Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
456538 | Digital Investigation | 2008 | 9 Pages |
Abstract
The Windows registry serves as a primary storage location for system configurations and as such provides a wealth of information to investigators. Numerous researchers have worked to interpret the information stored in the registry from a digital forensic standpoint, but no definitive resource is yet available which describes how Windows deletes registry data structures under NT-based systems. This paper explores this topic and provides an algorithm for recovering deleted keys, values, and other structures in the context of the registry as a whole.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Timothy D. Morgan,