{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T23:51:52Z","timestamp":1774396312974,"version":"3.50.1"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032206831","type":"print"},{"value":"9783032206848","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-20684-8_7","type":"book-chapter","created":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T14:07:30Z","timestamp":1773670050000},"page":"106-121","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["How to\u00a0Carve Out-of-Order Fragmented Files"],"prefix":"10.1007","author":[{"given":"Nick","family":"Huijsmans","sequence":"first","affiliation":[]},{"given":"Bart","family":"Kuijsten","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7958-8921","authenticated-orcid":false,"given":"Hugo","family":"Jonker","sequence":"additional","affiliation":[]},{"given":"Harm","family":"van Beek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,17]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","unstructured":"Alherbawi, N., Shukur, Z., Sulaiman, R.: Systematic literature review on data carving in digital forensic. Procedia Technology 11, 86\u201392 (2013). https:\/\/doi.org\/10.1016\/j.protcy.2013.12.165, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2212017313003198, 4th International Conference on Electrical Engineering and Informatics, ICEEI 2013","DOI":"10.1016\/j.protcy.2013.12.165"},{"issue":"3","key":"7_CR2","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.diin.2007.10.001","volume":"4","author":"M Cohen","year":"2007","unstructured":"Cohen, M.: Advanced carving techniques. Digit. Investig. 4(3), 119\u2013128 (2007). https:\/\/doi.org\/10.1016\/j.diin.2007.10.001","journal-title":"Digit. Investig."},{"key":"7_CR3","unstructured":"van Deursen, T., Mauw, S., Radomirovi\u0107, S.: mCarve: Carving attributed dump sets. In: 20th USENIX Security Symposium (USENIX Security 11). USENIX Association, San Francisco, CA (Aug 2011). https:\/\/www.usenix.org\/conference\/usenix-security-11\/mcarve-carving-attributed-dump-sets"},{"key":"7_CR4","doi-asserted-by":"publisher","unstructured":"Garfinkel, S.: Carving contiguous and fragmented files with fast object validation. Digital Invest. 4, 2\u201312 (09 2007). https:\/\/doi.org\/10.1016\/j.diin.2007.06.017","DOI":"10.1016\/j.diin.2007.06.017"},{"key":"7_CR5","doi-asserted-by":"publisher","unstructured":"Garfinkel, S.L., McCarrin, M.: Hash-based carving: Searching media for complete files and file fragments with sector hashing and hashdb. Digit. Investig. 14, S95\u2013S105 (2015). https:\/\/doi.org\/10.1016\/j.diin.2015.05.001, the Proceedings of the Fifteenth Annual DFRWS Conference","DOI":"10.1016\/j.diin.2015.05.001"},{"key":"7_CR6","unstructured":"Huijsmans, N., Kuijsten, B.: Reconstructing files with out-of-order fragmentation (2025), bSc.\u00a0thesis"},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"van\u00a0der Meer, V., van\u00a0den Bos, J.: JPEG file fragmentation point detection using Huffman Code and Quantization Array Validation. In: Proceedings of the 16th International Conference on Availability, Reliability and Security. ARES \u201921, Association for Computing Machinery, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3465481.3470061","DOI":"10.1145\/3465481.3470061"},{"issue":"2","key":"7_CR8","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1109\/TIP.2005.863054","volume":"15","author":"N Memon","year":"2006","unstructured":"Memon, N., Pal, A.: Automated reassembly of file fragmented images using greedy algorithms. IEEE Trans. Image Process. 15(2), 385\u2013393 (2006). https:\/\/doi.org\/10.1109\/TIP.2005.863054","journal-title":"IEEE Trans. Image Process."},{"key":"7_CR9","doi-asserted-by":"publisher","unstructured":"Meyer, D.T., Bolosky, W.J.: A study of practical deduplication. ACM Trans. Storage 7(4) (2012). https:\/\/doi.org\/10.1145\/2078861.2078864","DOI":"10.1145\/2078861.2078864"},{"key":"7_CR10","doi-asserted-by":"publisher","unstructured":"Pal, A., Memon, N.: The evolution of file carving. Signal Process. Mag., IEEE 26, 59 \u2013 71 (04 2009). https:\/\/doi.org\/10.1109\/MSP.2008.931081","DOI":"10.1109\/MSP.2008.931081"},{"key":"7_CR11","doi-asserted-by":"publisher","unstructured":"Pal, A., Sencar, T., Memon, N.: Detecting file fragmentation point using sequential hypothesis testing. Digital Invest. 5 (09 2008). https:\/\/doi.org\/10.1016\/j.diin.2008.05.015","DOI":"10.1016\/j.diin.2008.05.015"},{"key":"7_CR12","unstructured":"Richard, G.G., Roussev, V.: Scalpel: A frugal, high performance file carver. In: Proceedings of the Digital Forensic Research Workshop (DFRWS) (2005)"},{"key":"7_CR13","unstructured":"Shanmugasundaram, K., Memon, N.D.: Automatic reassembly of document fragments via data compression. In: 2nd Digital Forensics Research Workshop, Syracuse (2002)"},{"key":"7_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsidi.2021.301125","volume":"38","author":"V van der Meer","year":"2021","unstructured":"van der Meer, V., Jonker, H., van den Bos, J.: A contemporary investigation of NTFS file fragmentation. Forensic Sci. Int.: Digital Invest. 38, 301125 (2021). https:\/\/doi.org\/10.1016\/j.fsidi.2021.301125","journal-title":"Forensic Sci. Int.: Digital Invest."}],"container-title":["Lecture Notes in Computer Science","Juggling Formal Methods and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-20684-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T23:02:39Z","timestamp":1774393359000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-20684-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032206831","9783032206848"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-20684-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"17 March 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of interest"}}]}}