Ajou University repository

An Security Analysis of Ext Filesystem metadata
Citations

SCOPUS

1

Citation Export

DC Field Value Language
dc.contributor.authorShin, Yeonghun-
dc.contributor.authorKim, Hyungchan-
dc.contributor.authorJo, Wooyeon-
dc.contributor.authorShon, Taeshik-
dc.date.issued2019-12-01-
dc.identifier.urihttps://aurora.ajou.ac.kr/handle/2018.oak/36476-
dc.identifier.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85082402232&origin=inward-
dc.description.abstractUntil recently, various researches on Linux have been conducted, but the characteristics of the filesystem that can be changed as the Linux kernel version is diversified in terms of security have not been considered. Digital forensic investigations, which are not properly analyzed for major metadata changes by kernel version, can undermine investigative capabilities and lead to serious doubts about evidence. Since investigations can be conducted on a variety of Linux filesystems at the actual forensic investigation, it is necessary to analyze metadata of various filesystems by Linux distribution and kernel version. Therefore, this paper compares the difference of metadata changes that occur when deleting files for various kernel versions of Ext2 filesystems. Furthermore, we provide information about the kernel version and change time which has the change in metadata related to file recovery.-
dc.description.sponsorshipThis research was supported by Energy Cloud R&D Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT (2019M3F2A1073386)-
dc.description.sponsorshipACKNOWLEDGMENT This work was supported by Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (No.2018-0-01000, Development of Digital Forensic Integration Platform).-
dc.language.isoeng-
dc.publisherInstitute of Electrical and Electronics Engineers Inc.-
dc.subject.meshChange time-
dc.subject.meshFile recovery-
dc.subject.meshFilesystem-
dc.subject.meshForensic investigation-
dc.subject.meshLinux distributions-
dc.subject.meshLinux kernel-
dc.subject.meshSecurity analysis-
dc.titleAn Security Analysis of Ext Filesystem metadata-
dc.typeConference-
dc.citation.conferenceDate2019.12.11. ~ 2019.12.13.-
dc.citation.conferenceName4th Technology Innovation Management and Engineering Science International Conference, TIMES-iCON 2019-
dc.citation.editionTIMES-iCON 2019 - 2019 4th Technology Innovation Management and Engineering Science International Conference-
dc.citation.titleTIMES-iCON 2019 - 2019 4th Technology Innovation Management and Engineering Science International Conference-
dc.identifier.bibliographicCitationTIMES-iCON 2019 - 2019 4th Technology Innovation Management and Engineering Science International Conference-
dc.identifier.doi10.1109/times-icon47539.2019.9024546-
dc.identifier.scopusid2-s2.0-85082402232-
dc.identifier.urlhttp://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9006735-
dc.subject.keywordDigital forensics-
dc.subject.keywordExt-
dc.subject.keywordFile recovery-
dc.subject.keywordFilesystem-
dc.type.otherConference Paper-
dc.description.isoafalse-
dc.subject.subareaManagement of Technology and Innovation-
dc.subject.subareaSoftware-
dc.subject.subareaEngineering (all)-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

SHON, TAE SHIK Image
SHON, TAE SHIK손태식
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.