Data Wiping Tool: ByteEditor Technique

This Wiping Tool is an anti-forensic tool that is built to wipe data permanently from laptop’s storage. This tool is capable to ensure the data from being recovered with any recovery tools. The objective of building this wiping tool is to maintain the confidentiality and integrity of the data from unauthorized access. People tend to delete the file in normal way, however, the file face the risk of being recovered. Hence, the integrity and confidentiality of the deleted file cannot be protected. Through wiping tools, the files are overwritten with random strings to make the files no longer readable. Thus, the integrity and the confidentiality of the file can be protected. Regarding wiping tools, nowadays, lots of wiping tools face issue such as data breach because the wiping tools are unable to delete the data permanently from the devices. This situation might affect their main function and a threat to their users. Hence, a new wiping tool is developed to overcome the problem. A new wiping tool named Data Wiping tool is applying two wiping techniques. The first technique is Randomized Data while the next one is enhancing wiping technique, known as ByteEditor. ByteEditor is a combination of two different techniques, byte editing and byte deletion. With the implementation of Object-Oriented methodology, this wiping tool is built. This methodology consists of analyzing, designing, implementation and testing. The tool is analyzed and compared with other wiping tools before the designing of the tool start. Once the designing is done, implementation phase take place. The code of the tool is created using Visual Studio 2010 with C# language and being tested their functionality to ensure the developed tool meet the objectives of the project. This tool is believed able to contribute to the development of wiping tools and able to solve problems related to other wiping tools.

[1]  Tom Coughlin,et al.  Disposal of Disk and Tape Data by Secure Sanitization , 2009, IEEE Security & Privacy.

[2]  Kresimir Hausknecht,et al.  Anti-computer forensics , 2017, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[3]  Miroslav Ölvecký,et al.  Wiping Techniques and Anti-Forensics Methods , 2018, 2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY).

[4]  Nhien-An Le-Khac,et al.  Forensic Analysis of the exFAT artefacts , 2018, ArXiv.

[5]  Pravin Yannawar,et al.  Image Inconsistency Detection Using Local Binary Pattern (LBP) , 2017 .

[6]  E. Colbert,et al.  The object-oriented software development method: a practical approach to object-oriented development , 1989, TRI-Ada '89.

[7]  Poorva Tiwari,et al.  Secure Wipe Out in BYOD Environment , 2020, 2020 International Workshop on Big Data and Information Security (IWBIS).

[8]  Cornelia Gyorodi,et al.  Data wiping system with fully automated, hidden and remote destruction capabilities , 2010 .