TY - JOUR
T1 - A Forensic Exploration of the Microsoft Windows 10 Timeline
AU - Horsman, Graeme
AU - Caithness, Alex
AU - Katsavounidis, Costas
PY - 2018/7/28
Y1 - 2018/7/28
N2 - The Microsoft Windows operating system continues to dominate the desktop computing market. With such high levels of usage comes an inferred likelihood of digital forensic practitioners encountering this platform during their investigations. As part of any forensic examination of a digital device, operating system artifacts, which support the identification and understanding of how a user has behaved on their system provide a potential source of evidence. Now, following Microsoft's April 2018 build 1803 release with its incorporated "Timeline" feature, the potential for identifying and tracking user activity has increased. This work provides a timely examination of the Windows 10 Timeline feature demonstrating the ability to recover activity-based content from within its stored database log files. Examination results and underpinning experimental methodologies are offered, demonstrating the ability to recover activity tile and process information in conjunction with the Windows Timeline. Further, an SQL query has been provided to support the interpretation of data stored within the ActivitiesCache.db.
AB - The Microsoft Windows operating system continues to dominate the desktop computing market. With such high levels of usage comes an inferred likelihood of digital forensic practitioners encountering this platform during their investigations. As part of any forensic examination of a digital device, operating system artifacts, which support the identification and understanding of how a user has behaved on their system provide a potential source of evidence. Now, following Microsoft's April 2018 build 1803 release with its incorporated "Timeline" feature, the potential for identifying and tracking user activity has increased. This work provides a timely examination of the Windows 10 Timeline feature demonstrating the ability to recover activity-based content from within its stored database log files. Examination results and underpinning experimental methodologies are offered, demonstrating the ability to recover activity tile and process information in conjunction with the Windows Timeline. Further, an SQL query has been provided to support the interpretation of data stored within the ActivitiesCache.db.
UR - http://www.scopus.com/inward/record.url?scp=85051065571&partnerID=8YFLogxK
U2 - 10.1111/1556-4029.13875
DO - 10.1111/1556-4029.13875
M3 - Article
AN - SCOPUS:85051065571
SN - 0022-1198
JO - Journal of Forensic Sciences
JF - Journal of Forensic Sciences
ER -