M. Balduzzi, J. Zaddach, D. Balzarotti, E. Kirda, and S. Loureiro, A security analysis of amazon's elastic compute cloud service, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, pp.1427-1434, 2012.
DOI : 10.1145/2245276.2232005

H. Berghel, Hiding data, forensics, and anti-forensics, Communications of the ACM, vol.50, issue.4, pp.15-20, 2007.
DOI : 10.1145/1232743.1232761

B. Carrier, File System Forensic Analysis, Pearson Education, Upper Saddle River, 2005.

E. Casey and G. Stellatos, The impact of full disk encryption on digital forensics, ACM SIGOPS Operating Systems Review, vol.42, issue.3, pp.93-98, 2008.
DOI : 10.1145/1368506.1368519

S. Garfinkel, Automating Disk Forensic Processing with SleuthKit, XML and Python, 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, pp.73-84, 2009.
DOI : 10.1109/SADFE.2009.12

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.5362

S. Garfinkel and A. Shelat, Remembrance of data passed: a study of disk sanitization practices, IEEE Security & Privacy Magazine, vol.1, issue.1, pp.17-27, 2003.
DOI : 10.1109/MSECP.2003.1176992

E. Huebner, D. Bem, and C. Wee, Data hiding in the NTFS file system, Digital Investigation, pp.211-226, 2006.
DOI : 10.1016/j.diin.2006.10.005

K. Kent, S. Chevalier, T. Grance, and H. Dang, Guide to Integrating Forensic Techniques into Incident Response, NIST Special Publication 800-86, National Institute of Standards and Technology, 2006.

H. Khan, M. Javed, S. Khayam, and F. Mirza, Designing a clusterbased covert channel to evade disk investigation and forensics, pp.35-49, 2011.
DOI : 10.1016/j.cose.2010.10.005

. Microsoft, Microsoft support policy for 4K sector hard drives in Windows, p.2013

M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, and E. Weippl, Dark clouds on the horizon: Using cloud storage as attack vector and online slack space, Proceedings of the Twentieth USENIX Conference on Security, 2011.

I. Thompson and M. Monroe, FragFS: An advanced data hiding technique, presented at the BlackHat Federal Conference, 2006.