<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462024000200421</article-id>
<article-id pub-id-type="doi">10.13053/cys-28-2-4804</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[PAREX: A Novel exFAT Parser for File System Forensics]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Gogia]]></surname>
<given-names><![CDATA[Gaurav]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Rughani]]></surname>
<given-names><![CDATA[Parag]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,National Forensic Sciences University  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>India</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2024</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2024</year>
</pub-date>
<volume>28</volume>
<numero>2</numero>
<fpage>421</fpage>
<lpage>433</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462024000200421&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462024000200421&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462024000200421&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: File systems, being one of the core components of any computational device, contain the most important information which makes them pivotal to any digital forensics investigation. However, file system parsing is a complex process. Existing file system forensic software are capable of processing large datasets but often at the cost of either performance or resource utilisation. Slow evidence processing has a direct impact on investigation time, while higher resource requirements have a monetary impact. Digital Forensics labs are often on a constrained budget in terms of both time and money. So, they often need to define priorities on a case-by-case basis. Another major concern for forensic investigators is correctness. Tools that suffer from memory management issues may generate inconsistent reports or worse yet, increase overall attack surface for malware that may pollute investigator&#8217;s workstation. This research proposes a novel open-source exFAT file system parsing library. It has been validated against the current open-source state-of-the-art: The Sleuth Kit (TSK), on a dataset of disk images ranging from 1MiB to 1TiB. Experimental results indicate that the proposed tool is 40 times faster and 17 times more memory efficient than TSK.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[ExFat]]></kwd>
<kwd lng="en"><![CDATA[parsers]]></kwd>
<kwd lng="en"><![CDATA[file system forensics]]></kwd>
<kwd lng="en"><![CDATA[digital forensics]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Allen-Barton]]></surname>
<given-names><![CDATA[T. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Bin-Azhar]]></surname>
<given-names><![CDATA[M. A. H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Open source forensics for a multi-platform drone system]]></source>
<year>2018</year>
<conf-name><![CDATA[ Computing, Digital Forensics and Cybersecurity]]></conf-name>
<conf-loc> </conf-loc>
<page-range>83-96</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="">
<collab>alvinashcraft</collab>
<source><![CDATA[Exfat file system specification - win32 apps]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="">
<collab>aoiflux</collab>
<source><![CDATA[Libxfat]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="">
<collab>aoiflux</collab>
<source><![CDATA[Parex]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="">
<collab>Autopsy</collab>
<source><![CDATA[Digital forensics]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barnes]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Pro Windows subsystem for Linux (WSL)]]></source>
<year>2021</year>
<publisher-name><![CDATA[Apress]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bhat]]></surname>
<given-names><![CDATA[W. A.]]></given-names>
</name>
<name>
<surname><![CDATA[AlZahrani]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Wani]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Can computer forensic tools be trusted in digital investigations?]]></article-title>
<source><![CDATA[Science &amp; Justice]]></source>
<year>2021</year>
<volume>61</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>198-203</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Guan]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Yao]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[A novel data recovery algorithm for FAT32 file system]]></source>
<year>2021</year>
<conf-name><![CDATA[ 2nd International Conference on Information Science and Education (ICISE-IE)]]></conf-name>
<conf-date>2021</conf-date>
<conf-loc> </conf-loc>
<page-range>605-8</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Community]]></surname>
<given-names><![CDATA[A. L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Anarchy Installer]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="">
<collab>dsoprea</collab>
<source><![CDATA[go-exfat]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fua]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Lis]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Comparing python, go, and C++ on the n-queens problem]]></source>
<year>2020</year>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gao]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Shi]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<source><![CDATA[A comprehensive detection of memory corruption vulnerabilities for C/C++ programs]]></source>
<year>2018</year>
<conf-name><![CDATA[ International Conference on Parallel &amp; Distributed Processing with Applications, Ubiquitous Computing &amp; Communications, Big Data &amp; Cloud Computing, Social Computing &amp; Networking, Sustainable Computing &amp; Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom)]]></conf-name>
<conf-date>2018</conf-date>
<conf-loc> </conf-loc>
<page-range>354-60</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="">
<collab>GNU</collab>
<source><![CDATA[GNU time - GNU project - free software foundation]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="">
<collab>Google</collab>
<source><![CDATA[The go programming language]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Heeger]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Yannikos]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Steinebach]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An introduction to the exFAT file system and how to hide data within]]></article-title>
<source><![CDATA[Journal of Cyber Security and Mobility]]></source>
<year>2022</year>
