TY - JOUR
T1 - A review of thumbnail images artefacts in the Linux desktop and a methodology to add provenance to deleted files, using the thumbnail images artefact in combination with recent files history, and Trash artefacts
AU - Findlay, Ben
N1 - Publisher Copyright:
© 2022 The Author
PY - 2023/3/1
Y1 - 2023/3/1
N2 - This research presents a methodology which may be applied to investigations involving a number of common Linux desktop distributions, to give provenance to users’ files which have been deleted and otherwise would not have such additional context and metadata available. The proposed methodology relies upon key artefacts pertaining to evidence of user activity, contained within Linux desktop distributions; thumbnail cache, recent files history and Trash artefacts. The research also examines the creation criteria for thumbnails on a number of popular Linux desktop distributions. The key metadata from these artefacts are demonstrated to survive the deletion of the original file in most cases. The methodology has been tested with a focus on common media file formats, given their importance to many digital forensic investigations; however, as shown, it can be applied to other file types under certain circumstances. The methodology outlined, in the right circumstances, allows for key metadata (including filenames, dates and times, and full paths) to be attributed to deleted content. A summary of key file system considerations, and also the underlying desktop operating system artefacts upon which the methodology relies are presented; in order to aid investigators in their understanding and utilisation of the methodology. Strategies to recover additional useful information through carving and keyword searches are also proposed.
AB - This research presents a methodology which may be applied to investigations involving a number of common Linux desktop distributions, to give provenance to users’ files which have been deleted and otherwise would not have such additional context and metadata available. The proposed methodology relies upon key artefacts pertaining to evidence of user activity, contained within Linux desktop distributions; thumbnail cache, recent files history and Trash artefacts. The research also examines the creation criteria for thumbnails on a number of popular Linux desktop distributions. The key metadata from these artefacts are demonstrated to survive the deletion of the original file in most cases. The methodology has been tested with a focus on common media file formats, given their importance to many digital forensic investigations; however, as shown, it can be applied to other file types under certain circumstances. The methodology outlined, in the right circumstances, allows for key metadata (including filenames, dates and times, and full paths) to be attributed to deleted content. A summary of key file system considerations, and also the underlying desktop operating system artefacts upon which the methodology relies are presented; in order to aid investigators in their understanding and utilisation of the methodology. Strategies to recover additional useful information through carving and keyword searches are also proposed.
UR - http://www.scopus.com/inward/record.url?scp=85144085778&partnerID=8YFLogxK
UR - https://www.mendeley.com/catalogue/3815bc56-3234-3edd-b128-37cd67f2a01f/
U2 - 10.1016/j.fsidi.2022.301498
DO - 10.1016/j.fsidi.2022.301498
M3 - Article
SN - 2666-2817
VL - 44
JO - Forensic Science International: Digital Investigation
JF - Forensic Science International: Digital Investigation
M1 - 301498
ER -