Digital forensic tools: Recent advances and enhancing the status quo

T Wu, F Breitinger, S O'Shaughnessy - Forensic Science International …, 2020 - Elsevier
Publications in the digital forensics domain frequently come with tools–a small piece of
functional software. These tools are often released to the public for others to reproduce …

Ten years of critical review on database forensics research

R Chopade, VK Pachghare - Digital Investigation, 2019 - Elsevier
The database is at the heart of any digital application. With the increased use of high-tech
applications, the database is used to store important and sensitive information. Sensitive …

[HTML][HTML] Database memory forensics: A machine learning approach to reverse-engineer query activity

MI Nissan, J Wagner, S Aktar - Forensic Science International: Digital …, 2023 - Elsevier
Memory analysis allows forensic investigators to establish a more complete timeline of
system activity using a snapshot of main memory (ie, RAM). Investigators may rely on such …

[PDF][PDF] Design and Analysis of a Relational Database for Behavioral Experiments Data Processing.

R Kraleva, V Kralev, N Sinyagina - International Journal of Online …, 2018 - academia.edu
This paper presents the results of a comparative analysis between different approaches to
experimental data storage and processing. Several studies related to the problem and some …

Forensic recovery of SQL server database: Practical approach

H Choi, S Lee, D Jeong - IEEE Access, 2021 - ieeexplore.ieee.org
Database forensics is becoming more important for investigators with the increased use of
the information system. Although various database forensic methods such as log analysis …

[HTML][HTML] Carving database storage to detect and trace security breaches

J Wagner, A Rasin, B Glavic, K Heart, J Furst… - Digital …, 2017 - Elsevier
Abstract Database Management Systems (DBMS) are routinely used to store and process
sensitive enterprise data. However, it is not possible to secure data by relying on the access …

Database forensic analysis with DBCarver

J Wagner, A Rasin, T Malik, K Heart, H Jehle… - CIDR 2017, 8th Biennial …, 2017 - par.nsf.gov
The increasing use of databases in the storage of critical and sensitive information in many
organizations has lead to an increase in the rate at which databases are exploited in …

Db3f & df-toolkit: The database forensic file format and the database forensic toolkit

J Wagner, A Rasin, K Heart, R Jacob, J Grier - Digital Investigation, 2019 - Elsevier
The majority of sensitive and personal user data is stored in different Database Management
Systems (DBMS). For Example, Oracle is frequently used to store corporate data, MySQL …

Harmonizing privacy regarding data retention and purging

N Scope, A Rasin, B Lenard, K Heart… - Proceedings of the 34th …, 2022 - dl.acm.org
Data privacy requirements are a complex and quickly evolving part of the data management
domain. Especially in Healthcare (eg, United States Health Insurance Portability and …

Compliance and Data Lifecycle Management in Databases and Backups

N Scope, A Rasin, B Lenard, J Wagner - International Conference on …, 2023 - Springer
Abstract From the United States' Health Insurance Portability and Accountability Act (HIPAA)
to the European Union's General Data Protection Regulation (GDPR), there has been an …