Forensic recovery of SQL server database: Practical approach

H Choi, S Lee, D Jeong - IEEE Access, 2021 - ieeexplore.ieee.org
Database forensics is becoming more important for investigators with the increased use of
the information system. Although various database forensic methods such as log analysis …

Db3f & df-toolkit: The database forensic file format and the database forensic toolkit

J Wagner, A Rasin, K Heart, R Jacob, J Grier - Digital Investigation, 2019 - Elsevier
The majority of sensitive and personal user data is stored in different Database Management
Systems (DBMS). For Example, Oracle is frequently used to store corporate data, MySQL …

Electronic Evidence: A Framework for Applying Digital Forensics to Data Base

S Boumediene, S Boumediene - Journal of Forensic …, 2023 - publications.aaahq.org
Accounting data bases contain much information reflecting a company's financial
performance, clients, suppliers, and other relevant information about the company's …

Trusted relational databases with blockchain: design and optimization

A Beirami, Y Zhu, K Pu - Procedia Computer Science, 2019 - Elsevier
With the emergence of large scale data collection from Internet of Things and mobile
devices, the notion of trust is now an increasingly important aspect of the next generation of …

Tampering detection of distributed databases using blockchain technology

K Rani, C Sharma - 2019 twelfth international conference on …, 2019 - ieeexplore.ieee.org
Data stored in different kinds of Database management systems is always prone to
tampering through internal or external sources. To detect such malicious changes in the …

[PDF][PDF] DF-toolkit: interacting with low-level database storage

J Wagner, A Rasin, K Heart, T Malik… - Proceedings of the VLDB …, 2020 - par.nsf.gov
Applications in several areas, such as privacy, security, and integrity validation, require
direct access to database management system (DBMS) storage. However, relational DBM …

[HTML][HTML] Database memory forensics: Identifying cache patterns for log verification

J Wagner, MI Nissan, A Rasin - Forensic Science International: Digital …, 2023 - Elsevier
Cyberattacks continue to evolve and adapt to state-of-the-art security mechanisms.
Therefore, it is critical for security experts to routinely inspect audit logs to detect complex …

Ethereum MongoDB: integrating blockchain with non-relational databases

S Sarkar, R Dharavath, H Jadav Badavath - Proceedings of International …, 2022 - Springer
Blockchain is a decentralized distributed digital ledger that provides tamper-resistance but is
very slow in search query processing with a considerable amount of transaction cost …

Forensic Investigation in SQL Server Database Using Temporal Tables & Extended Events Artifacts

SKA Zakarneh - International Journal of Applied Sciences and …, 2023 - e-journal.usd.ac.id
Different Database management systems (DBMS) were developed and introduced to store
and manipulate data. Microsoft SQL (MSSQL) Server one of the most popular relational …

Establishing Independent Audit Mechanisms for Database Management Systems

A Rasin, J Wagner, K Heart… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
The pervasive use of databases for the storage of critical and sensitive information in many
organizations has led to an increase in the rate at which databases are exploited in …