A Study of Trace for Data Wiping Tools

@article{Kim2010ASO,
  title={A Study of Trace for Data Wiping Tools},
  author={Yeon-Soo Kim and Jewan Bang and Jin-Kook Kim and Sang Jin Lee},
  journal={The Kips Transactions:partc},
  year={2010},
  volume={17},
  pages={159-164}
}
The data wiping is a technique which perfectly deletes data in a storage to prevent data recovery. Currently, management of stored data is important because of increasing an accident of personal information leakage. Especially, if you need to discard data contained personal information, using a wiping tool which permanently deletes data to prevent unnecessary personal information leakage. The data wiping is also used for data security and privacy protection. However the data wiping can be used… 
1 Citations

References

SHOWING 1-10 OF 13 REFERENCES
File System Forensic Analysis
TLDR
Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.
Battling Anti-Forensics: Beating the U3 Stick
ABSTRACT With the growing knowledge of digital forensics there is also a growing knowledge in the field of anti-forensics. More software and products see the light each day, which can make digital
Advances in Digital Forensics IV
TLDR
Advances in Digital Forensics IV describes original research results and innovative applications in the emerging discipline of digital forensics and highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations.
Evaluating Commercial Counter-Forensic Tools
TLDR
Six counter-forensic tools are reviewed and each creates a distinct operational fingerprint that an analyst may use to identify the application used and, thus, guide the search for residual data.
Secure Deletion and the Effectiveness of Evidence Elimination Software
  • Simon Innes
  • Computer Science
    Australian Computer, Network & Information Forensics Conference
  • 2005
TLDR
This paper will discuss and analyse the different methods of wiping media to make them forensically clean and the effectiveness of software that is designed to eliminate evidence from a computer.
Mastering Windows Network Forensics and Investigation
An authoritative guide to investigating high-technology crimesInternet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more
Windows Forensic Analysis: DVD Toolkit
The only book available on the market that addresses and discusses in-depth forensic analysis of Windows systems. Windows Forensic Analysis DVD Toolkit takes the reader to a whole new, undiscovered
The Windows Registry as a forensic resource
Evaluation of Registry Data Removal by Shredder Programs
TLDR
This paper examines shredder claims by conducting forensic examinations of computers on which shredder programs were used and found that most shredder Programs claim to remove all traces of data.
Secure deletion of data from magnetic and solid-state memory
TLDR
This paper covers some of the methods available to recover erased data and presents schemes to make this recovery significantly more difficult.
...
...