A security analysis of amazon's elastic compute cloud service, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, pp.1427-1434, 2012. ,
DOI : 10.1145/2245276.2232005
Hiding data, forensics, and anti-forensics, Communications of the ACM, vol.50, issue.4, pp.15-20, 2007. ,
DOI : 10.1145/1232743.1232761
File System Forensic Analysis, Pearson Education, Upper Saddle River, 2005. ,
The impact of full disk encryption on digital forensics, ACM SIGOPS Operating Systems Review, vol.42, issue.3, pp.93-98, 2008. ,
DOI : 10.1145/1368506.1368519
Automating Disk Forensic Processing with SleuthKit, XML and Python, 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, pp.73-84, 2009. ,
DOI : 10.1109/SADFE.2009.12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.149.5362
Remembrance of data passed: a study of disk sanitization practices, IEEE Security & Privacy Magazine, vol.1, issue.1, pp.17-27, 2003. ,
DOI : 10.1109/MSECP.2003.1176992
Data hiding in the NTFS file system, Digital Investigation, pp.211-226, 2006. ,
DOI : 10.1016/j.diin.2006.10.005
Guide to Integrating Forensic Techniques into Incident Response, NIST Special Publication 800-86, National Institute of Standards and Technology, 2006. ,
Designing a clusterbased covert channel to evade disk investigation and forensics, pp.35-49, 2011. ,
DOI : 10.1016/j.cose.2010.10.005
Microsoft support policy for 4K sector hard drives in Windows, p.2013 ,
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space, Proceedings of the Twentieth USENIX Conference on Security, 2011. ,
FragFS: An advanced data hiding technique, presented at the BlackHat Federal Conference, 2006. ,