Main Article Content


The increase in the use of USB storage devices tends to be massive & exponential due to various aspects, one of which is the size and affordable price of USB storage devices. Currently, the quality of handling cybercrime in Indonesia is still minimal, starting with the problem of collecting evidence that tends to be incomplete, errors during the process of acquiring evidence to the most severe loss and damage to the evidence. Static Forensics is one type of digital forensics method that obtains digital evidence by extracting and analyzing it after an incident occurs, or after the computer system is turned off (post-incident). The NIST Framework is a reference for the digital evidence retrieval and processing process, which was developed by the National Institute of Standards and Technology. The results obtained from the analysis of digital evidence recovery using static forensics methods combined with the NIST framework can be applied properly and optimally. The test was carried out 20 times, with the results of the digital evidence recovery accuracy reaching 100% on the three devices. Therefore, a combination of methods, frameworks and related tools is recommended to process cases related to digital forensics, especially the digital evidence recovery process.


Perangkat Penyimpanan USB, Static Forensics, NIST Framework Static Forensics NIST Framework USB Mass Storage

Article Details

Author Biographies

Banu Santoso Santoso, Universitas Amikom Yogyakarta

Teknik Komputer Fakultas Ilmu Komputer Universitas Amikom Yogyakarta

Pradipta Mahardika Sulaksono, Universitas Amikom Yogyakarta

Teknik Komputer Fakultas Ilmu Komputer Universitas Amikom Yogyakarta
How to Cite
Santoso, B. S., & Sulaksono, P. M. (2022). Static Forensic Pada USB Mass Storage Menggunakan Forensics Toolkit Imager. Jurnal Komputer Terapan , 8(1), 132–142.


  1. W. D. A. Chirath and L. Rupasinghe, “Comprehensive Forensic Data Extraction and Representation System for Windows Registry,” 2019 Int. Conf. Adv. Comput. ICAC 2019, pp. 346–350, 2019, doi: 10.1109/ICAC49085.2019.9103417.
  2. A. Dimitriadis, N. Ivezic, B. Kulvatunyou, and I. Mavridis, “D4I - Digital forensics framework for reviewing and investigating cyber attacks,” Array, vol. 5, no. December 2019, p. 100015, Mar. 2020, doi: 10.1016/j.array.2019.100015.
  3. Y. M. Song and K. S. Kwak, Electronics, Information Technology and Intellectualization. CRC Press, 2015.
  4. M. Rafique and M. N. A. Khan, “Exploring Static and Live Digital Forensics: Methods, Practices and Tools,” Int. J. Sci. Eng. Res., vol. 4, no. 10, pp. 1048–1056, 2013, [Online]. Available:
  5. I. Riadi, Sunardi, and A. Hadi, “Analisis Bukti Digital SSD NVMe pada Sistem Operasi Proprietary Menggunakan Metode Static Forensics,” CoreIT, vol. 3321, no. 2, pp. 1–8, 2019.
  6. A. Faiz and R. Imam, “Forensic Analysis of Frozen Hard Drive Using Static Forensics Method,” Int. J. Comput. Sci. Inf. Secur., vol. 15, no. 1, 2017.
  7. R. Umar and Sahiruddin, “Metode Nist Untuk Analisis Forensik Bukti Digital Pada Perangkat Android,” Pros. SENDU_U_2019, pp. 978–979, 2019.
  8. M. Fitriana, K. A. AR, and J. M. Marsya, “PENERAPANA METODE NATIONAL INSTITUTE OF STANDARS AND TECHNOLOGY (NIST) DALAM ANALISIS FORENSIK DIGITAL UNTUK PENANGANAN CYBER CRIME,” Cybersp. J. Pendidik. Teknol. Inf., vol. 4, no. 1, p. 29, Jul. 2020, doi: 10.22373/cj.v4i1.7241.
  9. R. Sistem et al., “JURNAL RESTI Penerapan Metode Static Forensics untuk Ekstraksi File Steganografi,” vol. 1, no. 10, pp. 2–6, 2021.
  10. J. Kizza and F. Migga Kizza, “Digital Evidence and Computer Crime,” in Securing the Information Infrastructure, IGI Global, 2008, pp. 298–317.
  11. J.-P. Van Belle, “Anti-Forensics: A Practitioner Perspective,” Int. J. Cyber-Security Digit. Forensics, vol. 4, no. 2, pp. 390–403, 2015, doi: 10.17781/P001593.
  12. M. Abdulhamid, S. E. E. Profile, V. O. Waziri, S. E. E. Profile, S. E. E. Profile, and S. E. E. Profile, “Cyber Crimes Analysis Based-On Open Source Digital Forensics Tools Some of the authors of this publication are also working on these related projects : Nature Inspired Meta-heuristic Algorithms for Deep Learning : Recent Progress and Novel Perspective Vie,” no. July 2016, 2013.
  13. N. Kishore, C. Gupta, and D. Dawar, “An Insight View of Digital Forensics,” Int. J. Comput. Sci. Appl., vol. 4, no. 6, pp. 89–96, Dec. 2014, doi: 10.5121/ijcsa.2014.4608.
  14. M. Gül and E. Kugu, “A survey on anti-forensics techniques,” IDAP 2017 - Int. Artif. Intell. Data Process. Symp., 2017, doi: 10.1109/IDAP.2017.8090341.
  15. A. Jain and G. S. Chhabra, “Anti-forensics techniques: An analytical review,” in 2014 Seventh International Conference on Contemporary Computing (IC3), Aug. 2014, pp. 412–418, doi: 10.1109/IC3.2014.6897209.
  16. J. Sammons, The Basics of Digital Forensics - Second Edition [2015][UnitedVRG]. .
  17. I. Riadi, R. Umar, and A. Firdonsyah, “Identification Of Digital Evidence On Android’s Blackberry Messenger Using NIST Mobile Forensic Method,” Int. J. Comput. Sci. Inf. Secur., vol. 15, no. 5, pp. 3–8, 2017.
  18. R. Umar, I. Riadi, and B. F. Muthohirin, “Live forensics of tools on android devices for email forensics,” TELKOMNIKA (Telecommunication Comput. Electron. Control., vol. 17, no. 4, p. 1803, Aug. 2019, doi: 10.12928/telkomnika.v17i4.11748.
  19. K. Kent, S. Chevalier, T. Grance, and H. Dang, “Guide to Integrating Forensic Techniques into Incident Response,” Natl. Inst. Stand. Technol., 2006.
  20. D. He, N. Kumar, J. H. Lee, and R. Sherratt, “Enhanced three-factor security protocol for consumer USB mass storage devices,” IEEE Trans. Consum. Electron., vol. 60, no. 1, pp. 30–37, 2014, doi: 10.1109/TCE.2014.6780922.