{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:27:32Z","timestamp":1725751652090},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642411472"},{"type":"electronic","value":"9783642411489"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41148-9_13","type":"book-chapter","created":{"date-parts":[[2013,10,9]],"date-time":"2013-10-09T14:47:31Z","timestamp":1381330051000},"page":"183-193","source":"Crossref","is-referenced-by-count":3,"title":["Quantifying Windows File Slack Size and Stability"],"prefix":"10.1007","author":[{"given":"Martin","family":"Mulazzani","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"Neuner","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Kieseberg","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Huber","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"Schrittwieser","sequence":"additional","affiliation":[]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"crossref","first-page":"1427","DOI":"10.1145\/2245276.2232005","volume-title":"Proceedings of the Twenty-Seventh Annual ACM Symposium on Applied Computing","author":"M. Balduzzi","year":"2012","unstructured":"M. Balduzzi, J. Zaddach, D. Balzarotti, E. Kirda and S. Loureiro, A security analysis of Amazon\u2019s Elastic Compute Cloud Service, Proceedings of the Twenty-Seventh Annual ACM Symposium on Applied Computing, pp. 1427\u20131434, 2012."},{"issue":"4","key":"13_CR2","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1232743.1232761","volume":"50","author":"H. Berghel","year":"2007","unstructured":"H. Berghel, Hiding data, forensics and anti-forensics, Communications of the ACM, vol. 50(4), pp. 15\u201320, 2007.","journal-title":"Communications of the ACM"},{"key":"13_CR3","volume-title":"File System Forensic Analysis","author":"B. Carrier","year":"2005","unstructured":"B. Carrier, File System Forensic Analysis, Pearson Education, Upper Saddle River, New Jersey, 2005."},{"issue":"3","key":"13_CR4","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/1368506.1368519","volume":"42","author":"E. Casey","year":"2008","unstructured":"E. Casey and G. Stellatos, The impact of full disk encryption on digital forensics, ACM SIGOPS Operating Systems Review, vol. 42(3), pp. 93\u201398, 2008.","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"13_CR5","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/SADFE.2009.12","volume-title":"Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering","author":"S. Garfinkel","year":"2009","unstructured":"S. Garfinkel, Automating disk forensic processing with Sleuthkit, XML and Python, Proceedings of the Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 73\u201384, 2009."},{"issue":"1","key":"13_CR6","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MSECP.2003.1176992","volume":"1","author":"S. Garfinkel","year":"2003","unstructured":"S. Garfinkel and A. Shelat, Remembrance of data passed: A study of disk sanitization practices, IEEE Security and Privacy, vol. 1(1), pp. 17\u201327, 2003.","journal-title":"IEEE Security and Privacy"},{"issue":"4","key":"13_CR7","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.diin.2006.10.005","volume":"3","author":"E. Huebner","year":"2006","unstructured":"E. Huebner, D. Bem and C. Wee, Data hiding in the NTFS file system, Digital Investigation, vol. 3(4), pp. 211\u2013226, 2006.","journal-title":"Digital Investigation"},{"volume-title":"Information Hiding Techniques for Steganography and Digital Watermarking","year":"2000","key":"13_CR8","unstructured":"S. Katzenbeisser and F. Petitolas (Eds.), Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, Norwood, Massachusetts, 2000."},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"K. Kent, S. Chevalier, T. Grance and H. Dang, Guide to Integrating Forensic Techniques into Incident Response, NIST Special Publication 800-86, National Institute of Standards and Technology, Gaithersburg, Maryland, 2006.","DOI":"10.6028\/NIST.SP.800-86"},{"issue":"1","key":"13_CR10","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.cose.2010.10.005","volume":"30","author":"H. Khan","year":"2011","unstructured":"H. Khan, M. Javed, S. Khayam and F. Mirza, Designing a cluster-based covert channel to evade disk investigation and forensics, Computers and Security, vol. 30(1), pp. 35\u201349, 2011.","journal-title":"Computers and Security"},{"key":"13_CR11","unstructured":"Microsoft, Default cluster size for NTFS, FAT and exFAT, Redmond, Washington ( support.microsoft.com\/kb\/140365 ), 2002."},{"key":"13_CR12","unstructured":"Microsoft, Microsoft support policy for 4K sector hard drives in Windows, Redmond, Washington ( support.microsoft.com\/kb\/2510009 ), 2013."},{"key":"13_CR13","volume-title":"Proceedings of the Twentieth USENIX Conference on Security","author":"M. Mulazzani","year":"2011","unstructured":"M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber and E. Weippl, Dark clouds on the horizon: Using cloud storage as attack vector and online slack space, Proceedings of the Twentieth USENIX Conference on Security, 2011."},{"key":"13_CR14","unstructured":"I. Thompson and M. Monroe, FragFS: An advanced data hiding technique, presented at the BlackHat Federal Conference, 2006."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41148-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,8]],"date-time":"2022-03-08T12:16:50Z","timestamp":1646741810000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41148-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642411472","9783642411489"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41148-9_13","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}