DS Journal of Cyber Security (DS-CYS)

Research Article | Open Access | Download Full Text

Volume 3 | Issue 2 | Year 2025 | Article Id: CYS-V3I2P101 DOI: https://doi.org/10.59232/CYS-V3I2P101

Assessing the Performance of Forensic File Recovery Tools on Deleted Files from a USB Device

Grace Bunmi Akintola

ReceivedRevisedAcceptedPublished
04 Feb 202503 Mar 202502 Apr 202530 Apr 2025

Citation

Grace Bunmi Akintola. “Assessing the Performance of Forensic File Recovery Tools on Deleted Files from a USB Device.” DS Journal of Cyber Security, vol. 3, no. 2, pp. 1-15, 2025.

Abstract

Assessing the Performance of Forensic File Recovery Tools on Deleted Files from a USB Device

Keywords

Grace Bunmi Akintola

References

[1] Lena Klasén, Niclas Fock, and Robert Forchheimer, “The Invisible Evidence: Digital Forensics as Key to Solving Crimes in the Digital Age,” Forensic Science International, vol. 362, 2024.

[CrossRef] [Google Scholar] [Publisher Link]

[2] Krishna Sanjay Vaddi et al., “Enhancements in the World of Digital Forensics,” International Journal of Artificial Intelligence, vol. 13, no. 1, pp. 680- 686, 2024.

[CrossRef] [Google Scholar] [Publisher Link]

[3] Daniel Septianto, Lukas, and Bagus Mahawan, “USB Flash Drives Forensic Analysis to Detect Crown Jewel Data Breach in Pt. XYZ (Coffee Shop Retail - Case Study)," IEEE 9th International Conference on Information and Communication Technology, Yogyakarta, Indonesia, pp. 286-290, 2021.

[CrossRef] [Google Scholar] [Publisher Link]

[4] Luge Yang, "A Research on USB Device Remote Sharing Methods in Virtual Desktop Environment," IEEE 9th International Symposium on System Security, Safety, and Reliability, Hangzhou, China, pp. 391-397, 2023.

[CrossRef] [Google Scholar] [Publisher Link]

[5] Ruwa F. Abu Hweidi et al., "SATA M.2 on Forensics: Trim Function Effect on Recovering Permanently Deleted Files," International Conference on Smart Applications, Communications and Networking, Istanbul, Turkiye, pp. 1-6, 2023.

[CrossRef] [Google Scholar] [Publisher Link]

[6] Julian Melo, Different Types Of USB Flash Drives, 2023. [Online]. Available: https://www.usbmemorydirect.com/blog/different-types-of-usb-flash-drives/?srsltid=AfmBOopQOm4qUprEWEMLs_kUzELm3503sYPmP9kmxN6mgVyu7HuJ7Ssg

[7] K. Nikhil, S.A. Hariprasad, and B. Aditya, "Comparative Study on Various File System Implementations on Different OS," International Research Journal of Engineering and Technology (IRJET), vol. 8, no. 11, pp. 1186 -1196, 2021.

[Publisher Link]

[8] Hao Liu et al., “USB Powered Devices: A Survey of Side-Channel Threats and Countermeasures," High-Confidence Computing, vol. 1, no. 1, 2021.

[CrossRef] [Google Scholar] [Publisher Link]

[9] Mohit Kumar Jha, USB Forensics: Ultimate Guide to Device, Drive & Data Analysis, Forensics, 2024. [Online]. Available: https://www.mailxaminer.com/blog/usb-forensics/

[10] Anguilano, 5 Factors to Consider When Attempting to Recover Deleted Data from Hard Drives, 2023. [Online]. Available: https://www.tcdi.com/5-factors-to-consider-when-attempting-to-recover-deleted-data-from-hard-drives/

[11] Kalpana Shinde et al., "Determining the Probability of Recovering Data from Damaged USB Flash Drive," International Journal of Engineering and Advanced Technology, vol. 8, no. 5S3, pp. 179-191, 2020.

[CrossRef] [Publisher Link]

[12] Ngozi Tracy Aleke, and Mohamed Trigui, "Legal and Ethical Challenges in Digital Forensics Investigations," Digital Forensics in the Age of AI, pp. 147 -175, 2025.