<volume>11</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>239-64</page-range></nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kerrisk]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[hexdump(1) - Linux manual page]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lawrence]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Karabiyik]]></surname>
<given-names><![CDATA[U.]]></given-names>
</name>
<name>
<surname><![CDATA[Shashidhar]]></surname>
<given-names><![CDATA[N.]]></given-names>
</name>
</person-group>
<source><![CDATA[Equipping a digital forensic lab on a budget]]></source>
<year>2018</year>
<conf-name><![CDATA[ 6th International Symposium on Digital Forensic and Security (ISDFS)]]></conf-name>
<conf-date>2018</conf-date>
<conf-loc> </conf-loc>
<page-range>1-7</page-range></nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="">
<collab>lclevy</collab>
<source><![CDATA[An experimental tool for forensic analysis of ExFAT filesystem]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lee]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Jo]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Eo]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Shon]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[ExtSFR: Scalable file recovery framework based on an Ext file system]]></article-title>
<source><![CDATA[Multimedia Tools and Applications]]></source>
<year>2020</year>
<volume>79</volume>
<numero>23</numero>
<issue>23</issue>
<page-range>16093-111</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lin]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Building a forensics workstation]]></article-title>
<source><![CDATA[Introductory Computer Forensics: A Hands-on Practical Approach]]></source>
<year>2018</year>
<page-range>53-89</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Linux]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Penetration testing and ethical hacking Linux distribution]]></source>
<year>2024</year>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Lion]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Chiu]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Stumm]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Yuan]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Investigating managed language runtime performance: why javascript and python are 8x and 29x slower than c++, yet java and go can be faster?]]></source>
<year>2022</year>
<conf-name><![CDATA[ Usenix ATC&#8217;22]]></conf-name>
<conf-loc> </conf-loc>
<page-range>835-52</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mason]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Seng]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Electronic evidence]]></source>
<year>2017</year>
<publisher-name><![CDATA[University of London Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="">
<collab>Microsoft</collab>
<source><![CDATA[Download Windows 10]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="">
<collab>Microsoft</collab>
<source><![CDATA[Download Windows 11]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Miller]]></surname>
<given-names><![CDATA[C. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A survey of prosecutors and investigators using digital evidence: A starting point]]></article-title>
<source><![CDATA[Forensic Science International: Synergy]]></source>
<year>2022</year>
<volume>6</volume>
<page-range>100296</page-range></nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mohammad]]></surname>
<given-names><![CDATA[R. M.]]></given-names>
</name>
</person-group>
<source><![CDATA[A neural network based digital forensics classification]]></source>
<year>2018</year>
<conf-name><![CDATA[ 15th International Conference on Computer Systems and Applications (AICCSA)]]></conf-name>
<conf-date>2018</conf-date>
<conf-loc> </conf-loc>
<page-range>1-7</page-range></nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mohammad]]></surname>
<given-names><![CDATA[R. M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Alqahtani]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A comparison of machine learning techniques for file system forensics analysis]]></article-title>
<source><![CDATA[Journal of Information Security and Applications]]></source>
<year>2019</year>
<volume>46</volume>
<page-range>53-61</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Montasari]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Hill]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Next-generation digital forensics: Challenges and future paradigms]]></source>
<year>2019</year>
<conf-name><![CDATA[ 12th International Conference on Global Security, Safety and Sustainability (ICGS3)]]></conf-name>
<conf-date>2019</conf-date>
<conf-loc> </conf-loc>
<page-range>205-12</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="">
<collab>msuhanov</collab>
<source><![CDATA[An NTFS/FAT parser for digital forensics &amp; incident response]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="">
<collab>NIST</collab>
<source><![CDATA[CFReDS Portal]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B32">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nordvik]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Georges]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Toolan]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Axelsson]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Reverse engineering of ReFS]]></article-title>
<source><![CDATA[Digital Investigation]]></source>
<year>2019</year>
<volume>30</volume>
<page-range>127-47</page-range></nlm-citation>
</ref>
<ref id="B33">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Opolskii]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Stupina]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Consumer-grade storage comparative analysis in the context of digitalization of the agro-industrial complex]]></source>
<year>2021</year>
<volume>937</volume>
<numero>3</numero>
<conf-name><![CDATA[ IOP Conference Series: Earth and Environmental Science]]></conf-name>
<conf-loc> </conf-loc>
<issue>3</issue>
<page-range>032079</page-range></nlm-citation>
</ref>
<ref id="B34">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pascal]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Hurt]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<name>
<surname><![CDATA[Mattson]]></surname>
<given-names><![CDATA[T. G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Towards a graphblas implementation for go]]></source>
<year>2022</year>
