Digital forensic research: current state of the art

S Raghavan - Csi Transactions on ICT, 2013 - Springer
Digital forensics is the process of employing scientific principles and processes to analyze
electronically stored information and determine the sequence of events which led to a …

The ubiquitous digital file: A review of file management research

JD Dinneen, CA Julien - Journal of the Association for …, 2020 - Wiley Online Library
Computer users spend time every day interacting with digital files and folders, including
downloading, moving, naming, navigating to, searching for, sharing, and deleting them …

Cryptolock (and drop it): stop** ransomware attacks on user data

N Scaife, H Carter, P Traynor… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
Ransomware is a growing threat that encrypts auser's files and holds the decryption key until
a ransom ispaid by the victim. This type of malware is responsible fortens of millions of …

A study of practical deduplication

DT Meyer, WJ Bolosky - ACM Transactions on Storage (ToS), 2012 - dl.acm.org
We collected file system content data from 857 desktop computers at Microsoft over a span
of 4 weeks. We analyzed the data to determine the relative efficacy of data deduplication …

Aerie: Flexible file-system interfaces to storage-class memory

H Volos, S Nalli, S Panneerselvam… - Proceedings of the …, 2014 - dl.acm.org
Storage-class memory technologies such as phase-change memory and memristors present
a radically different interface to storage than existing block devices. As a result, they provide …

Secure data deduplication

MW Storer, K Greenan, DDE Long… - Proceedings of the 4th …, 2008 - dl.acm.org
As the world moves to digital storage for archival purposes, there is an increasing demand
for systems that can provide secure data storage in a cost-effective manner. By identifying …

[PDF][PDF] Characteristics of backup workloads in production systems.

G Wallace, F Douglis, H Qian, P Shilane, S Smaldone… - FAST, 2012 - usenix.org
2009 EMC Template Sample 24 Point Arial Regular Page 1 © Copyright 2012 EMC
Corporation. All rights reserved. CHARACTERISTICS OF BACKUP WORKLOADS IN …

Preventing history forgery with secure provenance

R Hasan, R Sion, M Winslett - ACM Transactions on Storage (TOS), 2009 - dl.acm.org
As increasing amounts of valuable information are produced and persist digitally, the ability
to determine the origin of data becomes important. In science, medicine, commerce, and …

Fuzzing file systems via two-dimensional input space exploration

W Xu, H Moon, S Kashyap, PN Tseng… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
File systems, a basic building block of an OS, are too big and too complex to be bug free.
Nevertheless, file systems rely on regular stress-testing tools and formal checkers to find …

Boosting efficiency and security in proof of ownership for deduplication

R Di Pietro, A Sorniotti - Proceedings of the 7th ACM symposium on …, 2012 - dl.acm.org
Deduplication is a technique used to reduce the amount of storage needed by service
providers. It is based on the intuition that several users may want (for different reasons) to …