[CrossRef] [Google Scholar] [Publisher Link]

[13] Rashmi Mandayam, "Ethical Considerations in Digital Forensics," International Journal of Innovative Research in Engineering and Multidisciplinary Physical Sciences, vol. 13, Issue 1, pp. 1-4, 2025.

[CrossRef] [Publisher Link]

[14] Jihun Joun, Sangjin Lee, and Jungheum Park, "Discovering Spoliation of Evidence through Identifying Traces on Deleted Files in macOS," Forensic Science International: Digital Investigation, vol. 44, 2023.

[CrossRef] [Google Scholar] [Publisher Link]

[15] Deepak Raj Rao, Sonu Mandecha, and Kumarshankar Raychaudhuri, "An Empirical Study of Digital Forensic Tools and Techniques for Detection of Traces of Anti-Forensic Activities of Usb Devices in Windows," Open Access International Journal of Science and Engineering, vol. 5, no. 6, pp. 1-7, 2020.

[Publisher Link]

[16] Bandr Siraj Fakiha, "Forensic Analysis of Bad Usb Attacks: A Methodology for Detecting and Mitigating Malicious Usb Device Activities," Edelweiss Applied Science and Technology, vol. 8, no. 5, pp. 1090-1100, 2024.

[CrossRef] [Google Scholar] [Publisher Link]

[17] Rashi Karnewar, and Arya Chahankar, "Data Recovery in Digital Forensics," International Journal of Innovations in Engineering and Science, vol. 9, no. 8, pp. 29-33, 2024.

[Publisher Link]

[18] Varun Reddy Kondam, "Comparing SSD Forensics with HDD Forensics," Culminating Projects in Information Assurance, pp. 1-107, 2020.

[Google Scholar] [Publisher Link]

[19] I Putu Agus Eka Pratama, " Computer Forensic using Photorec for Secure Data Recovery Between Storage Media: A Proof of Concept," International Journal of Science, Technology and Management, vol. 2, no. 4, pp. 1189-1196, 2021.

[CrossRef] [Google Scholar] [Publisher Link]

[20] Sai Niveditha Varayogula et al., "Computer Forensics Data Recovery Software: A Comparative Study," International Journal of Innovative Research in Computer Science and Technology, vol. 10, no. 2, pp. 513-518, 2022.

[Google Scholar] [Publisher Link]

[21] Zawar Shah et al., "Forensic Investigation of Remnant Data on USB Storage Devices Sold in New Zealand," Applied Sciences, vol. 12, no, 12, pp. 1-29, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[22] Muhammad Fahmi Abdillah, and Yudi Prayudi, "Data Recovery Comparative Analysis using Open-Based Forensic Tools Source on Linux," International Journal of Advanced Computer Science and Applications, vol. 13, no. 9, pp. 633-639, 2022.

[CrossRef] [Google Scholar] [Publisher Link]

[23] Kausalyani A/P Angamutu, Nor Azlina Abd Rahman, and Nik Nurul Ain Nik Suki, "A Customized Data Recovery Tool," Journal of Physics: Conference Series, vol. 1712, 2020.

[CrossRef] [Publisher Link]

[24] William Bollson, Puran File Recovery Review in 2025: Is It Worth Trying?, 2025. [Online]. Available: https://4ddig.tenorshare.com/windows-recovery-solutions/puran-file-recovery-review.html

[25] Benedict Collins, Best Data Recovery Software of 2025, 2025. [Online]. Available: https://www.techradar.com/best/best-data-recovery-software

[26] Shengyu Li et al., "Watch Out Your Thumb Drive: Covert Data Theft from Portable Data Storage Via Backscatter," IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 4, pp. 2434-2447, 2024.

[CrossRef] [Google Scholar] [Publisher Link]

[27] Ade Putra, Muhammad Donni Lesmana Siahaan, and Arpan Arpan, "Comparative Analysis of Data Recovery Using Easeus Data Recovery Wizard and Recuva Applications," INFOKUM, vol. 10, no. 3, pp. 161-165, 2022.

[Google Scholar] [Publisher Link]

Assessing the Performance of Forensic File Recovery Tools on Deleted Files from a USB Device