%0 Conference Proceedings %T Recovery of Forensic Artifacts from Deleted Jump Lists %+ Defence Institute of Advanced Technology %+ Chitkara University %+ Kurukshetra University %A Singh, Bhupendra %A Singh, Upasna %A Sharma, Pankaj %A Nath, Rajender %Z Part 2: Forensic Techniques %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 14th IFIP International Conference on Digital Forensics (DigitalForensics) %C New Delhi, India %Y Gilbert Peterson %Y Sujeet Shenoi %I Springer International Publishing %3 Advances in Digital Forensics XIV %V AICT-532 %P 51-65 %8 2018-01-03 %D 2018 %R 10.1007/978-3-319-99277-8_4 %K Windows forensics %K Windows 10 %K deleted jump lists %K recovery %Z Computer Science [cs]Conference papers %X Jump lists, which were introduced in the Windows 7 desktop operating system, have attracted the interest of researchers and practitioners in the digital forensics community. The structure and forensic implications of jump lists have been explored widely. However, little attention has focused on anti-forensic activities such as jump list evidence modification and deletion. This chapter proposes a new methodology for identifying deleted entries in the Windows 10 AutoDest type of jump list files and recovering the deleted entries. The proposed methodology is best suited to scenarios where users intentionally delete jump list entries to hide evidence related to their activities. The chapter also examines how jump lists are impacted when software applications are installed and when the associated files are accessed by external storage devices. In particular, artifacts related to file access, such as the lists of most recently used and most frequently used files, file modification, access and creation timestamps, names of applications used to access files, file paths, volume names and serial numbers from where the files were accessed, can be recovered even after entries are removed from the jump lists and the software applications are uninstalled. The results demonstrate that the analysis of jump lists is immensely helpful in constructing the timelines of user activities on Windows 10 systems. %G English %Z TC 11 %Z WG 11.9 %2 https://inria.hal.science/hal-01988839/document %2 https://inria.hal.science/hal-01988839/file/472401_1_En_4_Chapter.pdf %L hal-01988839 %U https://inria.hal.science/hal-01988839 %~ IFIP-LNCS %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-DF %~ IFIP-WG11-9 %~ IFIP-AICT-532