Acknowledgement
본 논문은 2023년도 교육부의 재원으로 한국연구재단의 지원을 받아 수행된 기초연구사업(NRF2021R1I1A3061020)과 지자체-대학 협력기반 지역혁신 사업(2021RIS-004)의 결과입니다.
References
- K.G.Lee, S.J.Hwang, C.H.Lee and S.J.Lee, "Study on advanced analysis method based on timeline chart for Digital Forensic Investigation," Journal of Advanced Navigation Technology, Vol.18, pp.50-55, 2014. https://doi.org/10.12673/jkoni.2014.18.1.50
- J.W.Bang, B.Y.Yoo and S.J.Lee, "Analysis of changes in file time attributes with file manipulation," Digital Investigation, Vol.7, No.3, pp.135-144, 2011. https://doi.org/10.1016/j.diin.2010.12.001
- G.S.Cho, "A computer forensic method for detecting timestamp forgery in NTFS," Computers & Security, Vol.34, pp.36-46, 2013. https://doi.org/10.1016/j.cose.2012.11.003
- G.S.Cho, "A Digital Forensic Method by an Evaluation Function Based on Timestamp Changing Patterns," Journal of the Korea Society of Digital Industry and Information Management, Vol.10, No.2, pp.91-105, 2014. https://doi.org/10.17662/KSDIM.2014.10.2.091
- D.I.Jang, G.J.Ahn, H.U.Hwang and K.B.Kim, "Understanding Anti-forensic Techniques with Timestamp Manipulation," 2016 IEEE 17th International Conference on Information Reuse and Integration (IRI), pp.609-614, 2016.
- H.J.Yoon, "A study on user behavior tracking using $UsnJrnl," Master's Thesis, Seoul University, 2018.
- J.H.Jeong, "A study on document reading and writing traces through NTFS file system journal file analysis," Master's Thesis, Seoul University, 2022.
- J.Bouma, H.Jonker, V.Meer and E.Aker, "Reconstructing Timelines: From NTFS Timestamps to File Histories," ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security, No.154, pp.1-9, 2023.
- D.Palmbach and F.Breitinger, "Artifacts for Detecting Timestamp Manipulation in NTFS on Windows and Their Reliability," Forensic Science International: Digital Investigation, Vol.32, Supplement. pp.S1-S9, 2020. https://doi.org/10.1016/j.fsidi.2020.300920
- A.Mohamed and C.Khalid, "Detection of Suspicious Timestamps in NTFS using Volume Shadow Copies," International Journal of Computer Network and Information Security, Vol.13, Issue4, pp.62-69, 2021. https://doi.org/10.5815/ijcnis.2021.04.06
- M.Galhuber and R.Luh, "Time for Truth: Forensic Analysis of NTFS Timestamps," ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and Security, No.44, pp.1-10, 2021.
- G.S.Cho, "A Digital Forensic Analysis of Timestamp Change Tools for Windows NTFS," Journal of The Korea Society of Computer and Information, Vol.24, No.9, pp.51-58, 2019. https://doi.org/10.9708/JKSCI.2019.24.09.051
- S.H.Lee, Y.H.Lee and S.J.Lee, "A study on the Evidence Investigation of Forged/Modulated Time-Stamp at iOS(iPhone, iPad)," KIPS Transactions on Computer and Communication Systems, Vol.5, No.7, pp.173-180, 2016. https://doi.org/10.3745/KTCCS.2016.5.7.173
- J.H.Han and S.J.Lee, "A Study on the Processing of Timestamps in the Creation of Multimedia Files on Mobile Devices," Journal of Information Processing Systems, Vol.18, No.3, pp.402-410, 2022. https://doi.org/10.3745/JIPS.04.0245
- A.Mohamed and C.Khalid, "Detection of Timestamps Tampering in NTFS using Machine Learning," Procedia Computer Science, Vol.160, pp.778-784, 2019. https://doi.org/10.1016/j.procs.2019.11.011
- S.Neuner, A.G.Voyiatzis, M.Schmiedecker, S.Brunthaler, S.Katzenbeisser and E.R.Weippl, "Time is on my side: Steganography in filesystem metadata," Digital Investigation, Vol.18, Supplement7, pp.76-86, 2016. https://doi.org/10.1016/j.diin.2016.04.010
- G.S.Cho, "Data Hiding in NTFS Timestamps for Anti-Forensics," International Journal of Internet, Broadcasting and Communication, Vol.8, No.3, pp.31-40, 2016. https://doi.org/10.7236/IJIBC.2016.8.3.31