Forensic investigation of Microsoft PowerPoint files

  • Authors:
  • Jungheum Park;Sangjin Lee

  • Affiliations:
  • Center for Information Security Technologies (CIST), Korea University, Anam-Dong, Seongbuk-Gu, Seoul, Republic of Korea;Center for Information Security Technologies (CIST), Korea University, Anam-Dong, Seongbuk-Gu, Seoul, Republic of Korea

  • Venue:
  • Digital Investigation: The International Journal of Digital Forensics & Incident Response
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Nowadays, many electronic documents reside in individual systems and on public networks. Electronic documents contain important information such as private data and trade secrets. Because of this, electronic documents can be used as digital evidence in forensic investigations. Until now, forensic examiners have looked at the contents of an electronic document using specific applications, a procedure which fails to provide them with information about how an electronic document was created. Research into the process by which an electronic document is written can help forensic examiners discover the relationships among several electronic documents and the traces of past work in some special cases. This paper demonstrates new methods for investigating Microsoft PowerPoint files that include some useful information about their own writing process.