Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kam Woods is active.

Publication


Featured researches published by Kam Woods.


acm ieee joint conference on digital libraries | 2011

Extending digital repository architectures to support disk image preservation and access

Kam Woods; Christopher A. Lee; Simson L. Garfinkel

Disk images (bitstreams extracted from physical media) can play an essential role in the acquisition and management of digital collections by serving as containers that support data integrity and chain of custody, while ensuring continued access to the underlying bits without depending on physical carriers. Widely used today by practitioners of digital forensics, disk images can serve as baselines for comparison for digital preservation activities, as they provide fail-safe mechanisms when curatorial actions make unexpected changes to data; enable access to potentially valuable data that resides below the file system level; and provide options for future analysis. We discuss established digital forensics techniques for acquiring, preserving and annotating disk images, provide examples from both research and educational collections, and describe specific forensic tools and techniques, including an object-oriented data packaging framework called the Advanced Forensic Format (AFF) and the Digital Forensics XML (DFXML) metadata representation.


Archive | 2016

Digital Preservation Metadata Practice for Disk Image Access

Alexandra Chassanoff; Kam Woods; Christopher A. Lee

Many libraries, archives, and museums are now regularly acquiring, processing, and analyzing born-digital materials. Materials exist on a variety of source media, including flash drives, hard drives, floppy disks, and optical media. Extracting disk images (i.e., sector-by-sector copies of digital media) is an increasingly common practice. It can be essential to ensuring provenance, original order, and chain of custody. Disk images allow users to explore and interact with the original data without risk of permanent alteration. These replicas help institutions to safeguard against modifications to underlying data that can occur when a file system contained on a storage medium is mounted, or a bootable medium is powered up. Retention of disk images can substantially reduce preservation risks. Digital storage media become progressively difficult (or impossible) to read over time, due to “bit rot,” obsolescence of media, and reduced availability of devices to read them. Simply copying the allocated files off a disk and discarding the storage carrier, however, can be problematic. The ability to access and render the content of files can depend upon the presence of other data that resided on the disk. These dependencies are often not obvious upon first inspection and may only be discovered after the original medium is no longer readable or available. Disk images also enable a wide range of potential access approaches, including dynamic browsing of disk images (Misra S, Lee CA, Woods K (2014) A Web Service for File-Level Access to Disk Images. Code4Lib Journal, 25 [3]) and emulation of earlier computing platforms. Disk images often contain residual data, which may consist of previously hidden or deleted files (Redwine G, et al. in Born digital: guidance for donors, dealers, and archival repositories. Council on Library and Information Resources, Washington, 2013 [4]). Residual data can be valuable for scholars interested in learning about the context of creation. Traces of activities undertaken in the original environment—for example, identifying removable media connected to a host machine or finding contents of browser caches—can provide additional sources of information for researchers and facilitate the preservation of materials (Woods K, et al. in Proceedings of the 11th annual international ACM/IEEE joint conference on digital libraries, pp. 57–66, 2011 [5]). Digital forensic tools can be used to create disk images in a wide range of formats. These include raw files (such as those produced by the Unix tool dd). Quantifying successes and failures for many tools can require judgment calls by qualified digital curation professionals. Verifying a checksum for a file is a simple case; the checksums either match or are different. In the events described in the previous sections, however, the conditions for success are fuzzier. For example, fiwalk will often “successfully” complete whether or not it is able to extract a meaningful record of the contents of file system(s) on a disk image. Likewise, bulk_extractor will simply report items of interest it has discovered. Knowing whether this output is useful (and whether it has changed between separate executions of a given tool) depends on comparison of the output between the two runs, information not currently recorded in the PREMIS document. In the BitCurator implementation, events are often recorded as having completed, rather than as having succeeded, to avoid ambiguity. Future iterations of the implementation may include more nuanced descriptions of event outcomes.


Proceedings of the Conference on Digital Forensics, Security and Law | 2011

CREATING REALISTIC CORPORA FOR SECURITY AND FORENSIC EDUCATION

Kam Woods; Christopher A. Lee; Simson L. Garfinkel; David Dittrich; Adam Russell; Kris Kearton


Archive | 2011

Creating Realistic Corpora for Forensic and Security Education

Christopher A. Lee; Adam Russel; Kris Kearton; David Dittrich; Kam Woods; Simson Garfinkel


D-lib Magazine | 2012

BitCurator: Tools and Techniques for Digital Forensics in Collecting Institutions

Christopher A. Lee; Alexandra Chassanoff; Kam Woods; Matthew G. Kirschenbaum; Porter Olsen


Archiving 2012 - Preservation Strategies and Imaging Technologies for Cultural Heritage Institutions and Memory Organizations | 2012

Acquisition and processing of disk images to further archival goals

Kam Woods; Christopher A. Lee


iPRES | 2015

Functional Access to Forensic Disk Images in a Web Service.

Kam Woods; Christopher A. Lee; Thomas Liebetraut; Klaus Rechert


10th IS and T Archiving Conference, Archiving 2013 | 2013

Automated Analysis and Visualization of Disk Images and File Systems for Preservation

Kam Woods; Christopher A. Lee; Sunitha Misra


iPRES | 2016

A Demonstration of BitCurator Access Webtools and Disk Image Redaction Tools.

Christopher A. Lee; Kam Woods


Archiving 2015 | 2015

Redacting private and sensitive information in born-digital collections

Kam Woods; Christopher A. Lee

Collaboration


Dive into the Kam Woods's collaboration.

Top Co-Authors

Avatar

Christopher A. Lee

University of North Carolina at Chapel Hill

View shared research outputs
Top Co-Authors

Avatar

Alexandra Chassanoff

University of North Carolina at Chapel Hill

View shared research outputs
Top Co-Authors

Avatar

David Dittrich

Naval Postgraduate School

View shared research outputs
Top Co-Authors

Avatar

Kris Kearton

Naval Postgraduate School

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Adam Russel

University of Washington

View shared research outputs
Top Co-Authors

Avatar

Adam Russell

Naval Postgraduate School

View shared research outputs
Top Co-Authors

Avatar

Simson Garfinkel

University of North Carolina at Chapel Hill

View shared research outputs
Top Co-Authors

Avatar

Sunitha Misra

University of North Carolina at Chapel Hill

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge