skip to main content
10.1145/1529282.1529476acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

On the persistence of deleted windows registry data structures

Published: 08 March 2009 Publication History

Abstract

Deleted entries in the Windows Registry remain in the hives that contain them but their space is marked as free for future use. In this paper we analyse the fragmentation of these deallocated blocks and how long they persist by surveying a number of hives over a long period of time. We formalise retrieval of data and define 'consistency' with respect to deleted keys. We illustrate how uninstallation programs may inadvertently corrupt the keys they are deleting in the uninstallation process by analysing the keys during the uninstallation of a popular media software suite.

References

[1]
Jerry Honeycutt. Microsoft Windows XP Registry Guide. Microsoft Press, 2002.
[2]
H. Carvey. The Windows Registry as a forensic resource. Digital Investigation, 2(3): 201--205, 2005.
[3]
Mark Russinovich. Inside the registry. http://technet.microsoft.com/en-gb/library/cc750583.aspx.
[4]
B. D. Registry file format. http://home.eunet.no/pnordahl/ntpasswd/WinReg.txt.visited: 09/May/2008.

Cited By

View all
  • (2012)A Novel Methodology for Malware Intrusion Attack Path ReconstructionDigital Forensics and Cyber Crime10.1007/978-3-642-35515-8_11(131-140)Online publication date: 2012

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '09: Proceedings of the 2009 ACM symposium on Applied Computing
March 2009
2347 pages
ISBN:9781605581668
DOI:10.1145/1529282
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 March 2009

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Conference

SAC09
Sponsor:
SAC09: The 2009 ACM Symposium on Applied Computing
March 8, 2009 - March 12, 2008
Hawaii, Honolulu

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2012)A Novel Methodology for Malware Intrusion Attack Path ReconstructionDigital Forensics and Cyber Crime10.1007/978-3-642-35515-8_11(131-140)Online publication date: 2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media