An investigation into the forensic implications of the Windows 10 operating system: recoverable artefacts and significant changes from Windows 8.1

Diana Hintea, Robert Bird, Michael Green

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

With the release of Microsoft's latest operating system, Windows 10, forensic investigators must examine it in order to determine the changes implemented from Windows 8.1 and the addition of new artefacts. This study is an analysis of Windows 10 and its new features in order to distinguish these artefacts. The tools used include: VMware Fusion, FTK Imager, Process Monitor, Process Explorer, ESEDatabase View and Registry Explorer. The paper also determines if artefacts have changed in Windows 10 in comparison to the previous version of Windows, Windows 8.1. When comparing the two it was found that many of the pre-existing artefacts found within Windows 8.1 are still present in Windows 10. Slight differences are noted in the way prefetch files are compressed and also the thumbnail databases. Significant artefacts related to the new features in Windows 10 are also reported.
Original languageEnglish
Pages (from-to)326-345
Number of pages20
Journal International Journal of Electronic Security and Digital Forensics
Volume9
Issue number4
Early online date25 Sep 2017
DOIs
Publication statusPublished - Nov 2017

Fingerprint

Windows operating system
Image sensors
artifact
Fusion reactions

Cite this

@article{34ddd1ea402f4578894ecfc771c3ebc0,
title = "An investigation into the forensic implications of the Windows 10 operating system: recoverable artefacts and significant changes from Windows 8.1",
abstract = "With the release of Microsoft's latest operating system, Windows 10, forensic investigators must examine it in order to determine the changes implemented from Windows 8.1 and the addition of new artefacts. This study is an analysis of Windows 10 and its new features in order to distinguish these artefacts. The tools used include: VMware Fusion, FTK Imager, Process Monitor, Process Explorer, ESEDatabase View and Registry Explorer. The paper also determines if artefacts have changed in Windows 10 in comparison to the previous version of Windows, Windows 8.1. When comparing the two it was found that many of the pre-existing artefacts found within Windows 8.1 are still present in Windows 10. Slight differences are noted in the way prefetch files are compressed and also the thumbnail databases. Significant artefacts related to the new features in Windows 10 are also reported.",
author = "Diana Hintea and Robert Bird and Michael Green",
year = "2017",
month = "11",
doi = "10.1504/IJESDF.2017.10008013",
language = "English",
volume = "9",
pages = "326--345",
journal = "International Journal of Electronic Security and Digital Forensics",
issn = "1751-911X",
publisher = "Inderscience",
number = "4",

}

TY - JOUR

T1 - An investigation into the forensic implications of the Windows 10 operating system: recoverable artefacts and significant changes from Windows 8.1

AU - Hintea, Diana

AU - Bird, Robert

AU - Green, Michael

PY - 2017/11

Y1 - 2017/11

N2 - With the release of Microsoft's latest operating system, Windows 10, forensic investigators must examine it in order to determine the changes implemented from Windows 8.1 and the addition of new artefacts. This study is an analysis of Windows 10 and its new features in order to distinguish these artefacts. The tools used include: VMware Fusion, FTK Imager, Process Monitor, Process Explorer, ESEDatabase View and Registry Explorer. The paper also determines if artefacts have changed in Windows 10 in comparison to the previous version of Windows, Windows 8.1. When comparing the two it was found that many of the pre-existing artefacts found within Windows 8.1 are still present in Windows 10. Slight differences are noted in the way prefetch files are compressed and also the thumbnail databases. Significant artefacts related to the new features in Windows 10 are also reported.

AB - With the release of Microsoft's latest operating system, Windows 10, forensic investigators must examine it in order to determine the changes implemented from Windows 8.1 and the addition of new artefacts. This study is an analysis of Windows 10 and its new features in order to distinguish these artefacts. The tools used include: VMware Fusion, FTK Imager, Process Monitor, Process Explorer, ESEDatabase View and Registry Explorer. The paper also determines if artefacts have changed in Windows 10 in comparison to the previous version of Windows, Windows 8.1. When comparing the two it was found that many of the pre-existing artefacts found within Windows 8.1 are still present in Windows 10. Slight differences are noted in the way prefetch files are compressed and also the thumbnail databases. Significant artefacts related to the new features in Windows 10 are also reported.

U2 - 10.1504/IJESDF.2017.10008013

DO - 10.1504/IJESDF.2017.10008013

M3 - Article

VL - 9

SP - 326

EP - 345

JO - International Journal of Electronic Security and Digital Forensics

JF - International Journal of Electronic Security and Digital Forensics

SN - 1751-911X

IS - 4

ER -