
The adoption of the digital age, globalization of the world and move towards automation has made lif...
The evaluation of digital forensic tools evaluation has been recognised as a challenging, and insuff...
Internet use, intelligent communication tools, and social media have all become an integral part of ...
Digital forensic application suites are large, expensive, complex software products, offering a rang...
Handling forensic investigations gets more and more difficult as the amount of data one has to analy...
AbstractAnti-forensic tools, techniques and methods are becoming a formidable obstacle for the digit...
Abstract. For digital forensics, eliminating the uninteresting is often more critical than finding t...
Digital Forensics is a nascent field that faces a number of technical, procedural and cultural diffi...
Much effort has been expended in recent years to cre-ate large sets of hash codes from known files. ...
The availability of data corpora is important for research, development, and education in digital fo...
Part 2: FORENSIC TECHNIQUESInternational audienceThe large amounts of data that have to be processed...
Forensic analysis commonly involves searching for personal identifiable information in an investigat...
Anti-forensic tools, techniques and methods are becoming a formidable obstacle for the digital foren...
The digital forensic community relies on a small number of complex tools to analyse digital evidence...
Hierarchical storage system namespaces are notorious for their immense size, which is a significant ...
The adoption of the digital age, globalization of the world and move towards automation has made lif...
The evaluation of digital forensic tools evaluation has been recognised as a challenging, and insuff...
Internet use, intelligent communication tools, and social media have all become an integral part of ...
Digital forensic application suites are large, expensive, complex software products, offering a rang...
Handling forensic investigations gets more and more difficult as the amount of data one has to analy...