2015
DOI: 10.1007/s11042-015-2798-8
| View full text |Cite
|
Sign up to set email alerts
|

Abstract: Digital forensic data from volatile system memory possesses the following distinctive features: volatility, transience, phased stability, complexity, relevance of collected data, and phased behavior predictability. We present a computer forensic analysis model (CERM) for the reconstruction of a chain of evidence of volatile memory data. CERM frees analysts from being confined to the traditional analysis approach of digital forensic data that requires single evidence-oriented analysis. In CERM, they can focus o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…In a virtual machine it necessary to install an operating system, which is responsible for executing applications for the virtual machine users. An example of virtual machine usage can be found in the work of Wang et al (2016) for a computer forensic analysis model for reconstruction of the chain of evidence from volatile memory. Examples of applications are EnCase, FTK, Recuva, R-Studio, Stella Phoenix in the work of Buchanan-Fig.…”
Section: Pre-operation Conceptmentioning
confidence: 99%
“…In a virtual machine it necessary to install an operating system, which is responsible for executing applications for the virtual machine users. An example of virtual machine usage can be found in the work of Wang et al (2016) for a computer forensic analysis model for reconstruction of the chain of evidence from volatile memory. Examples of applications are EnCase, FTK, Recuva, R-Studio, Stella Phoenix in the work of Buchanan-Fig.…”
Section: Pre-operation Conceptmentioning
confidence: 99%
“…The final two papers are in the smart hardware-based media communication category [3,21]. The study presented by Wang et al in [21] discusses the promising issue relating to digital forensic data from volatile system memory. A computer forensic analysis model for the reconstruction of a chain of evidence of volatile memory data is proposed.…”
Section: Summary Of 2accepted Papersmentioning
confidence: 99%