Kälber, SvenDewald, AndreasIdler, SteffenKatzenbeisser, StefanLotz, VolkmarWeippl, Edgar2019-01-252019-01-252014978-3-88579-622-0https://dl.gi.de/handle/20.500.12116/20054Criminal investigations today can hardly be imagined without the forensic analysis of digital devices, regardless of whether it is a desktop computer, a mobile phone, or a navigation system. This not only holds true for cases of cybercrime, but also for traditional delicts such as murder or blackmail, and also private corporate investigations rely on digital forensics. This leads to an increasing number of cases with an ever-growing amount of data, that exceeds the capacity of the forensic experts. To support investigators to work more efficiently, we introduce a novel approach to automatically reconstruct events that previously occurred on the examined system and to provide a quick overview to the investigator as a starting point for further investigation. In contrast to the few existing approaches, our solution does not rely on any previously profiled system behavior or knowledge about specific applications, log files, or file formats. We further present a prototype implementation of our so-called zero knowledge event reconstruction approach, that solely tries to make sense of characteristic structures in file system metadata such as fileand folder-names and timestamps.enForensic zero-knowledge event reconstruction on filesystem metadataText/Conference Paper1617-5468