<conf-name><![CDATA[ International Parallel and Distributed Processing Symposium Workshops (IPDPSW)]]></conf-name>
<conf-date>2022</conf-date>
<conf-loc> </conf-loc>
<page-range>01-4</page-range></nlm-citation>
</ref>
<ref id="B35">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pascal]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Herzeel]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Verachtert]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Comparing ease of programming in C++, go, and java for implementing a next-generation sequencing tool]]></article-title>
<source><![CDATA[Evolutionary Bioinformatics]]></source>
<year>2019</year>
<volume>15</volume>
</nlm-citation>
</ref>
<ref id="B36">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Plum]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Dewald]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Forensic APFS file recovery]]></source>
<year>2018</year>
<conf-name><![CDATA[ 13th International Conference on Availability, Reliability and Security]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-10</page-range></nlm-citation>
</ref>
<ref id="B37">
<nlm-citation citation-type="">
<collab>Python</collab>
<source><![CDATA[Welcome to Python.org]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B38">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodola]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Psutil: Cross-platform lib for process and system monitoring in Python]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B39">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schmitt]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Medical device forensics]]></article-title>
<source><![CDATA[IEEE Security &amp; Privacy]]></source>
<year>2022</year>
<volume>20</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>96-100</page-range></nlm-citation>
</ref>
<ref id="B40">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Senturk]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Apayd&#305;n]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Yasar]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[Image and file system support framework for a digital mobile forensics software]]></source>
<year>2020</year>
<conf-name><![CDATA[ Turkish National Software Engineering Symposium (UYMS)]]></conf-name>
<conf-date>2020</conf-date>
<conf-loc> </conf-loc>
<page-range>1-3</page-range></nlm-citation>
</ref>
<ref id="B41">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[sleuth kit]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[The sleuth kit (Tsk) &amp; autopsy: Open source digital forensics tools]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B42">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stoykova]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Nordvik]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmed]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Franke]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Axelsson]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Toolan]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Legal and technical questions of file system reverse engineering]]></article-title>
<source><![CDATA[Computer Law &amp; Security Review]]></source>
<year>2022</year>
<volume>46</volume>
<page-range>105725</page-range></nlm-citation>
</ref>
<ref id="B43">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Vandermeer]]></surname>
<given-names><![CDATA[Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Le-Khac]]></surname>
<given-names><![CDATA[N. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Carthy]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Kechadi]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[Forensic analysis of the exFAT artefacts]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B44">
<nlm-citation citation-type="">
<collab>VMWare</collab>
<source><![CDATA[Download VMware Workstation Pro]]></source>
<year>2023</year>
</nlm-citation>
</ref>
<ref id="B45">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wolf]]></surname>
<given-names><![CDATA[F. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Arquint]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Clochard]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Oortwijn]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
<name>
<surname><![CDATA[Pereira]]></surname>
<given-names><![CDATA[J. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Müller]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<source><![CDATA[Gobra: Modular specification and verification of go programs]]></source>
<year>2021</year>
<conf-name><![CDATA[ Computer Aided Verification]]></conf-name>
<conf-loc> </conf-loc>
<page-range>367-79</page-range></nlm-citation>
</ref>
<ref id="B46">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xu]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Liu]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Meng]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Chang]]></surname>
<given-names><![CDATA[X.]]></given-names>
</name>
<name>
<surname><![CDATA[Yang]]></surname>
<given-names><![CDATA[W.]]></given-names>
</name>
</person-group>
<source><![CDATA[A scheme of traceless file deletion for windows FAT32 file system]]></source>
<year>2022</year>
<conf-name><![CDATA[ International Conference on Intelligent Computing and its Emerging Applications]]></conf-name>
<conf-date>2021</conf-date>
<conf-loc> </conf-loc>
<page-range>89-93</page-range></nlm-citation>
</ref>
<ref id="B47">
<nlm-citation citation-type="">
<collab>ZDNET</collab>
<source><![CDATA[Chrome: 70% of all security bugs are memory safety issues]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B48">
<nlm-citation citation-type="">
<collab>ZDNET</collab>
<source><![CDATA[Microsoft: 70 percent of all security bugs are memory safety issues]]></source>
<year>2022</year>
</nlm-citation>
</ref>
<ref id="B49">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Zhang]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Wang]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Li]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[T. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Hassan]]></surname>
<given-names><![CDATA[A. E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A study of C/C++ code weaknesses on stack overflow]]></article-title>
<source><![CDATA[IEEE Transactions on Software Engineering]]></source>
<year>2022</year>
<volume>48</volume>
<numero>7</numero>
<issue>7</issue>
<page-range>2359-75</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
