Title

Hiding In A Virtual World: Using Unconventionally Installed Operating Systems

Keywords

Digital forensics; Unconventionally installed operating systems; VMWare

Abstract

Necessity is the mother of invention, and necessity has produced many software and hardware tools in the realm of computer networking and security to overcome problems encountered in the private and public sector. Unconventionally installed operating systems including virtual machines, operating systems installed on removable media and external storage drives are some recent inventions. These tools have been very useful to network administrators, but they can also be used in ways not intended by their creators in an attempt to mask the activities of a user. This paper will attempt to evaluate the possibility of using these unconventionally installed operating systems in an attempt to hide one's activities from conventional digital forensic tools. This evaluation will be conducted by repeating a series of tests inside a virtual environment, then overwriting the virtual environment flat file and having the host computer imaged and examined by forensic tools. ©2009 IEEE.

Publication Date

10-22-2009

Publication Title

2009 IEEE International Conference on Intelligence and Security Informatics, ISI 2009

Number of Pages

276-284

Document Type

Article; Proceedings Paper

Personal Identifier

scopus

DOI Link

https://doi.org/10.1109/ISI.2009.5137326

Socpus ID

70350043605 (Scopus)

Source API URL

https://api.elsevier.com/content/abstract/scopus_id/70350043605

This document is currently not available here.

Share

COinS